• Title/Summary/Keyword: Tree Management System

Search Result 501, Processing Time 0.025 seconds

Economic Design of Tree Network Using Tabu List Coupled Genetic Algorithms (타부 리스트가 결합된 유전자 알고리즘을 이용한 트리형 네트워크의 경제적 설계)

  • Lee, Seong-Hwan;Lee, Han-Jin;Yum, Chang-Sun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.35 no.1
    • /
    • pp.10-15
    • /
    • 2012
  • This paper considers an economic design problem of a tree-based network which is a kind of computer network. This problem can be modeling to be an objective function to minimize installation costs, on the constraints of spanning tree and maximum traffic capacity of sub tree. This problem is known to be NP-hard. To efficiently solve the problem, a tabu list coupled genetic algorithm approach is proposed. Two illustrative examples are used to explain and test the proposed approach. Experimental results show evidence that the proposed approach performs more efficiently for finding a good solution or near optimal solution in comparison with a genetic algorithm approach.

Dynamic Cell Leveling to Support Location Based Queries in R-trees (R-tree에서 위치 기반 질의를 지원하기 위한 동적 셀 레벨링)

  • Jung, Yun-Wook;Ku, Kyong-I;Kim, Yoo-Sung
    • Journal of Korea Spatial Information System Society
    • /
    • v.6 no.2 s.12
    • /
    • pp.23-37
    • /
    • 2004
  • Location Based Services(LBSs) in mobile environments become very popular recently. For efficient LBSs, spatial database management systems must need a spatial indexing scheme such as R-trees in order to manage the huge spatial database. However, it may need unnecessary disk accesses since it needs to access objects which are not actually concerned to user's location-based queries. In this paper, to support the location-based queries efficiently, we propose a CLR-tree(Cell Leveling R-tree) in which a dynamic cell is built up within the minimum bounding rectangle of R-trees' node. The cell level of nodes is compared with the query's cell level in location-based query processing and determines the minimum search space. Also, we propose the insertion, split, deletion, and search algorithms for CRL-trees. From the experimental results, we see that a CLR-tree is able to decrease $5{\sim}20%$ of disk accesses from those of R-trees. So, a CLR-tree can be used for fast accessing spatial objects to user's location-based queries in LBSs.

  • PDF

Hierarchical Network Management Algorithm for Highly Available System with a LAN (LAN을 이용한 고가용 시스템의 계층적 제어 알고리즘)

  • 양지호;김동길;김정선
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.6
    • /
    • pp.516-525
    • /
    • 1990
  • This paper proposes a hierarchical control algorithm for an efficient network management of a loosely-coupled system which consists of functional division and duplicating structure with a LAN to enhance reliability and availability. The algorithm is modeled using the Perti-net and verified with the reachability tree. Here, the proposed algorithm is compared with the purely centralized control algorithm and distributed control algorithm in terms of message traffic for the network management. The result shows that the message traffic related to system performance is as low as centralized control algorithm and the system availability is independent of a specific processor failure.

  • PDF

A Comparative Study on the Performance of Intrusion Detection using Decision Tree and Artificial Neural Network Models (의사결정트리와 인공 신경망 기법을 이용한 침입탐지 효율성 비교 연구)

  • Jo, Seongrae;Sung, Haengnam;Ahn, Byunghyuk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.4
    • /
    • pp.33-45
    • /
    • 2015
  • Currently, Internet is used an essential tool in the business area. Despite this importance, there is a risk of network attacks attempting collection of fraudulence, private information, and cyber terrorism. Firewalls and IDS(Intrusion Detection System) are tools against those attacks. IDS is used to determine whether a network data is a network attack. IDS analyzes the network data using various techniques including expert system, data mining, and state transition analysis. This paper tries to compare the performance of two data mining models in detecting network attacks. They are decision tree (C4.5), and neural network (FANN model). I trained and tested these models with data and measured the effectiveness in terms of detection accuracy, detection rate, and false alarm rate. This paper tries to find out which model is effective in intrusion detection. In the analysis, I used KDD Cup 99 data which is a benchmark data in intrusion detection research. I used an open source Weka software for C4.5 model, and C++ code available for FANN model.

An Analysis of the Determinants of Government-Funded Defense Companies using a Decision Tree (의사결정나무를 활용한 방산육성지원 수혜기업 결정요인 분석)

  • Gowoon Jeon;Seulah Baek;Jeonghwan Jeon;Donghee Yoo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.27 no.1
    • /
    • pp.80-93
    • /
    • 2024
  • This study attempted to analyze the factors that influence the participation of beneficiary companies in the government's defense industry promotion support project. To this end, experimental data were analyzed by constructing a prediction model consisting of highly important variables in beneficiary company decisions among various company information using the decision tree model, one of the data mining techniques. In addition, various rules were derived to determine the beneficiary companies of the government's support project using the analysis results expressed as decision trees. Three policy measures were presented based on the important rules that repeatedly appear in different predictive models to increase the effect of the government's industrial development. Using the analysis methods presented in this study and the determinants of the beneficiary companies of the government support project will help create a sustainable future defense industry growth environment.

