• Title/Summary/Keyword: priority mechanism

Search Result 235, Processing Time 0.025 seconds

A Recursive Procedure for the Queue Length Distribution of a Coxian Queueing Network (회귀적 방법을 이용한 Coxian 대기 네트워크의 대기길이 분포 계산)

  • Park, Doo-Yeong
    • The Journal of Engineering Research
    • /
    • v.3 no.1
    • /
    • pp.85-95
    • /
    • 1998
  • In this study, we consider a recursive procedure to obtain the stationary probability distribution for analyzing Coxian queueing networks with finite queues. This network deals with multiple class customers. Due to the state space representing multiple class customers, the sub-matrices corresponding to states can not be square matrices and can not be inverted. Therefore, we introduce more complex recursive method to avoid the singular problem. The open queueing network that we study consists of 3 parallel first-level sources linked to a single second level queue. We consider two types of schemes for entering a queue. The first scheme is assumed to be the first-blocked-first-enter (FBFE) and the second scheme is the higher-priority-first-enter (HPFE). Arrival and service times are assume to have a Coxian distribution with two phases. Comparison between the resulting using Gauss-Seidel method and recursive procedure will be shown.

  • PDF

A Study on Electrochemical Evaluation Method of Toughness Degradation for 12%Cr Steel (II) (12%Cr강 인성열화도의 전기화학적 평가법에 대한 연구(II))

  • Kim, Chang-Hui;Seo, Hyun-Uk;Yoon, Kee-Bong;Park, Ki-Sung;Kim, Seoung-Tae
    • Proceedings of the KSME Conference
    • /
    • 2001.06a
    • /
    • pp.268-273
    • /
    • 2001
  • Fossil power plants operated in high temperature condition are composed of components such as turbine, boiler, and piping system. Among these components, turbine blades made with 12%Cr steel operate at a temperature above $500^{\circ}C$. Due to the long term service, turbine blades experience material degradation manifested by change in mechanical and microstructural properties. The need to make life assessment and to evaluate material degradation of turbine blade is strongly required but in reality, there is a lack of knowledge in defining failure mechanism and fundamental data for this component. Therefore, in making life assessment of turbine blade, evaluation of material degradation must be a priority. For this purpose, evaluation of toughness degradation is very important. The major cause of toughness degradation in 12Cr turbine blade is reported to be critical corrosion pitting induced by segregation of impurity elements(P etc.), coarsening of carbide, and corrosion, but the of materials for in-service application. In this study, the purpose of research is focused on evaluating toughness degradation with respect to operation time for 12%Cr steel turbine blade under high temperature steam environment and quantitatively detecting the degradation properties which is the cause of toughness degradation by means of non-destructive method, electrochemical polarization.

  • PDF

RGF: Receiver-based Greedy Forwarding for Energy Efficiency in Lossy Wireless Sensor Networks

  • Hur, In;Kim, Moon-Seong;Seo, Jae-Wan;Choo, Hyun-Seung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.4
    • /
    • pp.529-546
    • /
    • 2010
  • Greedy forwarding is the key mechanism of geographic routing and is one of the protocols used most commonly in wireless sensor networks. Greedy forwarding uses 1-hop local information to forward packets to the destination and does not have to maintain the routing table, and thus it takes small overhead and has excellent scalability. However, the signal intensity reduces exponentially with the distance in realistic wireless sensor network, and greedy forwarding consumes a lot of energy, since it forwards the packets to the neighbor node closest to the destination. Previous proposed greedy forwarding protocols are the sender-based greedy forwarding that a sender selects a neighbor node to forward packets as the forwarding node and hence they cannot guarantee energy efficient forwarding in unpredictable wireless environment. In this paper, we propose the receiver-based greedy forwarding called RGF where one of the neighbor nodes that received the packet forwards it by itself. In RGF, sender selects several energy efficient nodes as candidate forwarding nodes and decides forwarding priority of them in order to prevent unnecessary transmissions. The simulation results show that RGF improves delivery rate up to maximum 66.8% and energy efficiency, 60.9% compared with existing sender-based greedy forwarding.

