• 제목/요약/키워드: CLuster Approach

검색결과 642건 처리시간 0.035초

무선 센서 네트워크에서의 머신러닝을 활용한 에너지 효율적인 클러스터 라우팅 방안 연구 (Energy Efficient Cluster Routing Method Using Machine Learning in WSN)

  • 강미영
    • 한국정보통신학회논문지
    • /
    • 제27권1호
    • /
    • pp.124-130
    • /
    • 2023
  • 본 논문에서는 K-평균 군집화 알고리즘을 사용하는 머신러닝을 활용하여 무선 센서 네트워크에서 센서 노드의 에너지 효율성을 향상시켜 네트워크의 수명을 향상시키고자 한다. 무선 센서 네트워크는 물리적인 센서로 배터리를 포함한 물리적 장치를 무선 네트워크로 구성한 것으로 센서 노드의 특성 상 에너지 소비를 최소화하여 네트워크 수 명을 최대화하기 위해 모든 자원을 효율적으로 사용해야 한다. 클러스터기반 접근 방식은 상대적으로 많은 수의 노 들로 구성된 그룹을 관리하는데 사용된다. 제안된 프로토콜에서는 기존의 LEACH 알고리즘을 개선하여 클러스터 기반 접근방식과 위치기반 접근 방식을 사용하여 클러스터 헤드를 선정하는 클러스터링 알고리즘을 제안한다. 개선 하고자 했던 성능 결과를 Matlab 시뮬레이션을 이용하여 측정하였다. 실험 결과를 통해 에너지 효율성 부분에 대해 K-means 클러스터링을 적용함으로써 에너지 효율이 개선되어 젠체 네트워크의 수명이 연장됨을 확인한다.

SEC Approach for Detecting Node Replication Attacks in Static Wireless Sensor Networks

  • Sujihelen, L.;Jayakumar, C.;Senthilsingh, C.
    • Journal of Electrical Engineering and Technology
    • /
    • 제13권6호
    • /
    • pp.2447-2455
    • /
    • 2018
  • Security is more important in many sensor applications. The node replication attack is a major issue on sensor networks. The replicated node can capture all node details. Node Replication attacks use its secret cryptographic key to successfully produce the networks with clone nodes and also it creates duplicate nodes to build up various attacks. The replication attacks will affect in routing, more energy consumption, packet loss, misbehavior detection, etc. In this paper, a Secure-Efficient Centralized approach is proposed for detecting a Node Replication Attacks in Wireless Sensor Networks for Static Networks. The proposed system easily detects the replication attacks in an effective manner. In this approach Secure Cluster Election is used to prevent from node replication attack and Secure Efficient Centralized Approach is used to detect if any replicated node present in the network. When comparing with the existing approach the detection ratio, energy consumption performs better.

리눅스 클러스터 화일 시스템 SANiqueTM의 오류 회복 기법 (Failure Recovery in the Linux Cluster File System SANiqueTM)

  • 이규웅
    • 정보처리학회논문지A
    • /
    • 제8A권4호
    • /
    • pp.359-366
    • /
    • 2001
  • This paper overviews the design of SANique$^{TM}$ -a shred file system for Linux cluster based on SAN environment. SANique$^{TM}$ has the capability of transferring user data from network-attached SAN disks to client applcations directly without the control of centralized file server system. The paper also presents the characteristics of each SANique$^{TM}$ subsystem: CFM(Cluster File Manager), CVM(Cluster Volume Manager), CLM(Cluster Lock Manager), CBM(Cluster Buffer Manager) and CRM(Cluster Recovery Manager). Under the SANique$^{TM}$ design layout, then, the syndrome of '||'&'||'quot;split-brain'||'&'||'quot; in shared file system environments is described and defined. The work first generalizes and illustrates possible situations in each of which a shared file system environment may split into two or more pieces of separate brain. Finally, the work describes the SANique$^{TM}$ approach to the given "split-brain"problem using SAN disk named "split-brain" and develops the overall recovery procedure of shared file systems.

