• Title/Summary/Keyword: TREE MANAGEMENT

Search Result 1,805, Processing Time 0.03 seconds

Preconfigured Multicast Delivery Tree in Mobile IP (Mobile IP에서 기설정된 전달 트리를 이용한 멀티캐스팅 방안)

  • C.B. Chun;C.H. Kang;Lee, J.H.;Kwon, K.H.;Kim, B.S.;Hong, J.P.
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10e
    • /
    • pp.76-78
    • /
    • 2002
  • Multicasting over mobile IP network becomes more important with the increasing needs of supporting multimedia services in mobile network. The IETF has suggested two approaches which are remote subscription and bidirectional tunneling for supporting mobility management in multicasting over mobile IP. But these protocols have problems - the frequent reconstruction of multicast delivery tree, packet less during handoff, convergence problem, and so on. In this paper, we propose to use preconfiguration of multicast delivery tree when mobile host enters the foreign network. It will decrease the frequency of multicast delivery tree reconstruction, and reduce the packet loss during handoff, Also the multicast delivery tree maintained by Keep Alive messages makes the signaling overload of networks diminished.

  • PDF

Feasibility Study on the Fault Tree Analysis Approach for the Management of the Faults in Running PCR Analysis (PCR 과정의 오류 관리를 위한 Fault Tree Analysis 적용에 관한 시범적 연구)

  • Lim, Ji-Su;Park, Ae-Ri;Lee, Seung-Ju;Hong, Kwang-Won
    • Applied Biological Chemistry
    • /
    • v.50 no.4
    • /
    • pp.245-252
    • /
    • 2007
  • FTA (fault tree analysis), an analytical method for system failure management, was employed in the management of faults in running PCR analysis. PCR is executed through several processes, in which the process of PCR machine operation was selected for the analysis by FTA. The reason for choosing the simplest process in the PCR analysis was to adopt it as a first trial to test a feasibility of the FTA approach. First, fault events-top event, intermediate event, basic events-were identified by survey on expert knowledge of PCR. Then those events were correlated deductively to build a fault tree in hierarchical structure. The fault tree was evaluated qualitatively and quantitatively, yielding minimal cut sets, structural importance, common cause vulnerability, simulation of probability of occurrence of top event, cut set importance, item importance and sensitivity. The top event was 'errors in the step of PCR machine operation in running PCR analysis'. The major intermediate events were 'failures in instrument' and 'errors in actions in experiment'. The basic events were four events, one event and one event based on human errors, instrument failure and energy source failure, respectively. Those events were combined with Boolean logic gates-AND or OR, constructing a fault tree. In the qualitative evaluation of the tree, the basic events-'errors in preparing the reaction mixture', 'errors in setting temperature and time of PCR machine', 'failure of electrical power during running PCR machine', 'errors in selecting adequate PCR machine'-proved the most critical in the occurrence of the fault of the top event. In the quantitative evaluation, the list of the critical events were not the same as that from the qualitative evaluation. It was because the probability value of PCR machine failure, not on the list above though, increased with used time, and the probability of the events of electricity failure and defective of PCR machine were given zero due to rare likelihood of the events in general. It was concluded that this feasibility study is worth being a means to introduce the novel technique, FTA, to the management of faults in running PCR analysis.

Military Group Key Management for Mobile and Secure Multicast Communications (이동성과 보안성 있는 멀티케스트 통신을 위한 군용 그룹 키 관리)

  • Jung, Youn-Chan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6B
    • /
    • pp.977-983
    • /
    • 2010
  • In mobile and secure military networks, full-meshed IPSec tunnels, which do correspond to not physical links but logical links between each IPSec device and its peer, are required to provide multicast communications. All IPSec devices need support in changing IPSec tunnels by a way of using a multicast group key which is updated dynamically. Tactical terminals, which often constitute a group, need also secure multicast communications in the same group members. Then, the multicast group key is required to be updated dynamically in order to support group members' mobility. This paper presents challenging issues of designing a secure and dynamic group key management of which concept is based on the Diffie-Hellman (DH) key exchange algorithm and key trees. The advantage of our dynamic tree based key management is that it enables the dynamic group members to periodically receive status information from every peer members and effectively update a group key based on dynamically changing environments.

