• Title/Summary/Keyword: $A^*$ search algorithm

Search Result 3,553, Processing Time 0.034 seconds

An Adaptive Chord for Minimizing Network Traffic in a Mobile P2P Environment (비정기적 데이터 수집 모드에 기반한 효율적인 홈 네트워크 서비스 제어 시스템의 설계)

  • Woo, Hyun-Je;Lee, Mee-Jeong
    • The KIPS Transactions:PartC
    • /
    • v.16C no.6
    • /
    • pp.773-782
    • /
    • 2009
  • A DHT(Distributed Hash Table) based P2P is a method to overcome disadvantages of the existing unstructured P2P method. If a DHT algorithm is used, it can do a fast data search and maintain search efficiency independent of the number of peer. The peers in the DHT method send messages periodically to keep the routing table updated. In a mobile environment, the peers in the DHT method should send messages more frequently to keep the routing table updated and reduce the failure of a request. Therefore, this results in increase of network traffic. In our previous research, we proposed a method to reduce the update load of the routing table in the existing Chord by updating it in a reactive way, but the reactive method had a disadvantage to generate more traffic than the existing Chord if the number of requests per second becomes large. In this paper, we propose an adaptive method of routing table update to reduce the network traffic. In the proposed method, we apply different routing table update method according to the number of request message per second. If the number of request message per second is smaller than some threshold, we apply the reactive method. Otherwsie, we apply the existing Chord method. We perform experiments using Chord simulator (I3) made by UC Berkeley. The experimental results show the performance improvement of the proposed method compared to the existing methods.

An Adaptive Chord for Minimizing Network Traffic in a Mobile P2P Environment (모바일 P2P 환경에서 네트워크 트래픽을 최소화한 적응적인 Chord)

  • Yoon, Young-Hyo;Kwak, Hu-Keun;Kim, Cheong-Ghil;Chung, Kyu-Sik
    • The KIPS Transactions:PartC
    • /
    • v.16C no.6
    • /
    • pp.761-772
    • /
    • 2009
  • A DHT(Distributed Hash Table) based P2P is a method to overcome disadvantages of the existing unstructured P2P method. If a DHT algorithm is used, it can do a fast data search and maintain search efficiency independent of the number of peer. The peers in the DHT method send messages periodically to keep the routing table updated. In a mobile environment, the peers in the DHT method should send messages more frequently to keep the routing table updated and reduce the failure of a request. Therefore, this results in increase of network traffic. In our previous research, we proposed a method to reduce the update load of the routing table in the existing Chord by updating it in a reactive way, but the reactive method had a disadvantage to generate more traffic than the existing Chord if the number of requests per second becomes large. In this paper, we propose an adaptive method of routing table update to reduce the network traffic. In the proposed method, we apply different routing table update method according to the number of request message per second. If the number of request message per second is smaller than some threshold, we apply the reactive method. Otherwsie, we apply the existing Chord method. We perform experiments using Chord simulator (I3) made by UC Berkeley. The experimental results show the performance improvement of the proposed method compared to the existing methods.

An Efficient Web Search Method Based on a Style-based Keyword Extraction and a Keyword Mining Profile (스타일 기반 키워드 추출 및 키워드 마이닝 프로파일 기반 웹 검색 방법)

  • Joo, Kil-Hong;Lee, Jun-Hwl;Lee, Won-Suk
    • The KIPS Transactions:PartD
    • /
    • v.11D no.5
    • /
    • pp.1049-1062
    • /
    • 2004
  • With the popularization of a World Wide Web (WWW), the quantity of web information has been increased. Therefore, an efficient searching system is needed to offer the exact result of diverse Information to user. Due to this reason, it is important to extract and analysis of user requirements in the distributed information environment. The conventional searching method used the only keyword for the web searching. However, the searching method proposed in this paper adds the context information of keyword for the effective searching. In addition, this searching method extracts keywords by the new keyword extraction method proposed in this paper and it executes the web searching based on a keyword mining profile generated by the extracted keywords. Unlike the conventional searching method which searched for information by a representative word, this searching method proposed in this paper is much more efficient and exact. This is because this searching method proposed in this paper is searched by the example based query included content information as well as a representative word. Moreover, this searching method makes a domain keyword list in order to perform search quietly. The domain keyword is a representative word of a special domain. The performance of the proposed algorithm is analyzed by a series of experiments to identify its various characteristic.

