• Title/Summary/Keyword: Loop Tree

Search Result 74, Processing Time 0.027 seconds

A Presentation on the Manual Hydraulic Calculation Method of the Loop Type Fire Sprinkler System (Loop형 스프링클러 설비의 수리계산 방법에 대한 제시)

  • Jeong, Keesin
    • Fire Science and Engineering
    • /
    • v.29 no.1
    • /
    • pp.73-79
    • /
    • 2015
  • There are three kinds of design method of the fire sprinkler systems. Grid type is connected all branch as a trapezoid. Loop type is connected cross-mains like circle. The last one is a tree type most commonly used. Grid type needs computer program to calculate the friction loss and flow rate apart from very simple form. In loop type, manual calculation is possible. Design engineer can draw up and calculate the demands without computer program. Because water supplies two direction in loop type, friction loss is smaller than tree type. Water distribution in operation area is uniform because of the small differences of sprinklers discharge pressure. Loop type is superior to tree type in respect of total pressure and flow rate. Using the small diameter pipe, the labor and construction cost will be decreased in the end. Loop type sprinkler design is rarely laid out because design engineers don't know the method. This paper is intended to inform that the loop type is better than the tree type in performance and economic point of view. And also this paper intend to use the loop type easily and widely.

A Looping Problem in the Tree-Based Mobility Management for Mobile IP Supported Ad Hoc Networks

  • Han, Trung-Dinh;Oh, Hoon
    • Journal of Communications and Networks
    • /
    • v.13 no.4
    • /
    • pp.385-392
    • /
    • 2011
  • A loop can take place in the process of managing tree topology for mobility management of mobile nodes in infrastructure-based mobile ad hoc networks. The formation of a loop degrades an effective bandwidth of the wireless network by passing an identical message repeatedly within the same loop. Therefore, the loop should be resolved to revert the system back to the normal state. In this paper, we propose a simple and novel mechanism that detects and resolves a loop quickly by tracking the depth of trees. The mobility management approach that employs the loop resolution method is evaluated comparatively with the original tree-based one and the hybrid one. It is shown that the proposed approach far outperforms the other approaches, and it is robust against the rapid changes in network topology.

Implementation of Loop Peeling in CTOC (CTOC에서 루프 벗기기 구현)

  • Kim, Ki-Tae;Kim, Je-Min;Yoo, Weon-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.27-35
    • /
    • 2008
  • The CTOC framework was implemented to efficiently perform analysis and optimization of the Java bytecode that is often being used lately. In order to analyze and optimize the bytecode from the CTOC, the eCFG was first generated. Due to the bytecode characteristics of difficult analysis, the existing bytecode was expanded to be suitable for control flow analysis. and the control flow graph was drawn. We called eCFG(extended Control Flow Graph). Furthermore, the eCFG was converted into the SSA Form for a static analysis. Many loops were found in the conversion program. The previous CTOC performed conversion directly into the SSA Form without processing the loops. However, processing the loops prior to the SSA Form conversion allows more efficient generation of the SSA Form. This paper examines the process of finding the loops prior to converting the eCFG into the SSA Form In order to efficiently process the loops, and exhibits the procedures for generating the loop tree.

  • PDF

A Top-down based Control Tree Construction Mechanism for Reliable Multicast Transport Protocols (신뢰적인 멀티캐스트 전송 프로토콜을 위한 Top-Down 기반의 제어 트리 구축 방안)

