• Title/Summary/Keyword: preemptive-response

Search Result 73, Processing Time 0.03 seconds

The Performance Analysis of CPU scheduling Algorithms in Operating Systems

  • Thangakumar Jeyaprakash;Ranjana P;Sambath M
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.165-170
    • /
    • 2023
  • Scheduling algorithms plays a significant role in optimizing the CPU in operating system. Each scheduling algorithms schedules the processes in the ready queue with its own algorithm design and its properties. In this paper, the performance analysis of First come First serve scheduling, Non preemptive scheduling, Preemptive scheduling, Shortest Job scheduling and Round Robin algorithm has been discussed with an example and the results has been analyzed with the performance parameters such as minimum waiting time, minimum turnaround time and Response time.

Effects of Agmatine on GABAA Receptor Antagonist-induced Tactile Allodynia (Agmatine이 GABAA 수용체 길항제로 유도한 촉각이질통에 미치는 효과)

  • Lee, Youn Woo;Ishikawa, Toshizo
    • The Korean Journal of Pain
    • /
    • v.21 no.3
    • /
    • pp.173-178
    • /
    • 2008
  • Background: The intrathecal (IT) $GABA_A$ receptor antagonist, bicuculline (BIC), results in tactile allodynia (TA) through disinhibition in the spinal cord. Such disinhibition is considered to be an important mechanism for neuropathic pain. Agmatine, an endogenous polyamine, has a neuro-protective effect in the central nervous system. We investigated the analgesic effects and mechanisms of agmatine action on BIC-induced TA. Methods: Male Sprague-Dawley rats, weighting 250-300 g, were subjected to implantations of PE-10 into the lumbar subarachnoid space for IT drug injection. Five days after surgery, either $10{\mu}l$ of normal saline (NS) or agmatine ($30{\mu}g$ or $10{\mu}g$) in $10{\mu}l$ NS were injected 10 min prior to BIC ($10{\mu}g$) or NMDA ($5{\mu}g$). We assessed the degree of TA (graded 0: no response, 1: mild response, 2: moderate response, 3: strong response) every 5 min for 30 min. Areas under curves and degree of TA were expressed as mean ${\pm}$ SEM. Results were analyzed using one-way ANOVA followed by a Tukey test for multiple comparisons. P < 0.05 was considered significant. Results: IT BIC-induced strong TA reached its peak and plateaued between 10 to 15 min. IT NS-NMDA induced mild transient TA for up to 15 min. Preemptive IT AG attenuated IT BIC-induced TA dose dependently and preemptive IT AG10 completely abolished the IT NMDA-induced TA. Conclusions: Preemptive IT AG attenuated the IT BIC-induced TA through inhibitory actions on postsynaptic NMDA receptor activation. AG might be a viable therapeutic option in the treatment of neuropathic pain.

A Study on the Model for Preemptive Intrusion Response in the era of the Fourth Industrial Revolution (4차 산업혁명 시대의 선제적 위협 대응 모델 연구)

  • Hyang-Chang Choi
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.27-42
    • /
    • 2022
  • In the era of the Fourth Industrial Revolution, digital transformation to increase the effectiveness of industry is becoming more important to achieving the goal of industrial innovation. The digital new deal and smart defense are required for digital transformation and utilize artificial intelligence, big data analysis technology, and the Internet of Things. These changes can innovate the industrial fields of national defense, society, and health with new intelligent services by continuously expanding cyberspace. As a result, work productivity, efficiency, convenience, and industrial safety will be strengthened. However, the threat of cyber-attack will also continue to increase due to expansion of the new domain of digital transformation. This paper presents the risk scenarios of cyber-attack threats in the Fourth Industrial Revolution. Further, we propose a preemptive intrusion response model to bolster the complex security environment of the future, which is one of the fundamental alternatives to solving problems relating to cyber-attack. The proposed model can be used as prior research on cyber security strategy and technology development for preemptive response to cyber threats in the future society.