Efficient Processing of k-Farthest Neighbor Queries for Road Networks

  • Kim, Taelee;Cho, Hyung-Ju;Hong, Hee Ju;Nam, Hyogeun;Cho, Hyejun;Do, Gyung Yoon;Jeon, Pilkyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.79-89
    • /
    • 2019
  • While most research focuses on the k-nearest neighbors (kNN) queries in the database community, an important type of proximity queries called k-farthest neighbors (kFN) queries has not received much attention. This paper addresses the problem of finding the k-farthest neighbors in road networks. Given a positive integer k, a query object q, and a set of data points P, a kFN query returns k data objects farthest from the query object q. Little attention has been paid to processing kFN queries in road networks. The challenge of processing kFN queries in road networks is reducing the number of network distance computations, which is the most prominent difference between a road network and a Euclidean space. In this study, we propose an efficient algorithm called FANS for k-FArthest Neighbor Search in road networks. We present a shared computation strategy to avoid redundant computation of the distances between a query object and data objects. We also present effective pruning techniques based on the maximum distance from a query object to data segments. Finally, we demonstrate the efficiency and scalability of our proposed solution with extensive experiments using real-world roadmaps.

Application of Self-Adaptive Meta-Heuristic Optimization Algorithm for Muskingum Flood Routing (Muskingum 홍수추적을 위한 자가적응형 메타 휴리스틱 알고리즘의 적용)

  • Lee, Eui Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.7
    • /
    • pp.29-37
    • /
    • 2020
  • In the past, meta-heuristic optimization algorithms were developed to solve the problems caused by complex nonlinearities occurring in natural phenomena, and various studies have been conducted to examine the applicability of the developed algorithms. The self-adaptive vision correction algorithm (SAVCA) showed excellent performance in mathematics problems, but it did not apply to complex engineering problems. Therefore, it is necessary to review the application process of the SAVCA. The SAVCA, which was recently developed and showed excellent performance, was applied to the advanced Muskingum flood routing model (ANLMM-L) to examine the application and application process. First, initial solutions were generated by the SAVCA, and the fitness was then calculated by ANLMM-L. The new value selected by a local and global search was put into the SAVCA. A new solution was generated, and ANLMM-L was applied again to calculate the fitness. The final calculation was conducted by comparing and improving the results of the new solution and existing solutions. The sum of squares (SSQ) was used to calculate the error between the observed and calculated runoff, and the applied results were compared with the current models. SAVCA, which showed excellent performance in the Muskingum flood routing model, is expected to show excellent performance in a range of engineering problems.

A Study on the improvement of ATH surveillance radar to solve the instability of the target velocity (훈련함 탐색레이더 표적 속도 불안정 현상 개선에 관한 연구)

  • Lee, Ji-Hyeog;Shim, Min-Seop
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.8
    • /
    • pp.334-341
    • /
    • 2020
  • The optimum solutions of the instability of the target velocity were studied to solve the case of the target velocity of the ship approaching at a speed of ◯◯knots and deviated by more than ± 10knots, while the surveillance radar rotating speed was varied, while the maximum search range of the radar was evaluated during the operational test & evaluation. The instability of the target velocity did not enable the radar to calculate the information of the target precisely and to degrade the probability of hit and the quality of the target management. The improvement to handle the deviation of the target velocity was optimally determined by using a fishbone diagram to find 9 reasons based on 4M1E, and the algorithm of the target management was identified as the crucial reason. In this study, the improvement was applied to the filter algorithm to stabilize the target velocity in the target tracking management SW by reviewing the current algorithm to find the velocity of the target and recognizing that the problem does not apply to different 𝜶, 𝞫 values when the antenna changed the rotating speed. The ability of the improvement to work was tested on board.

Development of an Eye Cure Protocol for ICU Patients (중환자실 입원 환자의 눈 간호를 위한 근거기반 지침 개발)

  • Yoo, Ji-Soo;Lee, Won-Hee;Kim, So-Sun;Ko, Il-Sun;Oh, Eui-Geum;Chu, Sang-Hui;Lee, Ju-Hee;Kang, Se-Won;Song, Eun-Kyeung;Chang, Soo-Jung;Kim, Bok-Hee;Lee, Jung-Eun
    • Journal of Korean Academy of Fundamentals of Nursing
    • /
    • v.15 no.1
    • /
    • pp.34-44
    • /
    • 2008
  • Purpose: The purpose of this study was to develop an eye care protocol for intensive care unit (ICU) patients. Method: A systematic review was conducted to develop an eye care protocol for ICU patients. Searches were performed using computerized databases (CINAHL, MEDLINE, EBM Review) and citation search from 1996 to January 2007. For the keywords, "eye care", and "randomized controlled trial" were used to identify experimental studies regarding eye care for ICU patients. After reviewing the collected studies, a preliminary eye care protocol algorithm was created. Then, content validity was examined with ophthalmologists and ICU nurses. Results: Six studies were included to serve as a basis for framing of the preliminary algorithm. The final eye care protocol was completed after verifying the preliminary algorithm's content validity. The final eye care protocol was organized in the following manner: 3 items in the assessment stage, 7 items in the no-risk stage, 4 items in the low-risk stage, and 5 items in the high-risk stage. Conclusion: The results indicate that, for ICU patients, nurses can broaden their knowledge regarding ocular diseases, as well as improve their practice-based eye care nursing performance.