Effective Streaming technology of a layered encoding Video Application supporting QoS mechanism in the Internet

  • Seok, Joo-Myoung;Lee, Kyou ho;Suh, Doug-Young
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.2075-2078
    • /
    • 2002
  • Internet became the most popular network in spite of its weakness in realtime multimedia service. Many experts believe that the Internet has the potential to become the main multimedia distribution network of the near future. Currently, it does not provide any (BoS guarantees and, even when it does, guaranteed quality delivery of video may turn out to be too expensive. Unavoidable packet losses and delay jitter caused by congestion in a best effort delivery environment require use of intelligent transport techniques for effective video delivery. According to market needs of better quality of service (QoS) fur realtime multimedia services over Internet, they have been standardizing RSVP, IntServ, and DiffServ This paper combines the benefits of QoS mechanisms such as RSVP/IntServ with scalable video encoding. We propose that more important bit stream is given more priority such that limited network resources are guaranteed far the stream. Various prioritizing approaches are proposed and compared to normal approach by using Network Simulator. The calculated QoS parameters such as packet loss rate are used to calculate degree of degradation in video quality. In this Paper, proposed methods can be implemented adaptively to Von protocol, such as H.323, SIP.

  • PDF

Multiobjective Genetic Algorithm for Scheduling Problems in Manufacturing Systems

  • Gen, Mitsuo;Lin, Lin
    • Industrial Engineering and Management Systems
    • /
    • v.11 no.4
    • /
    • pp.310-330
    • /
    • 2012
  • Scheduling is an important tool for a manufacturing system, where it can have a major impact on the productivity of a production process. In manufacturing systems, the purpose of scheduling is to minimize the production time and costs, by assigning a production facility when to make, with which staff, and on which equipment. Production scheduling aims to maximize the efficiency of the operation and reduce the costs. In order to find an optimal solution to manufacturing scheduling problems, it attempts to solve complex combinatorial optimization problems. Unfortunately, most of them fall into the class of NP-hard combinatorial problems. Genetic algorithm (GA) is one of the generic population-based metaheuristic optimization algorithms and the best one for finding a satisfactory solution in an acceptable time for the NP-hard scheduling problems. GA is the most popular type of evolutionary algorithm. In this survey paper, we address firstly multiobjective hybrid GA combined with adaptive fuzzy logic controller which gives fitness assignment mechanism and performance measures for solving multiple objective optimization problems, and four crucial issues in the manufacturing scheduling including a mathematical model, GA-based solution method and case study in flexible job-shop scheduling problem (fJSP), automatic guided vehicle (AGV) dispatching models in flexible manufacturing system (FMS) combined with priority-based GA, recent advanced planning and scheduling (APS) models and integrated systems for manufacturing.

Shared-medium Access Control Protocol for the ATM Access Network - Part II : Performance Analysis of the DMR-II Protocol - (ATM 액세스망을 위한 공유매체 접속 제어 프로토콜 - II부 : DMR-II 프로토콜의 성능분석-)

  • 황민태;김장경;이정태
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.2 no.3
    • /
    • pp.389-399
    • /
    • 1998
  • The DMR-II shared-medium access control protocol was developed for the ATM access network users to supper the isochronous traffic and the non-isochronous traffic simultaneously under the bandwidth-skating environment. In this paper we analyze the performance of the DMR-II protocol by using both the analytical analysis and the simulation method. Under the ATM access network environment, the performance analysis result shows that the DMR-II protocol maintains the delay variation of the isochronous traffic beyond the threshold value, and satisfies the delay time criteria of the non-isochronous traffic by supporting the priority service. Moreover the result shows high network utilization over 130% due to the destination release mechanism of the DMR-II protocol.