  • Kim, Eun-Sook;Koh, Seok-Joo;Kang, Shin-Gak;Choe, Jong-Won
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.611-620
    • /
    • 2001
  • To meet the requirements of reliable service for various applications, a Reliable Multicast Transport Protocol should be implemented over IP Multicast where currently best-effort service is provided. Among the current researches, hierarchical tree-based mechanism has been proposed and actively studied. This mechanism is known to provide high scalability as well as reliability, but needs an additional tree configuring mechanism for building an efficient logical tree in transport layer. Bottom-up approach has been used for creating such a tree. This method has benefits from parallel tree construction for receivers, while it has some drawbacks such that it does not guarantee a loop-free tree and brings heavy message overhead during tree creation process. Therefore, this paper proposes a top-down based mechanism for constructing a control tree, which can guarantee loop-freeness by step-wise mannered tree building. From experimental simulations, it shows that the proposed mechanism has less message overhead. It is recommended that the bottom-up and the proposed top-down will be selectively used in real networks, according to the requirements of the concerned multicast applications.

  • PDF

Implementation of DYLAM-3 to Core Uncovery Frequency Estimation in Mid-Loop Operation

  • Kim, Dohyoung;Chang hyun Chung;Moosung Jae
    • Nuclear Engineering and Technology
    • /
    • v.30 no.6
    • /
    • pp.531-540
    • /
    • 1998
  • The DYLAM-3 code which overcomes the limitation of event tree/fault tree was applied to LOOP (Loss of Off-site Power) in the mid-loop operation employing HEPs (Human Error Probabilities) supplied by the ASEP (Accident Sequence Evaluation Program) and the SEPLOT (Systematic Evaluation Procedure for Low power/shutdown Operation Task) procedure in this study. Thus the time history of core uncovery frequency during the mid-loop operation was obtained. The sensitivity calculations in the operator's actions to prevent core uncovery under LOOP in the mid-loop operation were carried out. The analysis using the time dependent HEP was performed on the primary feed & bleed which has the most significant effect on core uncovery frequency. As the result, the increment of frequency is shown after 200 minutes duration of simulation conditions. This signifies the possibility of increment in risk after 200 minutes. The primary feed & bleed showed the greatest impact on core uncovery frequency and the recovery of the SCS (Shutdown Cooling System) showed the least impact. Therefore the efforts should be taken on the primary feed & bleed to reduce the core uncovery frequency in the mid-loop operation. And the capability of DYLAM-3 in applying to the time dependent concerns could be demonstrated.

  • PDF

Genetic Diversity of mtDNA D-loop and Maternal Origin of Three Chinese Native Horse Breeds

  • Zhang, Tao;Lu, Hongzhao;Chen, Chen;Jiang, Hai;Wu, Sanqiao
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.25 no.7
    • /
    • pp.921-926
    • /
    • 2012
  • In order to protect the genetic resource of native horse breeds, the genetic diversity of mitochondrial DNA (mtDNA) D-loop of three native horse breeds in western China were investigated. Forty-three 600 bp mtDNA D-loop sequences were analyzed by PCR and sequencing techniques, 33 unique haplotypes with 70 polymorphic sites were detected in these horses, which account for 11.67% of 600 bp sequence analyzed, showing the abundant genetic diversity of the three native horse breeds in western China. The Neighbour-Joining (NJ) phylogenetic tree based on 247 bp of 43 D-loop sequences demonstrated the presence of seven major lineages (A to G), indicating that the three native horse breeds in western China originated from multiple maternal origins. Consistent with the front, the NJ phylogenetic tree based on 600 bp of mtDNA D-loop sequences of 43 Chinese western native horses and 81 sequences of six horse breeds from GenBank indicated that the three horse breeds had distributed into the seven major lineages (A to G). The structure of the phylogenic tree is often blurred because the variation in a short segment of the mitochondrial genome is often accompanied by high levels of recurrent mutations. Consequently, longer D-loop sequences are helpful in achieving a higher level of molecular resolution in horses.