  • PDF

Detecting near-duplication Video Using Motion and Image Pattern Descriptor (움직임과 영상 패턴 서술자를 이용한 중복 동영상 검출)

  • Jin, Ju-Kyong;Na, Sang-Il;Jenong, Dong-Seok
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.48 no.4
    • /
    • pp.107-115
    • /
    • 2011
  • In this paper, we proposed fast and efficient algorithm for detecting near-duplication based on content based retrieval in large scale video database. For handling large amounts of video easily, we split the video into small segment using scene change detection. In case of video services and copyright related business models, it is need to technology that detect near-duplicates, that longer matched video than to search video containing short part or a frame of original. To detect near-duplicate video, we proposed motion distribution and frame descriptor in a video segment. The motion distribution descriptor is constructed by obtaining motion vector from macro blocks during the video decoding process. When matching between descriptors, we use the motion distribution descriptor as filtering to improving matching speed. However, motion distribution has low discriminability. To improve discrimination, we decide to identification using frame descriptor extracted from selected representative frames within a scene segmentation. The proposed algorithm shows high success rate and low false alarm rate. In addition, the matching speed of this descriptor is very fast, we confirm this algorithm can be useful to practical application.

Fingerprint Recognition Algorithm using Clique (클릭 구조를 이용한 지문 인식 알고리즘)

  • Ahn, Do-Sung;Kim, Hak-Il
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.2
    • /
    • pp.69-80
    • /
    • 1999
  • Recently, social requirements of personal identification techniques are rapidly expanding in a number of new application ares. Especially fingerprint recognition is the most important technology. Fingerprint recognition technologies are well established, proven, cost and legally accepted. Therefore, it has more spot lighted among the any other biometrics technologies. In this paper we propose a new on-line fingerprint recognition algorithm for non-inked type live scanner to fit their increasing of security level under the computing environment. Fingerprint recognition system consists of two distinct structural blocks: feature extraction and feature matching. The main topic in this paper focuses on the feature matching using the fingerprint minutiae (ridge ending and bifurcation). Minutiae matching is composed in the alignment stage and matching stage. Success of optimizing the alignment stage is the key of real-time (on-line) fingerprint recognition. Proposed alignment algorithm using clique shows the strength in the search space optimization and partially incomplete image. We make our own database to get the generality. Using the traditional statistical discriminant analysis, 0.05% false acceptance rate (FAR) at 8.83% false rejection rate (FRR) in 1.55 second average matching speed on a Pentium system have been achieved. This makes it possible to construct high performance fingerprint recognition system.

  • PDF

A Study on Parameters Estimation of Storage Function Model Using the Genetic Algorithms (유전자 알고리듬을 이용한 저류함수모형의 매개변수 추정에 관한 연구)

  • Park, Bong-Jin;Cha, Hyeong-Seon;Kim, Ju-Hwan
    • Journal of Korea Water Resources Association
    • /
    • v.30 no.4
    • /
    • pp.347-355
    • /
    • 1997
  • In this study, the applicability of genetic algorithms into the parameter estimation of storage function method for flood routing model is investigated. Genetic algorithm is mathematically established theory based on the process of Darwinian natural selection and survival of fittest. It can be represented as a kind of search algorithms for optima point in solution space and make a reach on optimal solutions through performance improvement of assumed model by applying the natural selection of life as mechanical learning province. Flood events recorded in the Daechung dam are selected and used for the parameter estimation and verification of the proposed parameter estimation method by the split sample method. The results are analyzed that the performance of the model are improved including peak discharge and time to peak and shown that the parameter Rsa, and f1 are most sensitive to storage function model. Based on the analysis for estimated parameters and the comparison with the results from experimental equations, the applicability of genetic algorithm is verified and the improvements of those equations will be used for the augmentation of flood control efficiency.

  • PDF