A Post-Analysis of Decision Tree to Detect the Change of Customer Behavior on Internet Shopping Mall

  • Kim, Jae kyeong;Song, Hee-Seok;Kim, Tae-Sung
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2001.01a
    • /
    • pp.456-463
    • /
    • 2001
  • Understanding and adapting to changes of customer behavior in internet shopping mall is an important aspect to survive in continuously changing environment. This paper develops a methodology based on decision tree algorithms to detect changes of customer behavior automatically from customer profiles and sales data at different time snapshots. We first define three types of changes as emerging pattern, unexpected change and the added/perished rule. Then, it is developed similarity and difference measures for rule matching to detect all types of change. Finally, the degree of change is developed to evaluate the amount of change. A Korean internet shopping mall case is evaluated to represent the performance of our methodology. And practical business implications for this methodology are also provided.

  • PDF

Intelligent consistency checking method for the use case model

  • Lee, Eun-young;Shim, Woo-gon;Paik, In-sup
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.50-56
    • /
    • 2003
  • In the development of complex software system, it is important to use hierarchical use case model due to the complex scope of development procedure. The use case model is core factor of the OMG (Object Management Group)'s UML (Unified Modeling Language) diagrams. In this paper, we propose a novel method to check syntactic consistency automatically in use case models at the different level of abstraction. This method is a rule-based approach which utilizes actor tree, use case tree and use case description. The proposed method is simulated on ITS (Intelligent Transportation System) architecture for the verification.

  • PDF

A Study on Evaluation of the Priority Order about Framework Data Building (기본지리정보 구축 우선순위 평가에 관한 연구)

  • 김건수;최윤수;조성길;이상미
    • Proceedings of the Korean Society of Surveying, Geodesy, Photogrammetry, and Cartography Conference
    • /
    • 2004.11a
    • /
    • pp.361-366
    • /
    • 2004
  • Geographic Information has been used widely for landuse and management, city plan, and environment and disaster management, etc., But geographic information has been built for individual cases using various methods. Therefore, the discordancy in data, double investment, confusion of use and difficulty of decision supporting system have been occurred. In order to solve these problems, national government is need to framework database. This framework database was enacted for building and use of National Geographic Information System and focused on basic plan of the second national geographic information system. Also, the framework database was selected of eight fields by NGIS laws and 19 detailed items through meeting of framework committee since 2002. In this research, The 19 detailed items( road, railroad, coastline, surveying control point etc.,) of framework database consider a Priority order, In the result of this research, the framework database is obtain to a priority order for building and the national government will carry effectively out a budget for the framework database building. Each of 19 detailed items is grouping into using the priority order of the framework database by AHP analysis method and verified items by decision tree analysis method. The one of the highest priority order items is a road, which is important for building, continuous renovation, and maintain management for use.

  • PDF

Computer-Aided Decision Analysis for Improvement of System Reliability

  • Ohm, Tai-Won
    • Journal of the Korea Safety Management & Science
    • /
    • v.2 no.4
    • /
    • pp.91-102
    • /
    • 2000
  • Nowadays, every kind of system is changed so complex and enormous, it is necessary to assure system reliability, product liability and safety. Fault tree analysis(FTA) is a reliability/safety design analysis technique which starts from consideration of system failure effect, referred to as “top event”, and proceeds by determining how these can be caused by single or combined lower level failures or events. So in fault tree analysis, it is important to find the combination of events which affect system failure. Minimal cut sets(MCS) and minimal path sets(MPS) are used in this process. FTA-I computer program is developed which calculates MCS and MPS in terms of Gw-Basic computer language considering Fussell's algorithm. FTA-II computer program which analyzes importance and function cost of VE consists. of five programs as follows : (l) Structural importance of basic event, (2) Structural probability importance of basic event, (3) Structural criticality importance of basic event, (4) Cost-Failure importance of basic event, (5) VE function cost analysis for importance of basic event. In this study, a method of initiation such as failure, function and cost in FTA is suggested, and especially the priority rank which is calculated by computer-aided decision analysis program developed in this study can be used in decision making determining the most important basic event under various conditions. Also the priority rank can be available for the case which selects system component in FMEA analysis.

  • PDF

Severe Accident Management Using PSA Event Tree Technology

  • Choi, Young;Jeong, Kwang Sub;Park, SooYong
    • International Journal of Safety
    • /
    • v.2 no.1
    • /
    • pp.50-56
    • /
    • 2003
  • There are a lot of uncertainties in the severe accident phenomena and scenarios in nuclear power plants (NPPs) and one of the major issues for severe accident management is the reduction of these uncertainties. The severe accident management aid system using Probabilistic Safety Assessments (PSA) technology is developed for the management staff in order to reduce the uncertainties. The developed system includes the graphical display for plant and equipment status, previous research results by a knowledge-base technique, and the expected plant behavior using PSA. The plant model used in this paper is oriented to identify plant response and vulnerabilities via analyzing the quantified results, and to set up a framework for an accident management program based on these analysis results. Therefore the developed system may playa central role of information source for decision-making for severe accident management, and will be used as a training tool for severe accident management.