A Task Group-based Real-Time Scheduling Technique m the Non-Preemptive TinyOS (비선점 환경의 TinyOS에서 실시간성을 고려한 태스크 그룹 기반의 스케줄링 기법)

  • Son, Chi-Won;Tak, Sung-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.9
    • /
    • pp.1285-1298
    • /
    • 2010
  • Since the TinyOS incorporating a non-preemptive task scheduling policy uses a FIFO (First-In First-Out) queue, a task with the highest priority cannot preempt a task with lower priority before the task with lower priority must run to completion. Therefore, the non-preemptive TinyOS cannot guarantee the completion of real-time user tasks within their deadlines. Additionally, the non-preemptive TinyOS needs to meet the deadlines of user tasks as well as those of TinyOS platform tasks called by user tasks in order to guarantee the deadlines of the real-time services requested by user tasks. In this paper, we present a group-based real-time scheduling technique that makes it possible to guarantee the deadlines of real-time user tasks in the TinyOS incorporating a non-preemptive task scheduling policy. The proposed technique groups together a given user task and TinyOS platform tasks called and activated by the user task, and then schedule them as a virtual big task. A case study shows that the proposed technique yields efficient performance in terms of guaranteeing the completion of user tasks within their deadlines and aiming to provide them with good average response time, while maintaining the compatibility of the existing non-preemptive TinyOS platform.

Delay analysis for a discretionary-priority packet-switching system

  • Hong, Sung-Jo;Takagi, Hideaki
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1995.04a
    • /
    • pp.729-738
    • /
    • 1995
  • We consider a priority-based packet-switching system with three phases of the packet transmission time. Each packet belongs to one of several priority classes, and the packets of each class arrive at a switch in a Poison process. The switch transmits queued packets on a priority basis with three phases of preemption mechanism. Namely, the transmission time of each packet consists of a preemptive-repeat part for the header, a preemptive-resume part for the information field, and a nonpreemptive part for the trailer. By an exact analysis of the associated queueing model, we obtain the Laplace-Stieltjes transform of the distribution function for the delay, i.e., the time from arrival to transmission completion, of a packet for each class. We derive a set of equations that calculates the mean response time for each class recursively. Based on this result, we plot the numerical values of the mean response times for several parameter settings. The probability generating function and the mean for the number of packets of each class present in the system at an arbitrary time are also given.

  • PDF

Smart Disaster Safety Management System for Social Security (사회안전을 위한 스마트 재난안전관리 시스템)

  • Kang, Heau-jo
    • Journal of Digital Contents Society
    • /
    • v.18 no.1
    • /
    • pp.225-229
    • /
    • 2017
  • In this paper, various units of industrial disaster safety threats as well as local and national facilities unit real-time detection and prevention refer to the corresponding system goes into disaster management preparedness, prevention, response recovery of phase I systematic ICT skills that can be managed more efficiently. In addition, the immediate disaster prevention and preparedness for early forecasting preemptive damage scale and high-tech information exchange technology to overcome the limitations of a human disaster in the field against the analysis and strategy of preemptive disaster safety management with smart risk management and prevention in response and recovery and the scene quickly and efficient mutual cooperation and effective collaboration and cooperation of the Community Center social security presented a smart disaster safety management system.

Improved Schedulability Analysis of Real-Time Sporadic Tasks with EDF Preemptive Scheduling

  • Darbandi, Armaghan;Kim, Myung-Kyun
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.4
    • /
    • pp.396-404
    • /
    • 2012
  • This paper proposes an analysis method to check the schedulability of a set of sporadic tasks under earliest deadline first (EDF) scheduler. The sporadic task model consists of subtasks with precedence constraints, arbitrary arrival times and deadlines. In order to determine the schedulability, we present an approach to find exact worst case response time (WCRT) of subtatsks. With the technique presented in this paper, we exploit the precedence relations between subtasks in an accurate way while taking advantage of the deadline of different subtasks. Another nice feature of our approach is that it avoids calculation time overhead by exploiting the concept of deadline busy period. Experimental results show that this consideration leads to a significant improvement compared with existing work.