Studies on the Tree Growth and Soil Environmental Characteristics in the Planting Zone on the Back Slope of Dam (댐체 비탈면 녹화지역의 수목 생장 및 토양환경 특성에 관한 연구)

  • Bahn, Gwon-Soo
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.24 no.3
    • /
    • pp.85-98
    • /
    • 2021
  • In this study, the characteristics of tree growth and soil environment were analyzed at 5 sites that had been planted on the back slope of dam for more than 15 years in Korea. First, as a result of investigating the growth of 15 trees planted on the back slope of the dam, the average height was 10.6m, diameter at roots was 27.3cm, and DBH was 22.9cm, showing good growth status of most of the trees. In particular, the growth levels of pine, hackberry, and oak were similar or better than those of general forests and artificial ground. As a result of excavating and investigating the roots of trees, horizontal roots grew well in the left and right directions of the back slope of the dam, and the growth of vertical roots was insufficient. Currently, the roots of trees do not directly affect dam safety, but they may continue to grow in the long term and interfere with dam management. Second, the physicochemical characteristics of the soil on the back slope of dam were generally above the intermediate level in terms of landscape design standards, and were similar to those of the domestic forest soil. Therefore, although it was judged to be suitable for plant growth, isolation of the site, soil acidification, and nutrient imbalance may affect tree growth and forest health in the long term. Through this study, it was possible to confirm the potential and applicability of planting area on the back slope of dam as an ecological base. Continuous monitoring is required for safety management and ecological value of dams in the future, and through this, it will be possible to secure the feasibility of planting trees on the slopes of new or existing dams and improving management.

Tree Diversity Changes over a Decade (2003-2013) in Four Inland Tropical Dry Evergreen Forest Sites on the Coromandel Coast of India

  • Pandian, Elumalai;Parthasarathy, Narayanaswamy
    • Journal of Forest and Environmental Science
    • /
    • v.32 no.2
    • /
    • pp.219-235
    • /
    • 2016
  • Forest tree diversity inventory and its periodical monitoring are important to understand changes in tree population structure and to provide information useful for biodiversity conservation and reserve management. In a long-term forest dynamics program in Indian tropical dry evergreen forest, this communication deals with tree diversity changes at decadal interval. The initial inventory of tree diversity was carried out in 2003, in four tropical dry evergreen forest sites - (much disturbed sites Shanmuganathapuram - SP and Araiyapatti - AP and moderately disturbed sites - Karisakkadu - KR and Maramadakki - MM) on the Coromandel Coast of peninsular India, by establishing four 1ha permanent plots, one in each site. In 2013, the four plots were re-inventoried for tree diversity (${\geq}10cm\;gbh$) changes which yielded 56 species from 46 genera and 26 families. The studied forest sites are threatened by disturbance due to multiple reasons; cutting of trees inside of the forest, grazing by goats, construction of temple approach road, and some aspects cultural attachment of local people like constructing new, additional strctures of temple by denuding a portion of forest etc.. Tree species richness over a decade increased by four species in site SP, two species in site AP, and one species in site KR, but decreased by one species in site MM. Tree density decreased drastically by 480 (28.92%) and 102 (12.63%) stems $ha^{-1}$ respectively in sites SP and AP, but moderately increased by 82 (12.09%) stems $ha^{-1}$ in site KR and 26 (3.46%) stems $ha^{-1}$ in site MM. Tree basal area declined in site KR from $21.6m^2$ to $20.26m^2ha^{-1}$ and in site SP from 21.1 to $20.38m^2ha^{-1}$, but increased from $19.1m^2$ to $19.43m^2$ and from 15.5 to $18.63m^2ha^{-1}$ in sites AP and MM respectively. Three tree species (Allophylus serratus, Maytenus emarginata and Ehretia pubescens) were lost out of the 57 species recorded in 2003, and two species (Jatropha gossypiifolia and Streblus asper) were new additions in ten years. The long-term forest monitoring data will be valuable to understand forest dynamics and for conservation and management of this and similar tropical forests.

Digital Hologram Watermarking using Quad-tree Fresnelet Transform (Quad-tree Fresnelet 변환을 이용한 디지털 홀로그램 워터마킹)

  • Seo, Young Ho;Koo, Ja Myung;Lee, Yoon Hyuk;Kim, Dong Wook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.79-89
    • /
    • 2013
  • This paper proposes a watermarking scheme to protect ownership of a digital hologram, an ultra-high value-added content. It performs pre-defined levels of quad-tree Fresnelet transforms. The relationship among the same-positional-blocks is extracted as the digital pre-watermark. For the relationship, we use properties of a digital hologram that a hologram pixel retains all the information of the object and that the same size of partial holograms reconstructs the same size of object but different in their view points. Also we mix a set of private data with the pre-watermark and the result is encrypted by a block cipher algorithm with a private key. Experimental results showed that the proposed scheme is very robust for the various malicious and non-malicious attacks. Also because it extracts the watermarking data instead of inserting, the watermarking process does not harm the original hologram data. So, it is expected to be used effectively for invisible and robust watermark for digital holograms.