  • PDF

Nonlinear damage detection using linear ARMA models with classification algorithms

  • Chen, Liujie;Yu, Ling;Fu, Jiyang;Ng, Ching-Tai
    • Smart Structures and Systems
    • /
    • 제26권1호
    • /
    • pp.23-33
    • /
    • 2020
  • Majority of the damage in engineering structures is nonlinear. Damage sensitive features (DSFs) extracted by traditional methods from linear time series models cannot effectively handle nonlinearity induced by structural damage. A new DSF is proposed based on vector space cosine similarity (VSCS), which combines K-means cluster analysis and Bayesian discrimination to detect nonlinear structural damage. A reference autoregressive moving average (ARMA) model is built based on measured acceleration data. This study first considers an existing DSF, residual standard deviation (RSD). The DSF is further advanced using the VSCS, and then the advanced VSCS is classified using K-means cluster analysis and Bayes discriminant analysis, respectively. The performance of the proposed approach is then verified using experimental data from a three-story shear building structure, and compared with the results of existing RSD. It is demonstrated that combining the linear ARMA model and the advanced VSCS, with cluster analysis and Bayes discriminant analysis, respectively, is an effective approach for detection of nonlinear damage. This approach improves the reliability and accuracy of the nonlinear damage detection using the linear model and significantly reduces the computational cost. The results indicate that the proposed approach is potential to be a promising damage detection technique.

An Energy Efficient Clustering Algorithm in Mobile Adhoc Network Using Ticket Id Based Clustering Manager

  • Venkatasubramanian, S.;Suhasini, A.;Vennila, C.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권7호
    • /
    • pp.341-349
    • /
    • 2021
  • Many emerging mobile ad-hoc network application communications are group-oriented. Multicast supports group-oriented applications efficiently, particularly in a mobile environment that has a limited bandwidth and limited power. Energy effectiveness along with safety are 2 key problem in MANET design. Within this paper, MANET is presented with a stable, energy-efficient clustering technique. In this proposed work advanced clustering in the networks with ticket ID cluster manager (TID-CMGR) has formed in MANET. The proposed routing scheme makes secure networking the shortest route possible. In this article, we propose a Cluster manager approach based on TICKET-ID to address energy consumption issues and reduce CH workload. TID-CMGR includes two mechanism including ticket ID controller, ticketing pool, route planning and other components. The CA (cluster agent) shall control and supervise the functions of nodes and inform to TID-CMGR. The CH conducts and transfers packets to the network nodes. As the CH energy level is depleted, CA elects the corresponding node with elevated energy values, and all new and old operations are simultaneously stored by CA at this time. A simulation trial for 20 to 100 nodes was performed to show the proposed scheme performance. The suggested approach is used to do experimental work using the NS- simulator. TIDCMGR is compared with TID BRM and PSO to calculate the utility of the work proposed. The assessment shows that the proposed TICKET-ID scheme achieves 90 percent more than other current systems.

The evolution of a late-type galaxy in a Coma-like cluster

  • Hwang, Jeong-Sun;Park, Changbom;Banerjee, Arunima
    • 천문학회보
    • /
    • 제41권2호
    • /
    • pp.64.1-64.1
    • /
    • 2016
  • We study the evolution of a late-type galaxy (LTG) in a rich cluster environment by using N-body/SPH simulations. To do that we perform a set of simulations of a LTG falling in a Coma-like cluster and also the LTG colliding with early-type galaxies (ETGs) multiple times in the cluster environment. We use a catalog of the Coma cluster in order to estimate the typical number of collisions and the closest approach distances that a LTG would experience in the cluster. We investigate the cold gas depletion and star formation quenching of our LTG model influenced by the hot cluster gas as well as the hot halo gas of the colliding ETGs.

