• Title/Summary/Keyword: Flooding Algorithm

Search Result 139, Processing Time 0.025 seconds

Efficient Signal Filling Method Using Watershed Algorithm for MRC-based Image Compression (MRC 기반의 영상 부호화를 위한 분수령 알고리즘을 이용한 효과적인 신호 채움 기법)

  • Park, Sang-Hyo;Lee, Si-Woong
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.2
    • /
    • pp.21-30
    • /
    • 2015
  • Image coding based on mixed raster content model generates don't care regions (DCR) in foreground and background layers, and its overall coding performance is greatly affected by region filling methods for DCRs. Most conventional methods for DCR filling fail in utilizing the local signal properties in hole regions and thus the high frequency components in non-DCR regions are reflected into DCR after signal filling. In addition, further high frequency components are induced to the filled signal because of signal discontinuities in the boundary of DCR. To solve this problem, a new DCR filling algorithm using the priority-based adaptive region growing is proposed in this paper. The proposed method uses the watershed algorithm and the flooding priority of each pixel for region filling is determined from the degree of smoothness in the neighborhood area. By growing the filled region into DCR based on the computed priority, the expansion of high-textured area can be minimized which can improve the overall coding performance. Experimental results show that the proposed method outperforms conventional algorithms.

Clustering and Routing Algorithm for QoS Guarantee in Wireless Sensor Networks (무선 센서 네트워크에서 QoS 보장을 위한 클러스터링 및 라우팅 알고리즘)

  • Kim, Soo-Bum;Kim, Sung-Chun
    • The KIPS Transactions:PartC
    • /
    • v.17C no.2
    • /
    • pp.189-196
    • /
    • 2010
  • The LEACH does not use flooding method for data transmission and this makes low power consumption. So performance of the WSN is increased. On the other hand, QoS based algorithm which use restricted flooding method in WSN also achieves low power consuming rate by reducing the number of nodes that are participated in routing path selection. But when the data is delivered to the sink node, the LEACH choose a routing path which has a small hop count. And it leads that the performance of the entire network is worse. In the paper we propose a QoS based energy efficient clustering and routing algorithm in WSN. I classify the type of packet with two classes, based on the energy efficiency that is the most important issue in WSN. We provide the differentiated services according to the different type of packet. Simulation results evaluated by the NS-2 show that proposed algorithm extended the network lifetime 2.47 times at average. And each of the case in the class 1 and class 2 data packet, the throughput is improved 312% and 61% each.

Development of a Flood Disaster Evacuation Map Using Two-dimensional Flood Analysis and BIM Technology (2차원 침수해석과 BIM 기술을 활용한 홍수재난 대피지도 작성)

  • Jeong, Changsam
    • Journal of Korean Society of Disaster and Security
    • /
    • v.13 no.2
    • /
    • pp.53-63
    • /
    • 2020
  • In this study, the two-dimensional flow analysis model Hydro_AS-2D model was used to simulate the situation of flooding in Seongsangu and Uichang-gu in Changwon in the event of rising sea levels and extreme flooding, and the results were expressed on three-dimensional topography and the optimal evacuation path was derived using BIM technology. Climate change significantly affects two factors in terms of flood damage: rising sea levels and increasing extreme rainfall ideas. The rise in sea level itself can not only have the effect of flooding coastal areas and causing flooding, but it also raises the base flood level of the stream, causing the rise of the flood level throughout the stream. In this study, the rise of sea level by climate change, the rise of sea level by storm tidal wave by typhoon, and the extreme rainfall by typhoon were set as simulated conditions. The three-dimensional spatial information of the entire basin was constructed using the information of topographical space in Changwon and the information of the river crossing in the basic plan for river refurbishment. Using BIM technology, the target area was constructed as a three-dimensional urban information model that had information such as the building's height and location of the shelter on top of the three-dimensional topographical information, and the results of the numerical model were expressed on this model and used for analysis for evacuation planning. In the event of flooding, the escape route is determined by an algorithm that sets the path to the shelter according to changes in the inundation range over time, and the set path is expressed on intuitive three-dimensional spatial information and provided to the user.

Development of Safety Assessment Algorithm for Submerged Electrical Utilities (침수전기설비 안전성 평가 알고리즘 개발)

  • Jung, Jong-Wook;Jung, Jin-Soo;Lim, Yong-Bae;Bae, Seok-Myung;Kim, Joon-Bum
    • Proceedings of the KIEE Conference
    • /
    • 2006.07a
    • /
    • pp.454-455
    • /
    • 2006
  • This paper describes the safety assessment algorithm applied for the underground electrical utilities submerged due to flooding. In implementing the algorithm, several factors pertaining to utility safety were introduced into the process flow, and safety weight was given to each factor. It is considered that this algorithm can ensure the safety of electrical utilities installed underground when they are submerged.