A Development for Short-term Stock Forecasting on Learning Agent System using Decision Tree Algorithm (의사결정 트리를 이용한 학습 에이전트 단기주가예측 시스템 개발)

  • 서장훈;장현수
    • Journal of the Korea Safety Management & Science
    • /
    • v.6 no.2
    • /
    • pp.211-229
    • /
    • 2004
  • The basis of cyber trading has been sufficiently developed with innovative advancement of Internet Technology and the tendency of stock market investment has changed from long-term investment, which estimates the value of enterprises, to short-term investment, which focuses on getting short-term stock trading margin. Hence, this research shows a Short-term Stock Price Forecasting System on Learning Agent System using DTA(Decision Tree Algorithm) ; it collects real-time information of interest and favorite issues using Agent Technology through the Internet, and forms a decision tree, and creates a Rule-Base Database. Through this procedure the Short-term Stock Price Forecasting System provides customers with the prediction of the fluctuation of stock prices for each issue in near future and a point of sales and purchases. A Human being has the limitation of analytic ability and so through taking a look into and analyzing the fluctuation of stock prices, the Agent enables man to trace out the external factors of fluctuation of stock market on real-time. Therefore, we can check out the ups and downs of several issues at the same time and figure out the relationship and interrelation among many issues using the Agent. The SPFA (Stock Price Forecasting System) has such basic four phases as Data Collection, Data Processing, Learning, and Forecasting and Feedback.

Customer Churning Forecasting and Strategic Implication in Online Auto Insurance using Decision Tree Algorithms (의사결정나무를 이용한 온라인 자동차 보험 고객 이탈 예측과 전략적 시사점)

  • Lim, Se-Hun;Hur, Yeon
    • Information Systems Review
    • /
    • v.8 no.3
    • /
    • pp.125-134
    • /
    • 2006
  • This article adopts a decision tree algorithm(C5.0) to predict customer churning in online auto insurance environment. Using a sample of on-line auto insurance customers contracts sold between 2003 and 2004, we test how decision tree-based model(C5.0) works on the prediction of customer churning. We compare the result of C5.0 with those of logistic regression model(LRM), multivariate discriminant analysis(MDA) model. The result shows C5.0 outperforms other models in the predictability. Based on the result, this study suggests a way of setting marketing strategy and of developing online auto insurance business.

BADA-$IV/I^2R$: Design & Implementation of an Efficient Content-based Image Retrieval System using a High-Dimensional Image Index Structure (바다-$IV/I^2R$: 고차원 이미지 색인 구조를 이용한 효율적인 내용 기반 이미지 검색 시스템의 설계와 구현)

  • Kim, Yeong-Gyun;Lee, Jang-Seon;Lee, Hun-Sun;Kim, Wan-Seok;Kim, Myeong-Jun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.2S
    • /
    • pp.678-691
    • /
    • 2000
  • A variety of multimedia applications require multimedia database management systems to manage multimedia data, such as text, image, and video, as well as t support content-based image or video retrieval. In this paper we design and implement a content-based image retrieval system, BADA-IV/I$^2$R(Image Information Retrieval), which is developed based on BADA-IV multimedia database management system. In this system image databases can be efficiently constructed and retrieved with the visual features, such as color, shape, and texture, of image. we extend SQL statements to define image query based on both annotations and visual features of image together. A high-dimensional index structure, called CIR-tree, is also employed in the system to provide an efficient access method to image databases. We show that BADA-IV/I$^2$R provides a flexible way to define query for image retrieval and retrieves image data fast and effectively: the effectiveness and performance of image retrieval are shown by BEP(Bull's Eye Performance) that is used to measure the retrieval effectiveness in MPEG-7 and comparing the performance of CIR-tree with those of X-tree and TV-tree, respectively.

  • PDF

Hash Tree based Communication Protocol in V2X Environments Including Internet of Vehicles for Providing Secure Vehicular Communication Services (차량인터넷을 포함한 V2X 환경에서 안전한 차량 통신 서비스 제공을 위한 해시 트리 기반 통신 프로토콜)

  • Jin, Byungwook;Cha, Siho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.1
    • /
    • pp.27-34
    • /
    • 2018
  • Various messages generated in vehicles are transmitted based on the wireless telecommunication which is a core technology of vehicle to everything (V2X). However, the hackers attack them upon penetration to the system and network to cause the generation of users' inconveniences for vehicular communication. Moreover, huge damage could be occurred in terms of physical and materialistic areas if the users in the vehicles were attacked in the communication environment. Therefore, this study was to design the safe communication protocol using hash tree technique in the V2X environments. Using hash tree technique, processes of issuing certificate and registration and communication protocol were designed, and safety analysis was performed on the attacking technique which is occurred in the existing vehicles. Approximately 62% of decrease in the capacity analysis was found upon comparative analysis of telecommunication processes with the system to issue the certificate which is used in the existing vehicles.