Research on Cyber-terrorism preparation scheme (사이버테러 대응방안에 관한 연구)

  • Kim, Yeon Jun;Kim, Sang Jin
    • Convergence Security Journal
    • /
    • v.16 no.3_2
    • /
    • pp.33-42
    • /
    • 2016
  • While evolving information-oriented society provides a lot of benefits to the human life, new types of threats have been increasing. Particularly, cyber terrorism, happen on the network that is composed of a computer system and information communication network, and the mean and scale of damage has reached a serious level. In other words, it is hard to locate cyber terror since it occurs in the virtual space, not in the real world, so identifying "Who is attacking?" (Non-visibility, non-formulas), or "Where the attack takes place?" (trans-nation) are hard. Hackers, individuals or even a small group of people, who carried out the cyber terror are posing new threats that could intimidate national security and the pace and magnitude of threats keep evolving. Scale and capability of North Korea's cyber terrorism are assessed as world-class level. Recently, North Korea is focusing on strengthen their cyber terrorism force. So improving a response system for cyber terror is a key necessity as North Korea's has emerged as a direct threat to South Korean security. Therefore, Korea has to redeem both legal and institutional systems immediately to perform as a unified control tower for preemptive response to cyber terrors arise from North Korea and neighboring countries.

A Study on the Use of Geospatial Information-Based Simulation for Preemptive Response to Water Disasters in Agricultural Land (농경지 수재해 선제적 대응을 위한 공간정보기반 시뮬레이션 활용 연구)

  • Jung, Jae Ho;Kim, Seung Hyun;Kim, Dae Jin;Yang, Seung Weon
    • Smart Media Journal
    • /
    • v.11 no.7
    • /
    • pp.52-60
    • /
    • 2022
  • Due to global warming and changes in the natural environment, flood damage to agricultural land due to wind and flood damage continues. Although disaster prevention projects have been continuously carried out since the founding of the country, progress has been insufficient compared to the sustained period, and huge costs are still being consumed. Therefore, it is necessary to use predictive simulation for pre-emptive response to inundation of farmland. In this paper, a case of immersion analysis simulation using a GIS(Geospatial Information System) based SWMM model was introduced, and the validity was confirmed through the error rate between our simulation result and the results of other models in the US and Korea. In addition, in the direction of using the simulation for agricultural land inundation, we presented various utilization methods to supplement the current agricultural land inundation-based information policy, such as the creation of flood traces. If simulation results from more regions are accumulated in the form of the flood analysis maps in the future, it is expected that they will be able to be utilized in various applications for preemptive response to and prevention of water disasters at the national level.

A Study on the Preemptive Measure for Fake News Eradication Using Data Mining Algorithms : Focused on the M Online Community Postings (데이터 마이닝을 활용한 가짜뉴스의 선제적 대응을 위한 연구 : M 온라인 커뮤니티 게시물을 중심으로)

  • Lim, Munyeong;Park, Sungbum
    • Journal of Information Technology Services
    • /
    • v.18 no.1
    • /
    • pp.219-234
    • /
    • 2019
  • Fake news threaten democratic elections and causes social conflicts, resulting in major damage. However, the concept of fake news is hard to define, as there is a saying, "News is not fake, fake is not news." Fake news, however, has irreversible characteristics that can not be recovered or reversed completely through post-punishment of economic and political benefits. It is also rapidly spreading in the early days. Therefore, it is very important to preemptively detect these types of articles and prevent their blind proliferation. The existing countermeasures are focused on reporting fake news, raising the level of punishment, and the media & academia to determine the authenticity of the news. Researchers are also trying to determine the authenticity by analyzing its contents. Apart from the contents of fake news, determining the behavioral characteristics of the promoters and its qualities can help identify the possibility of having fake news in advance. The online community has a fake news interception and response tradition through its long-standing community-based activities. As a result, I attempted to model the fake news by analyzing the affirmation-denial analysis and posting behavior by securing the web board crawl of the 'M community' bulletin board during the 2017 Korean presidential election period. Random forest algorithm deemed significant. The results of this research will help counteract fake news and focus on preemptive blocking through behavioral analysis rather than post-judgment after semantic analysis.