  • PDF

Regional Innovation Policy and Venturing Clusters in Japan

  • Kendo Masayuki
    • 기술혁신연구
    • /
    • 제14권2호
    • /
    • pp.167-181
    • /
    • 2006
  • This paper reviews regional innovation policy in Japan. 'Technopolis' policy, the first technology-based regional development policy in the world, was implemented in Japan. Nonetheless, technology-based regional endogenous development did not occur. Then, regional technology transfer was pursued. In order to make use of universities and public research institutes in a region for development, university-industry collaboration and cross-over, such as university spin-offs, were promoted. Within this background, new technology-based regional development policies have been introduced based on a cluster approach. These policies are the knowledge cluster Initiative and the industrial cluster program. However, existing companies have difficulty in carrying out innovation. This paper argues that a cluster to create new start-ups that carry out innovation is also needed and explains a new concept of venturing cluster. Based on this new cluster concept, this paper analyzes the situation of Sapporo in Japan, where many university spin-offs are being created in the biotechnology field.

  • PDF

On the origin of tidal features in cluster galaxies

  • Choi, Hoseung;Yi, Sukyoung K.
    • 천문학회보
    • /
    • 제38권2호
    • /
    • pp.40.2-40.2
    • /
    • 2013
  • Although galaxy mergers are thought to play an important role in forming elliptical galaxies, mergers in galaxy clusters have drawn less attention compared to mergers in field environments because galaxies with high peculiar velocities are unlikely to merge with each other. However, comparable fractions of merger features in cluster galaxies have been reported from deep imaging of Abell clusters, suggesting the relevance of mergers in the transformation of cluster early-type galaxies (Sheen et al. 2012). As a more direct approach to understanding the origin of tidal features in clusters, we perform hydrodynamic re-simulations on a cluster of galaxies. Based on mock observation images of the simulated cluster galaxies, we construct and analyze the cluster early-type galaxy sample in a consistent manner with Sheen et al. 2012. We find that the fraction of tidal feature from the simulated cluster is comparable to that of the observation. Evolutionary history of the galaxies with merger features shows that most of the mergers responsible for the merger features in the present originate from outside the cluster more than 2Gyrs ago. We also find that many of the galaxies with tidal features show correlations with subgroups in the cluster. All these results suggest that merger features in the cluster are due to preprocessing before accretion into the cluster.

  • PDF

주성분분석 및 군집분석을 이용한 컨테이너항만의 분류 (Classification of International Container Ports by Using Principal Component Analysis and Cluster Analysis)

  • 문성혁;이준구
    • 한국항만학회지
    • /
    • 제13권1호
    • /
    • pp.11-26
    • /
    • 1999
  • The subject of port efficiency is one of the important issues facing port authorities and policy makers today. A number of studies have been undertaken which compare ports in terms of their efficiency. But any port comparison can only be valid and meaningful if a port’s efficiency is compared with a similar port. The main objective of this paper is to introduce a systematic approach to identifying similar ports based on the technique of principal component analysis and cluster analysis. And it seeks to identify the most important factors underlying the port classification. Lack of awareness of which factors differentiate ports has resulted in an unnecessary collection of data which are of limited use in port classification. This paper has identified five groupings of similar ports within which port comparision can be justifiably made. This approach can be used for any future port comparision.

  • PDF

An Analysis of Replication Enhancement for a High Availability Cluster

  • Park, Sehoon;Jung, Im Y.;Eom, Heonsang;Yeom, Heon Y.
    • Journal of Information Processing Systems
    • /
    • 제9권2호
    • /
    • pp.205-216
    • /
    • 2013
  • In this paper, we analyze a technique for building a high-availability (HA) cluster system. We propose what we have termed the 'Selective Replication Manager (SRM),' which improves the throughput performance and reduces the latency of disk devices by means of a Distributed Replicated Block Device (DRBD), which is integrated in the recent Linux Kernel (version 2.6.33 or higher) and that still provides HA and failover capabilities. The proposed technique can be applied to any disk replication and database system with little customization and with a reasonably low performance overhead. We demonstrate that this approach using SRM increases the disk replication speed and reduces latency by 17% and 7%, respectively, as compared to the existing DRBD solution. This approach represents a good effort to increase HA with a minimum amount of risk and cost in terms of commodity hardware.