Design of a Multiband Frequency Selective Surface

  • Kim, Dong-Ho;Choi, Jae-Ick
    • ETRI Journal
    • /
    • v.28 no.4
    • /
    • pp.506-508
    • /
    • 2006
  • A frequency selective surface (FSS), whose unit cell consists of a ternary tree loop loaded with a modified tripole, is proposed to block multiple frequency bands. Target frequency bands correspond to Korean personal communication services, cellular mobile communication, and 2.4 GHz industrial, scientific, and medical bands. Through the adjustment of inter-element and inter-unit cell gaps, and adjustment of the length of elements, we present an FSS design method that makes the precise tuning of multiple resonance frequencies possible. Additionally, to verify the validity of our approach, simulation results obtained from a commercial software tool and experimental data are also presented.

  • PDF

A Simulation of Bridge using the Spanning Tree Protocol (스패닝 트리 프로토콜을 이용한 브릿지 시뮬레이션)

  • Lee, Sook-Young;Lee, Eun-Wha;Lee, Mee-Jeong;Chae, Ki-Joon;Choi, Kil-Young;Kang, Hun
    • Journal of the Korea Society for Simulation
    • /
    • v.6 no.2
    • /
    • pp.45-57
    • /
    • 1997
  • MAC (media access control) bridge is used to interconnect separate LANs and to relay frames between the BLANs (bridged LANs). Bridge architecture consists of MAC entity, MAC relay entity and bridge protocol entity protocol entity and performs learning, filtering and forwarding functions using filtering database. In this paper, we simulate these functions of bridge and the STP (spanning tree protocol). The STP derives an active topology from an arbitrarily connected BLAN. Our simulation model assumes a BLAN consisted of three bridge forming a closed loop. In order to remove the loop, each bridge process exchanges configruation BPDU (bridge protocol data unit0 with other bridge processes connected to the bridge itself. To simulate the communication between bridges, we implement the IPC (inter-process communication) server using message queues. Our simulation results show that the assumed BLAN contains no closed loop and then there is no alternative route and no unnecessary traffic.

  • PDF

A Route Repair Scheme for Reducing DIO Poisoning Overhead in RPL-based IoT Networks (RPL 기반 IoT 네트워크에서 DIO Poisoning 오버헤드를 감소시키는 경로 복구 방법)

  • Lee, Sung-Jun;Chung, Sang-Hwa
    • Journal of KIISE
    • /
    • v.43 no.11
    • /
    • pp.1233-1244
    • /
    • 2016
  • In the IoT network environments for LLNs(Low power and Lossy networks), IPv6 Routing Protocol for Low Power and Lossy networks(RPL) has been proposed by IETF(Internet Engineering Task Force). The goal of RPL is to create a directed acyclic graph, without loops. As recommended by the IETF standard, RPL route recovery mechanisms in the event of a failure of a node should avoid loop, loop detection, DIO Poisoning. In this process, route recovery time and control message might be increased in the sub-tree because of the repeated route search. In this paper, we suggested RPL route recovery method to solve the routing overhead problem in the sub-tree during a loss of a link in the RPL routing protocol based on IoT wireless networks. The proposed method improved local repair process by utilizing a route that could not be selected as the preferred existing parents. This reduced the traffic control packet, especially in the disconnected node's sub tree. It also resulted in a quick recovery. Our simulation results showed that the proposed RPL local repair reduced the recovery time and the traffic of control packets of RPL. According to our experiment results, the proposed method improved the recovery performance of RPL.

A Study on the Dynamic Analysis of Multibody System by the Relative Joint Coordinate Method (상대이음좌표방법을 이용한 다물체 시스템의 동역학적 해석에 관한 연구)

  • 이동찬;배대성;한창수
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.18 no.8
    • /
    • pp.1974-1984
    • /
    • 1994
  • This paper presents a relative coordinate formulation for constrained mechanical systems. Relative coordinates are defined along degrees of freedom of a joint. Graph theoretic analyses are performed to identify topological paths in mechanical systems. Cut constraints are generated to handle closed loop systems. Equations of motion are derived in the Cartesian space and transformed to the joint space. Relative generalized coordinates are corrected to satisfy the cut constraints by a parametrizatiom method.