  • PDF

QoS-based RWA Algorithm for providing QoS Services in the Next Generation Internet based on DWDM (DWDM 기반의 차세대 인터넷에서 QoS서비스 제공을 위한 QoS-based RWA 알고리즘)

  • 배정현;송현수;김성운;김영부;조기성;이현진
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.12
    • /
    • pp.27-37
    • /
    • 2003
  • In the next generation Internet(NGI) based on dense wavelength division multiplexing(DWDM) technology, QoS RWA considering various QoS parameters of DWDM networks is regard as one of the key issues in providing real-time multimedia services. However, finding a qualified path meeting multi-constraints is generally NP-complete problem. It is insufficient for QoS RWA researches in DWDM networks that must consider QoS parameter as well as wavelength-continuity constraint. This paper proposes qualified path routing (QPR) algorithm with minimum computation and implementation complexity based on flooding method to accomplish QoS routing and wavelength assignment (RWA). We also introduce a QoS-based RWA mechanism considering multi-constraint such as optical signal quality attributes, survivability and wavelength-continuity constraint combined with proposed routing algorithm. Simulation results show superior efficiency of the proposed algorithms in terms of blocking probability, routing overhead and survivability ratio.

A Novel Application-Layer DDoS Attack Detection A1gorithm based on Client Intention (사용자 의도 기반 응용계층 DDoS 공격 탐지 알고리즘)

  • Oh, Jin-Tae;Park, Dong-Gue;Jang, Jong-Soo;Ryou, Jea-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.39-52
    • /
    • 2011
  • An application-layer attack can effectively achieve its objective with a small amount of traffic, and detection is difficult because the traffic type is very similar to that of legitimate users. We have discovered a unique characteristic that is produced by a difference in client intention: Both a legitimate user and DDoS attacker establish a session through a 3-way handshake over the TCP/IP layer. After a connection is established, they request at least one HTTP service by a Get request packet. The legitimate HTTP user waits for the server's response. However, an attacker tries to terminate the existing session right after the Get request. These different actions can be interpreted as a difference in client intention. In this paper, we propose a detection algorithm for application layer DDoS attacks based on this difference. The proposed algorithm was simulated using traffic dump files that were taken from normal user networks and Botnet-based attack tools. The test results showed that the algorithm can detect an HTTP-Get flooding attack with almost zero false alarms.

On the Improvement of Location Aided Routing in Mobile Ad-hoc Networks (이동 애드혹 네트워크를 위한 개선된 위치기반 라우팅에 관한 연구)

  • Nam, Seung-Min;Paik, Je-Hyup;Kim, Young-Beom
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.105-108
    • /
    • 2005
  • Recently, there have been active research efforts on devising efficient routing algorithms utilizing location information in ad-hoc mobile networks. In this paper, we propose a new method to improve the performance of the widely recognized Location Aided Routing (LAR) algorithm. To this end, we suggest the concept of accessible zone combined with the basic two schemes associated with LAR algorithm. Through the proposed algorithm, we can confine the flooding area within accessible zone, thereby reducing the routing delay.

  • PDF

Flood Search Algorithm with MFDL Path in Circuit-Switched Networks (회선 교환망에서 MFDL 경로를 이용한 Flood Search 알고리즘)

  • 박영철;이상철;은종관
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.3
    • /
    • pp.360-371
    • /
    • 1993
  • Flood search algorithm is known to be an effective routing mechanism for tactical application, since it provides high degree of survivability and robustness. But it is known that it has significant drawbacks with respect to the network efficiency [1]. We consider a tactical circuit-switched grid network with a maximum of four links and two priority classes of voice traffic, Using the minimum first-derivative length (MFDL) path, we improve the blocking probability performance of the circuit-switched network without increasing the call set-up time and processor loading of the algorithm.

  • PDF

A field-based Routing Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 필드기반 경로 설정 방법)

  • Lee, Jin-Kwan;Lee, Jong-Chan;Park, Sang Joon;Park, Ki Hong;Choi, Hyung Il
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.117-126
    • /
    • 2009
  • The recent interest in sensor networks has led to a number of routing schemes that use the limited resources available at sensor nodes more efficiently. These schemes typically try to find the minimum energy path to optimize energy usage at a node. Some schemes, however, are prone to unbalance of the traffic and energy. To solve this problem, we propose a novel solution: a gradient-field approach which takes account of the minimum cost data delivery, energy consumption balancing, and traffic equalization. We also modify the backoff-based cost field setup algorithm to establish our gradient-field based sensor network and give the algorithm. Simulation results show that the overhead of routing establishment obtained by our algorithm is much less than the one obtained by Flooding. What's more, our approach guarantees the basic Quality of Service (QoS) without extra spending.

Scenario Analysis Technology for Flood Risk Management in the Taihu Basin

  • Changwei, Hu
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2010.05a
    • /
    • pp.140-148
    • /
    • 2010
  • The Taihu Basin is located in the east coast of China, where the threats of frequent floods have induced construction of massive, complex, hierarchical flood defense systems over the interconnected river networks. Digital modeling of flooding processes and quantitative damage assessment still remain challenging due to such complexity. The current research uses an integrated approach to meet this challenge by combining multiple types of models within a GIS platform. A new algorithm is introduced to simulate the impacts of the flood defense systems, especially the large number of polders, on floods distributions and damages.

  • PDF