• Title/Summary/Keyword: Shortest path algorithm

Search Result 438, Processing Time 0.022 seconds

A study on the Application of Optimal Evacuation Route through Evacuation Simulation System in Case of Fire (화재발생 시 대피시뮬레이션 시스템을 통한 최적대피경로 적용에 관한 연구)

  • Kim, Daeill;Jeong, Juahn;Park, Sungchan;Go, Jooyeon;Yeom, Chunho
    • Journal of the Society of Disaster Information
    • /
    • v.16 no.1
    • /
    • pp.96-110
    • /
    • 2020
  • Recently, due to global warming, it is easily exposed to various disasters such as fire, flood, and earthquake. In particular, large-scale disasters have continuously been occurring in crowded areas such as traditional markets, facilities for the elderly and children, and public facilities where various people stay. Purpose: This study aims to detect a fire occurred in crowded facilities early in the event to analyze and provide an optimal evacuation route using big data and advanced technology. Method: The researchers propose a new algorithm through context-aware 3D object model technology and A* algorithm optimization and propose a scenario-based optimal evacuation route selection technique. Result: Using the HPA* E algorithm, the evacuation simulation in the event of a fire was reproduced as a 3D model and the optimal evacuation route and evacuation time were calculated for each scenario. Conclusion: It is expected to reduce fatalities and injuries through the evacuation induction technique that enables evacuation of the building in the shortest path by analyzing in real-time via fire detection sensors that detects the temperature, flame, and smoke.

Geometric LiveWire and Geometric LiveLane for 3D Meshes (삼차원 메쉬에 대한 기하학 라이브와이어와 기하학 라이브레인)

  • Yoo Kwan-Hee
    • The KIPS Transactions:PartA
    • /
    • v.12A no.1 s.91
    • /
    • pp.13-22
    • /
    • 2005
  • Similarly to the edges defined in a 2D image, we can define the geometric features representing the boundary of the distinctive parts appearing on 3D meshes. The geometric features have been used as basic primitives in several applications such as mesh simplification, mesh deformation, and mesh editing. In this paper, we propose geometric livewire and geometric livelane for extracting geometric features in a 3D mesh, which are the extentions of livewire and livelane methods in images. In these methods, approximate curvatures are adopted to represent the geometric features in a 3D mesh and the 3D mesh itself is represented as a weighted directed graph in which cost functions are defined for the weights of edges. Using a well-known shortest path finding algorithm in the weighted directed graph, we extracted geometric features in the 3D mesh among points selected by a user. In this paper, we also visualize the results obtained from applying the techniques to extracting geometric features in the general meshes modeled after human faces, cows, shoes, and single teeth.

A Study of SSA Routing Protocol using Utilization Metric in Ad Hoc Networks (Ad Hoc 환경에서의 Utilization Metric을 이용한 SSA 라우팅 프로토콜에 관한 연구)

  • Ji Jong-Bok;Park Joo-Ha;Lee Kaug-Seok;Song Joo-Seok
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.543-550
    • /
    • 2005
  • Many routing algorithms, proposed for ad-hoc wireless networks, we based on source routing scheme and shortest path route has short lifetime especially in highly dense ad-hoc wireless networks. So some routing protocols such as SSA and ABR are considering the link stability and try finding more stable route. In this paper we propose a new routing algorithm considering utilization metric based on SSA routing algerian in Ad-Hoc networks. To reduce the bottleneck by specific metric of SSA, proposed scheme makes load balancing in networks by distributing the connections to several routes. For the evaluation of the performance we compare our scheme with existent routing protocol AODV and SSA. And the results, obtained using the ns-2 network simulation platform, show good performance that reduced the number of reconstructions remarkably by distributing the whole traffic to several routes when there are several stable routes.

