• Title/Summary/Keyword: Design tree

Search Result 1,049, Processing Time 0.024 seconds

Optimal Design of Irrigation Pipe Network with Multiple Sources

  • Lyu, Heui-Jeong;Ahn, Tae-Jin
    • Magazine of the Korean Society of Agricultural Engineers
    • /
    • v.39 no.2
    • /
    • pp.9-18
    • /
    • 1997
  • Abstract This paper presents a heuristic method for optimal design of water distribution system with multiple sources and potential links. In multiple source pipe network, supply rate at each source node affects the total cost of the system because supply rates are not uniquely determined. The Linear Minimum Cost Flow (LMCF) model may be used to a large scale pipe network with multiple sources to determine supply rate at each source node. In this study the heuristic method based on the LMCF is suggested to determine supply rate at each source node and then to optimize the given layout. The heuristic method in turn perturbs links in the longest path of the network to obtain the supply rates which make the optimal design of the pipe network. Once the best tree network is obtained, the frequency count of reconnecting links by considering link failure is in turn applied to form loop to enhance the reliability of the best tree network. A sample pipe network is employed to test the proposed method. The results show that the proposed method can yield a lower cost design than the LMCF alone and that the proposed method can be efficiently used to design irrigation systems or rural water distribution systems.

  • PDF

Design and Implementation of a Main-Memory Database System for Real-time Mobile GIS Application (실시간 모바일 GIS 응용 구축을 위한 주기억장치 데이터베이스 시스템 설계 및 구현)

  • Kang, Eun-Ho;Yun, Suk-Woo;Kim, Kyung-Chang
    • The KIPS Transactions:PartD
    • /
    • v.11D no.1
    • /
    • pp.11-22
    • /
    • 2004
  • As random access memory chip gets cheaper, it becomes affordable to realize main memory-based database systems. Consequently, reducing cache misses emerges as the most important issue in current main memory databases, in which CPU speeds have been increasing at 60% per year, compared to the memory speeds at 10% per you. In this paper, we design and implement a main-memory database system for real-time mobile GIS. Our system is composed of 5 modules: the interface manager provides the interface for PDA users; the memory data manager controls spatial and non-spatial data in main-memory using virtual memory techniques; the query manager processes spatial and non-spatial query : the index manager manages the MR-tree index for spatial data and the T-tree index for non-spatial index : the GIS server interface provides the interface with disk-based GIS. The MR-tree proposed propagates node splits upward only if one of the internal nodes on the insertion path has empty space. Thus, the internal nodes of the MR-tree are almost 100% full. Our experimental study shows that the two-dimensional MR-tree performs search up to 2.4 times faster than the ordinary R-tree. To use virtual memory techniques, the memory data manager uses page tables for spatial data, non- spatial data, T-tree and MR-tree. And, it uses indirect addressing techniques for fast reloading from disk.

Sediment discharge assessment and stable channel analysis using Model Tree of data mining for Naesung Stream (데이터 마이닝의 Model Tree를 활용한 내성천의 유사량 산정 및 안정하도 평가)

  • Jang, Eun-Kyung;Ji, Un;Ahn, Myeonghui
    • Journal of Korea Water Resources Association
    • /
    • v.51 no.11
    • /
    • pp.999-1009
    • /
    • 2018
  • A Model Tree technique of data mining was applied to derive optimal equations for sediment discharge assessment based on the measured sediment data and then to evaluate stable channel design for Naesung Stream. The sediment discharge formula as a function of channel width, velocity, depth, slope and median grain diameter which was developed by a Model Tree technique with sediment discharge data measured in Korean River had a high goodness-of-fit between measured and calculated results. In case of the sediment discharge formula as a function of channel width, velocity, depth and median grain diameter which was developed by a Model Tree technique with sediment discharge data only measured in Naesung Stream represented the highest goodness-of-fit. Two types of sediment discharge formulas were applied to evaluate stable channel analysis for Yonghyeol Station of Naesung Stream. As a result, bed erosion was expected in the study section compared to the current section. It was also presented that the be slope might be changed to be a milder slope than the current slope to reach equilibrium condition in the long term.

Design of an Algorithmic Debugging Technique for Java Language (자바 언어를 위한 알고리즈믹 디버깅 기술의 설계)

  • Kouh, Hoon-Joon;Yoo, Weon-Hee
    • The KIPS Transactions:PartA
    • /
    • v.11A no.1
    • /
    • pp.97-108
    • /
    • 2004
  • This paper proposes to use an algorithmic debugging technique for locating logical errors in Java programs. The algorithmic debugging is a semi-automated debugging technique that builds an execution tree from a source program and locates logical errors, if any, included in the program from the execution tree with top-down method. So, it is very important to build a suitable execution tree from the various programming languages. In this paper we propose the method for building an execution tree iron Java programs and walk through an example. This approach could reduce the number of interactions between a user and a debugging system than the traditional step-wise debugging technique.

Security Model for Tree-based Routing in Wireless Sensor Networks: Structure and Evaluation

  • Almomani, Iman;Saadeh, Maha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.4
    • /
    • pp.1223-1247
    • /
    • 2012
  • The need for securing Wireless Sensor Networks (WSNs) is essential especially in mission critical fields such as military and medical applications. Security techniques that are used to secure any network depend on the security requirements that should be achieved to protect the network from different types of attacks. Furthermore, the characteristics of wireless networks should be taken into consideration when applying security techniques to these networks. In this paper, energy efficient Security Model for Tree-based Routing protocols (SMTR) is proposed. In SMTR, different attacks that could face any tree-based routing protocol in WSNs are studied to design a security reference model that achieves authentication and data integrity using either Message Authentication Code (MAC) or Digital Signature (DS) techniques. The SMTR communication and processing costs are mathematically analyzed. Moreover, SMTR evaluation is performed by firstly, evaluating several MAC and DS techniques by applying them to tree-based routing protocol and assess their efficiency in terms of their power requirements. Secondly, the results of this assessment are utilized to evaluate SMTR phases in terms of energy saving, packet delivery success ratio and network life time.

