• Title/Summary/Keyword: K-Shortest Paths

Search Result 111, Processing Time 0.021 seconds

An Effective Route Selection Scheme with Considering Traffic Density in VANET

  • An, Do-Sik;Cho, Gi-Hwan
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.6
    • /
    • pp.623-629
    • /
    • 2010
  • A geographical routing protocol is typically utilized for a route selection of VANET. Even if it is conceptually well adapted into VANET, message delivery tends to be unreliable with frequent network partitions, which mainly come from the inherent characteristics such as high mobility and irregular traffic density. In this paper, we deal with a method to enable reliable message delivery with reflecting the traffic density on routing decision. By concatenating the message delivery cost of each of inbetween junction section, $1^{st}$ and $2^{nd}$ shortest paths are initially determined. When it is not possible to deliver the message on a junction on the 1st path, we utilize two novel ideas, that is, letting the message stay on the junction to find out a new relay node, and putting a replicated copy to reach via a detour path. By using the NS-2 network simulator, our method has been examined in terms of message delivery rate and delay. It shows that our method is much efficient than the other method in the low density environment, while it brings similar results in the high density environment.

On Concealing Data-Path Against Eavesdropping in Wireless Networks (무선망에서의 신호도청에 대응하는 데이터 경로 은닉에 관한 연구)

  • Tscha, Yeong-Hwan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.3
    • /
    • pp.433-438
    • /
    • 2020
  • Nodes on a data communication path in a wireless network emit electro-magnetic waves whenever they transmit packets; thus, the path can be exposed and identified with capturing and analyzing a sequence of the signals emitted there. One of countermeasures against a malicious eavesdropper is to let certain nodes mimic the nodes on the data path in sending dummy packets. In this paper we propose a packet transfer protocol which establishes the shortest path between source-destination pair a time and restricts heavy generation of dummy packets. We verify the location-privacy of a node on the communication paths through simulation.

Operating Properties of Resistive Superconducting fault Current Limiters with Various Pattern Shapes

  • Park, Hyo-Sang
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.16 no.12S
    • /
    • pp.1286-1291
    • /
    • 2003
  • Quench behavior of resistive superconducting fault current limiters (SFCLS) with various pattern shapes was investigated. The pattern shapes employed were meander, bi-spiral, and spital shapes of identical line width, gap and margin. SFCLS were fabricated from YBCO thin films grown on two-inch diameter Al$_2$O$_3$ substrates under the same conditions. The total length of current limiting paths was the shortest at the spital shape due to its larger useless space. Inductance component of SFCLs with the spiral shape was around two times as high as those of other two shapes. This is not desirable since impedance characteristics of existing power systems can be changed. Resistance rise of current limiting elements was low at a spiral shape before the whole quench completion, which may act as a disadvantage for simultaneous quench in serial connection between current limiting elements, but the temperature tended to have similar values at higher voltages. On the other hand, hi-spital shape was severe at insulation level between current limiting lines. When these aspects were considered, we concluded that a meander shape was appropriate to design for a resistive SFCL based on thin films except the concentration of electric field at edge areas of strip lines.

Efficient Query Retrieval from Social Data in Neo4j using LIndex

  • Mathew, Anita Brigit
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.2211-2232
    • /
    • 2018
  • The unstructured and semi-structured big data in social network poses new challenges in query retrieval. This requirement needs to be met by introducing quality retrieval time measures like indexing. Due to the huge volume of data storage, there originate the need for efficient index algorithms to promote query processing. However, conventional algorithms fail to index the huge amount of frequently obtained information in real time and fall short of providing scalable indexing service. In this paper, a new LIndex algorithm, which is a heuristic on Lucene is built on Neo4jHA architecture that holds the social network Big data. LIndex is a flexible and simplified adaptive indexing scheme that ascendancy decomposed shortest paths around term neighbors as basic indexing unit. This newfangled index proves to be effectual in query space pruning of graph database Neo4j, scalable in index construction and deployment. A graph query is processed and optimized beyond the traditional Lucene in a time-based manner to a more efficient path method in LIndex. This advanced algorithm significantly reduces query fetch without compromising the quality of results in time. The experiments are conducted to confirm the efficiency of the proposed query retrieval in Neo4j graph NoSQL database.