Location Based Reliable Routing Protocol for Tactical Mobile Ad-Hoc Networks (전술 모바일 애드 혹 네트워크를 위한 위치 기반의 신뢰성 제공을 위한 라우팅 방법)

  • Youn, Myungjune;Kang, Tae Hun;Jeon, HahnEarl;Lee, Jaiyong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1148-1161
    • /
    • 2012
  • Recently, developments in the field of communication and network technologies induced new paradigm in the defense weapon system. As a consequence, military authorities develop the Tactical Information Communication Network(TICN) system to adapt to the changing paradigm. One of the most important functions of TICN is real-time communication. As a result, TICN system needs to receive real-time information from the battlefield, and the key technology to support these features is MANET(Mobile Ad-Hoc Network) routing protocol. In this paper, we analyze problems of the shortest path scheme in tactical Ad-Hoc networks, which is widely used in common Ad-Hoc networks. We propose efficient routing protocol for tactical MANET by considering the environment of small combat units, such as node position, speed and data size. The proposed algorithm shows reliable data transfer and low latency in battlefield.

Highly-reliable Multi-path Protocol by MANET (MANET에 의한 신뢰성 높은 다중 경로 프로토콜)

  • Lee, Yang-Min;Lee, Jae-Kee
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.4
    • /
    • pp.352-362
    • /
    • 2008
  • In the mobile ad hoc network, network nodes are continuously capable of movement, but have battery limitations and these characteristics of MANET cause network link failure. Therefore, when performing ubiquitous services with the application of MANET, a technique is required to improve the packet transmission rates as to enable continuous packet transmission while flexibly adapting to topology changes caused by the mobility of nodes. In this paper, we are proposing PAOMDV(Possibility based AOMDV) and OLSR-ME(OLSR with Modified Energy Efficiency) which are mixed-type protocols to solve the problem for design a more efficient protocol. Especially by classifying mobile ad hoc networks as clusters, OLSR-ME protocol is implemented on communication within the clusters, while PAOMDV is used in protocols between clusters. In addition, a selection algorithm for forwarding nodes that responding packet relays in the case of increased hops was proposed for designing a more efficient protocol than existing protocols. We verified the performance of the proposed protocols through a comparative experiment with AODV, AOMDV, ZRP, and the existing protocols. We confirmed the results of the experiment revealed that the proposed protocol had the best packet transmission rate, the shortest delay between nodes, and showed better results in routing overhead.

Virtual Network Embedding through Security Risk Awareness and Optimization

  • Gong, Shuiqing;Chen, Jing;Huang, Conghui;Zhu, Qingchao;Zhao, Siyi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.2892-2913
    • /
    • 2016
  • Network virtualization promises to play a dominant role in shaping the future Internet by overcoming the Internet ossification problem. However, due to the injecting of additional virtualization layers into the network architecture, several new security risks are introduced by the network virtualization. Although traditional protection mechanisms can help in virtualized environment, they are not guaranteed to be successful and may incur high security overheads. By performing the virtual network (VN) embedding in a security-aware way, the risks exposed to both the virtual and substrate networks can be minimized, and the additional techniques adopted to enhance the security of the networks can be reduced. Unfortunately, existing embedding algorithms largely ignore the widespread security risks, making their applicability in a realistic environment rather doubtful. In this paper, we attempt to address the security risks by integrating the security factors into the VN embedding. We first abstract the security requirements and the protection mechanisms as numerical concept of security demands and security levels, and the corresponding security constraints are introduced into the VN embedding. Based on the abstraction, we develop three security-risky modes to model various levels of risky conditions in the virtualized environment, aiming at enabling a more flexible VN embedding. Then, we present a mixed integer linear programming formulation for the VN embedding problem in different security-risky modes. Moreover, we design three heuristic embedding algorithms to solve this problem, which are all based on the same proposed node-ranking approach to quantify the embedding potential of each substrate node and adopt the k-shortest path algorithm to map virtual links. Simulation results demonstrate the effectiveness and efficiency of our algorithms.