  • PDF

Design md Implementation for the Remote Real Time Process Monitoring and Control System based on the JMF (JMF 기반의 실시간 원격 공정 감시 및 제어 시스템 설계 및 구현)

  • Kim, Sam-Ryong;Lim, In-Taek;Lee, Jeong-Bae
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.453-460
    • /
    • 2004
  • In this thesis, remote conveyor control and monitoring system is designed and Implemented for shoes production process based on Lego prototyping mechanism by using the I/O interface control board for the ISA Interface control board. A conveyor server for real time profess control is implemented based on RTLinux(Real-Time Linux) so that users deride priority of work. And device driver is implemented bated on the RTLinux. Through this system, real-time Client/server monitoring environments Is implemented and tested. And the JMF(Java Media Framework) based monitoring system was implemented and the total processing status war monitored.

Delay-Optimized Adaptive Multichannel Backoff Mechanism for VANET (VANET을 위한 지연 최적화 적응적 멀티 채널 백오프 메카니즘)

  • Lee, Jung-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.5
    • /
    • pp.837-844
    • /
    • 2019
  • In this paper, we propose the AMBM(: Adaptive Multi-channel Backoff Machisum) -Mac protocol to provide high throughput for non-safety applications in VANET(: Vehicular Ad Hoc Networks) environment. The proposed protocol guarantees the quality of service of non-safety packets by dynamically adjusting CW(: Channel Window) of WSA(: WAVE Service Advertisement) to maximize throughput between non-safety packets of different priority. It also shows that allocating a large amount of time for channel coordination and time slot reservation for SC and dynamically adjusting CW and CCI as nodes increase to reduces transmission delay than IEEE 1609.9, C-MAC(: Coordinated multi-channel MAC, and Q-VCI(: QoS Variable CCH Interval) protocols.

Self-Supervised Long-Short Term Memory Network for Solving Complex Job Shop Scheduling Problem

  • Shao, Xiaorui;Kim, Chang Soo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2993-3010
    • /
    • 2021
  • The job shop scheduling problem (JSSP) plays a critical role in smart manufacturing, an effective JSSP scheduler could save time cost and increase productivity. Conventional methods are very time-consumption and cannot deal with complicated JSSP instances as it uses one optimal algorithm to solve JSSP. This paper proposes an effective scheduler based on deep learning technology named self-supervised long-short term memory (SS-LSTM) to handle complex JSSP accurately. First, using the optimal method to generate sufficient training samples in small-scale JSSP. SS-LSTM is then applied to extract rich feature representations from generated training samples and decide the next action. In the proposed SS-LSTM, two channels are employed to reflect the full production statues. Specifically, the detailed-level channel records 18 detailed product information while the system-level channel reflects the type of whole system states identified by the k-means algorithm. Moreover, adopting a self-supervised mechanism with LSTM autoencoder to keep high feature extraction capacity simultaneously ensuring the reliable feature representative ability. The authors implemented, trained, and compared the proposed method with the other leading learning-based methods on some complicated JSSP instances. The experimental results have confirmed the effectiveness and priority of the proposed method for solving complex JSSP instances in terms of make-span.

A Study on Accelerated Life Testing Model and Design (헬기용 와이퍼 조립체의 가속모델 및 가속수명시험 설계 연구)

  • Kim, Daeyu;Hur, Jangwook;Jeon, Buil
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.6
    • /
    • pp.894-903
    • /
    • 2018
  • In the case of helicopters, the development of parts technology is rapidly changing, and the complexity is rapidly increasing. Particularly, the surge of various electric and electronic systems is recognized as a problem that is directly related to the safety of the helicopter. Due to these problems, there is a growing interest in reliability evaluation in the face of the problem of confirming and certifying the reliability of parts in the development stage. In this paper, the analysis of the failure mechanism of the wiper system was carried out, and the priority and importance of each failure mode were checked by using the results, and major stress factors were derived and the corresponding acceleration model was selected. Also, the accelerated lifetime test time was calculated according to the life test time, acceleration status and acceleration level of the steady state by using the selected acceleration model and characteristic values.