Fault Diameter of Recursive Circulant $G(2^{m},2^{k})$ (재귀원형군 $G(2^{m},2^{k})$의 고장 지름)

  • 김희철;정호영;박정흠
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.12
    • /
    • pp.665-679
    • /
    • 2002
  • The fault diameter of a graph G is the maximum of lengths of the shortest paths between all two vertices when there are $\chi$(G) - 1 or less faulty vertices, where $\chi$(G) is connectivity of G. In this paper, we analyze the fault diameter of recursive circulant $G(2^m,2^k)$ with $k{\geq}3$. Let $ dia_{m.k}$ denote the diameter of $G(2^m,2^k)$. We show that if $2{\leq}m,2{\leq}k, the fault diameter of $G(2{\leq}m,2{\leq}k)$ is equal to $2^m-2$, and if m=k+1, it is equal to $2^k-1$. It is also shown that for m>k+1, the fault diameter is equal to di a_$m{\neq}1$(mod 2k); otherwise, it is less than or equal to$dia_{m.k+2}$.

Minimum-Cost Path Finding Algorithm in Real-Time For Computer Generated Force (실시간성을 고려한 가상군 최소비용 길 찾기 알고리즘)

  • Han, Chang-Hee;Min, Young-Hye;Park, Sang-Hyuk;Kim, Jai-Hoon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.1
    • /
    • pp.17-25
    • /
    • 2011
  • At the computer games, we can experience a variety of environments using a virtual object. It is similar to that be trained in War-game simulator of the defense. Actual soldiers and a computer-generated virtual group(Computer Generated Force: CGF) in 3-D virtual battlefield environment are training. However, path finding algorithm, one of the techniques of simulation models, to the current level only considers the shortest time path. So, this current level at the special situation of the army in the battlefield for selecting the optimal path is limited. The focus of this paper is to select the least-cost path using the deadline with several different mission conditions(METT+TC). For the only shortest time path algorithm and the least-cost path algorithm using dealine,($d_t$, one of METT+TC elements), Its usefulness is verifying the change of the move spent time(t) for all possible paths and the fighting power of the combat troops(Troops ability, a) through a comparison of the total cost of moves(c(t)). According to the results, when considering the deadline, the proposed algorithm saves about 62.5% of the maximum cost.

Improved Social Network Analysis Method in SNS (SNS에서의 개선된 소셜 네트워크 분석 방법)

  • Sohn, Jong-Soo;Cho, Soo-Whan;Kwon, Kyung-Lag;Chung, In-Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.4
    • /
    • pp.117-127
    • /
    • 2012
  • Due to the recent expansion of the Web 2.0 -based services, along with the widespread of smartphones, online social network services are being popularized among users. Online social network services are the online community services which enable users to communicate each other, share information and expand human relationships. In the social network services, each relation between users is represented by a graph consisting of nodes and links. As the users of online social network services are increasing rapidly, the SNS are actively utilized in enterprise marketing, analysis of social phenomenon and so on. Social Network Analysis (SNA) is the systematic way to analyze social relationships among the members of the social network using the network theory. In general social network theory consists of nodes and arcs, and it is often depicted in a social network diagram. In a social network diagram, nodes represent individual actors within the network and arcs represent relationships between the nodes. With SNA, we can measure relationships among the people such as degree of intimacy, intensity of connection and classification of the groups. Ever since Social Networking Services (SNS) have drawn increasing attention from millions of users, numerous researches have made to analyze their user relationships and messages. There are typical representative SNA methods: degree centrality, betweenness centrality and closeness centrality. In the degree of centrality analysis, the shortest path between nodes is not considered. However, it is used as a crucial factor in betweenness centrality, closeness centrality and other SNA methods. In previous researches in SNA, the computation time was not too expensive since the size of social network was small. Unfortunately, most SNA methods require significant time to process relevant data, and it makes difficult to apply the ever increasing SNS data in social network studies. For instance, if the number of nodes in online social network is n, the maximum number of link in social network is n(n-1)/2. It means that it is too expensive to analyze the social network, for example, if the number of nodes is 10,000 the number of links is 49,995,000. Therefore, we propose a heuristic-based method for finding the shortest path among users in the SNS user graph. Through the shortest path finding method, we will show how efficient our proposed approach may be by conducting betweenness centrality analysis and closeness centrality analysis, both of which are widely used in social network studies. Moreover, we devised an enhanced method with addition of best-first-search method and preprocessing step for the reduction of computation time and rapid search of the shortest paths in a huge size of online social network. Best-first-search method finds the shortest path heuristically, which generalizes human experiences. As large number of links is shared by only a few nodes in online social networks, most nods have relatively few connections. As a result, a node with multiple connections functions as a hub node. When searching for a particular node, looking for users with numerous links instead of searching all users indiscriminately has a better chance of finding the desired node more quickly. In this paper, we employ the degree of user node vn as heuristic evaluation function in a graph G = (N, E), where N is a set of vertices, and E is a set of links between two different nodes. As the heuristic evaluation function is used, the worst case could happen when the target node is situated in the bottom of skewed tree. In order to remove such a target node, the preprocessing step is conducted. Next, we find the shortest path between two nodes in social network efficiently and then analyze the social network. For the verification of the proposed method, we crawled 160,000 people from online and then constructed social network. Then we compared with previous methods, which are best-first-search and breath-first-search, in time for searching and analyzing. The suggested method takes 240 seconds to search nodes where breath-first-search based method takes 1,781 seconds (7.4 times faster). Moreover, for social network analysis, the suggested method is 6.8 times and 1.8 times faster than betweenness centrality analysis and closeness centrality analysis, respectively. The proposed method in this paper shows the possibility to analyze a large size of social network with the better performance in time. As a result, our method would improve the efficiency of social network analysis, making it particularly useful in studying social trends or phenomena.