Personalized Itinerary Recommendation System based on Stay Time (체류시간을 고려한 여행 일정 추천 시스템)

  • Park, Sehwa;Park, Seog
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.1
    • /
    • pp.38-43
    • /
    • 2016
  • Recent developments regarding transportation technology have positioned travel as a major leisure activity; however, trip-itinerary planning remains a challenging task for tourists due to the need to select Points of Interest (POI) for visits to unfamiliar cities. Meanwhile, due to the GPS functions on mobile devices such as smartphones and tablet PCs, it is now possible to collect a user's position in real time. Based on these circumstances, our research on an automatic itinerary-planning system to simplify the trip-planning process was conducted briskly. The existing studies that include research on itinerary schedules focus on an identification of the shortest path in consideration of cost and time constraints, or a recommendation of the most-popular travel route in the destination area; therefore, we propose a personalized itinerary-recommendation system for which the stay-time preference of the individual user is considered as part of the personalized service.

Multicast Routing On High Speed networks using Evolutionary Algorithms (진화 알고리즘을 이용한 초고속 통신망에서의 멀티캐스트 경로배정 방법에 관한 연구)

  • Lee, Chang-Hoon;Zhang, Byoung-Tak;Ahn, Sang-Hyun;Kwak, Ju-Hyun;Kim, Jae-Hoon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.3
    • /
    • pp.671-680
    • /
    • 1998
  • Network services, such as teleconferencing, remote diagnostics and education, and CSCW require multicasting. Multicast routing methods can be divided into two categories. One is the shortest path tree method and the other is the minimal Steiner tree method. The latter has an advantage over the former in that only one Steiner tree is needed for a group. However, finding a minimal Steiner tree is an NP-complete problem and it is necessary to find an efficient heuristic algorithm. In this paper, we present an evolutionary optimization method for finding minimal Steiner trees without sacrificing too much computational efforts. In particular, we describe a tree-based genetic encoding scheme which is in sharp constast with binary string representations usually adopted in convetional genetic algorithms. Experiments have been performed to show that the presented method can find optimal Steiner trees for given vetwork configurations. Comparitivie studies have shown that the evolutionary method finds on average a better solution than other conventional heustric algorithms.

  • PDF

A Batch Processing Algorithm for Moving k-Nearest Neighbor Queries in Dynamic Spatial Networks

  • Cho, Hyung-Ju
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.4
    • /
    • pp.63-74
    • /
    • 2021
  • Location-based services (LBSs) are expected to process a large number of spatial queries, such as shortest path and k-nearest neighbor queries that arrive simultaneously at peak periods. Deploying more LBS servers to process these simultaneous spatial queries is a potential solution. However, this significantly increases service operating costs. Recently, batch processing solutions have been proposed to process a set of queries using shareable computation. In this study, we investigate the problem of batch processing moving k-nearest neighbor (MkNN) queries in dynamic spatial networks, where the travel time of each road segment changes frequently based on the traffic conditions. LBS servers based on one-query-at-a-time processing often fail to process simultaneous MkNN queries because of the significant number of redundant computations. We aim to improve the efficiency algorithmically by processing MkNN queries in batches and reusing sharable computations. Extensive evaluation using real-world roadmaps shows the superiority of our solution compared with state-of-the-art methods.

A Study on Generating Public Library Service Areas Considering User Access Patterns (이용자의 접근 패턴을 고려한 공공도서관 서비스 영역 생성 연구)

  • Woojin Kang;Jongwook Lee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.34 no.3
    • /
    • pp.89-107
    • /
    • 2023
  • Public libraries should plan and provide services that satisfy various needs of the local community users. In order to understand library users, it is essential first to grasp the service areas of libraries. The current service areas of public libraries are primarily set based on administrative boundaries of the areas where the libraries are located, which limits the consideration of actual user access patterns to the libraries. In this study, we aim to create service areas that incorporate the transportation and geographical characteristics of the library's surroundings and reflect the access patterns of library users. Specifically, we utilized street network data from 502 libraries in 7 metropolitan cities to determine the travel distance and time from user locations, considering gradients, to the libraries. Subsequently, we applied the shortest path algorithm to generate service areas within a 30-minute walking or driving range. As a result, we confirmed that there are differences in the service area patterns of libraries depending on topographical factors, and this better reflects the realistic conditions of library access compared to service areas based on straight-line distances. This method of generating service areas contributes to a more accurate understanding of library users' numbers, characteristics, and needs.