HRKT: A Hierarchical Route Key Tree based Group Key Management for Wireless Sensor Networks

  • Jiang, Rong;Luo, Jun;Wang, Xiaoping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.8
    • /
    • pp.2042-2060
    • /
    • 2013
  • In wireless sensor networks (WSNs), energy efficiency is one of the most essential design considerations, since sensor nodes are resource constrained. Group communication can reduce WSNs communication overhead by sending a message to multiple nodes in one packet. In this paper, in order to simultaneously resolve the transmission security and scalability in WSNs group communications, we propose a hierarchical cluster-based secure and scalable group key management scheme, called HRKT, based on logic key tree and route key tree structure. The HRKT scheme divides the group key into cluster head key and cluster key. The cluster head generates a route key tree according to the route topology of the cluster. This hierarchical key structure facilitates local secure communications taking advantage of the fact that the nodes at a contiguous place usually communicate with each other more frequently. In HRKT scheme, the key updates are confined in a cluster, so the cost of the key updates is reduced efficiently, especially in the case of massive membership changes. The security analysis shows that the HRKT scheme meets the requirements of group communication. In addition, performance simulation results also demonstrate its efficiency in terms of low storage and flexibility when membership changes massively.

Design and Analysis of the Log Authentication Mechanism based on the Merkle Tree (Merkle Tree 기반의 로그인증 메커니즘 설계 및 분석)

  • Lee, Jung yeob;Park, Chang seop
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.3-13
    • /
    • 2017
  • As security log plays important roles in various fields, the integrity of log data become more and more important. Especially, the stored log data is an immediate target of the intruder to erase his trace in the system penetrated. Several theoretical schemes to guarantee the forward secure integrity have been proposed, even though they cannot provide the integrity of the log data after the system is penetrated. Authentication tags of these methods are based on the linear-hash chain. In this case, it is difficult to run partial validation and to accelerate generating and validating authentication tags. In this paper, we propose a log authentication mechanism, based on Mekle Tree, which is easy to do partial validation and able to apply multi threading.

THE APPLICATION OF PSA TECHNIQUES TO THE VITAL AREA IDENTIFICATION OF NUCLEAR POWER PLANTS

  • HA JAEJOO;JUNG WOO SIK;PARK CHANG-KUE
    • Nuclear Engineering and Technology
    • /
    • v.37 no.3
    • /
    • pp.259-264
    • /
    • 2005
  • This paper presents a vital area identification (VAI) method based on the current fault tree analysis (FTA) and probabilistic safety assessment (PSA) techniques for the physical protection of nuclear power plants. A structured framework of a top event prevention set analysis (TEPA) application to the VAI of nuclear power plants is also delineated. One of the important processes for physical protection in a nuclear power plant is VAI that is a process for identifying areas containing nuclear materials, structures, systems or components (SSCs) to be protected from sabotage, which could directly or indirectly lead to core damage and unacceptable radiological consequences. A software VIP (Vital area Identification Package based on the PSA method) is being developed by KAERI for the VAI of nuclear power plants. Furthermore, the KAERI fault tree solver FTREX (Fault Tree Reliability Evaluation eXpert) is specialized for the VIP to generate the candidates of the vital areas. FTREX can generate numerous MCSs for a huge fault tree with the lowest truncation limit and all possible prevention sets.

Design and Implementation of the dynamic hashing structure for indexing the current positions of moving objects (이동체의 현재 위치 색인을 위한 동적 해슁 구조의 설계 및 구현)

  • 전봉기
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.6
    • /
    • pp.1266-1272
    • /
    • 2004
  • Location-Based Services(LBS) give rise to location-dependent queries of which results depend on the positions of moving objects. Because positions of moving objects change continuously, indexes of moving object must perform update operations frequently for keeping the changed position information. Existing spatial index (Grid File, R-Tree, KDB-tree etc.) proposed as index structure to search static data effectively. There are not suitable for index technique of moving object database that position data is changed continuously. In this paper, I propose a dynamic hashing index that insertion/delete costs are low. The dynamic hashing structure is that apply dynamic hashing techniques to combine a hash and a tree to a spatial index. The results of my extensive experiments show the dynamic hashing index outperforms the $R^$ $R^*$-tree and the fixed grid.

Temporal Database Management Testbed (시간 지원 데이타 베이스 관리 시험대)

  • Kim, Dong-Ho;Jeon, Geun-Hwan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.1 no.1
    • /
    • pp.1-13
    • /
    • 1994
  • The Temporal Database Management Testbed supports valid and transaction time. In this paper, we discuss the design and implementation of a testbed of a temporal database management system in main memory. The testbed consists of a syntactic analyzer, a semantic analyzer, a code generator, and an interpreter. The syntactic analyzer builds a parse tree from a temporal query. The semantic analyzer then checks it for correctness against the system catalog. The code generator builds an execution tree termed ann update network. We employ an incremental view materialization for the execution tree. After building the execution tree, the interpreter activates each node of the execution tree. Also, the indexing structure and the concurrency control are discussed in the testbed.

  • PDF