In Vivo Three-Dimensional Evaluation of the Functional Length of Glenohumeral Ligaments

  • Yang, Chen;Goto, Akira;Sahara, Wataru;Koishi, Hayato;Yoshikawa, Hideki;Sugamoto, Kazuomi
    • The Academic Congress of Korean Shoulder and Elbow Society
    • /
    • 2009.03a
    • /
    • pp.43-43
    • /
    • 2009
  • Glenohumeral ligaments play an important role in stabilizing the shoulder. However, it is impossible to know how they function in vivo during shoulder motion. To help elucidate this stabilizing role, we conducted in vivo three-dimensional kinematics of the normal shoulder joint using a markerless bone-registration technique. Magnetic resonance images of 14 shoulder joints of 7 healthy volunteers were acquired for 7 isometric abduction positions between $0^{\circ}$ and $180^{\circ}$. We then calculated three-dimensional shortest paths between the origin and insertion of each ligament based on anatomical study in each abduction position. At $0^{\circ}$ of abduction, the posterior band of the coracohumeral ligament displayed the maximum length. At $30^{\circ}$ of abduction, the superior glenohumeral ligament displayed the maximum length. At $60^{\circ}$ of abduction, the anterior band of the coracohumeral ligament and the middle glenohumeral ligament displayed the maximum length. At $120^{\circ}$ of abduction, the anterior band of the inferior glenohumeral ligament displayed the maximum length. We think that the maximum length of these results is an important influence on the function of the soft tissue stabilizer.

  • PDF

The implementation of cable path and overfill visualization based on cable occupancy rate in the Shipbuilding CAD (조선 CAD에서 선박의 Cable 점유율을 기반으로 Cable 경로 및 Overfill 가시화 구현)

  • Kim, Hyeon-Jae;Kim, Bong-Gi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.740-745
    • /
    • 2016
  • Cables are installed for tens of thousands of connections between various pieces of equipment to operate and control a commercial ship. The correct shortest-route data is necessary since these are complicated cable installations. Therefore, an overfill interval commonly exists in the shortest paths for cables as estimated by Dijkstra's algorithm, even if this algorithm is generally used. It is difficult for an electrical engineer to find the overfill interval in 3D cable models because the occupancy rate data exist in a data sheet unlinked to three-dimensional (3D) computer-aided design (CAD). The purpose of this study is to suggest a visualization method that displays the cable path and overfill interval in 3D CAD. This method also provides various color visualizations for different overfill ranges to easily determine the overfill interval. This method can reduce cable-installation man-hours from 7,000 to 5,600 thanks to a decreased re-installation rate, because the cable length calculation's accuracy is raised through fast and accurate reviews based on 3D cable visualization. As a result, material costs can also be reduced.

Time-distance Accessibility Computation of Seoul Bus System based on the T-card Transaction Big Databases (교통카드 빅데이터 기반의 서울 버스 교통망 시간거리 접근성 산출)

  • Park, Jong Soo;Lee, Keumsook
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.18 no.4
    • /
    • pp.539-555
    • /
    • 2015
  • This study proposes the methodology for measuring the time-distance accessibility on the Seoul bus system based on the T-card transaction databases and analyzes the results. T-card transaction databases contain the time/space information of each passenger's locations and times of the departure, transfers, and destination. We introduce the bus network graph and develop the algorithms for time-distance accessibility measurement. We account the average speed based on each passenger's get-in and getoff information in the T-card data as well as the average transfer time from the trip chain transactions. Employing the modified Floyd APSP algorithm, the shortest time distance between each pair of bus stops has been accounted. The graph-theoretic nodal accessibility has been given by the sum of the inverse time distance to all other nodes on the network. The results and spatial patterns are analyzed. This study is the first attempt to measure the time-distance accessibility for such a large transport network as the Seoul bus system consists of 34,934 bus stops on the 600 bus routes, and each bus route can have different properties in terms of speed limit, number of lanes, and traffic signal systems, and thus has great significance in the accessibility measurement studies.

  • PDF