• Title/Summary/Keyword: acyclic

Search Result 246, Processing Time 0.02 seconds

Real-time traffic service in network with DiffServ (DiffServ 기반 네트워크에서의 실시간 트래픽 서비스)

  • Joung, Jin-No
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.1B
    • /
    • pp.53-60
    • /
    • 2007
  • We investigate the end-to-end delay bounds in large scale networks with Differentiated services (DiffServ) architecture. It is generally understood that networks with DiffServ architectures, where packets are treated according to the class they belong, can guarantee the end-to-end delay for packets of the highest priority class, only in lightly utilized cases. We focus on tree networks, which are defined to be acyclic connected graphs. We obtain a closed formula for delay bounds for such networks. We show that, in tree networks, the delay bounds exist regardless of the level of network utilization. These bounds are quadratically proportional to the maximum hop counts in heavily utilized networks; and are linearly proportional to the maximum hop counts in lightly utilized networks. Considering that tree networks, especially the Ethernet networks are being accepted more and more for access networks as well as provider networks, we argue that based on these delay bounds DiffServ architecture is able to support real time applications even for a large network. Throughout the paper we use Latency-Rate (LR) server model, with which it has proven that FIFO and Strict Priority are LR servers to each flows in certain conditions.

Inter-frame vertex selection algorithm for lossy coding of shapes in video sequences (동영상에서의 모양 정보 부호화를 위한 정점 선택 알고리즘)

  • Suh, Jong-Yeul;Kim, Kyong-Joong;Kang, Moon-Gi
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.37 no.4
    • /
    • pp.35-45
    • /
    • 2000
  • The vertex-based boundary encoding scheme is widely used in object-based video coding area and computer graphics due to its scalability with natural looking approximation. Existing single framebased vertex encoding algorithm is not efficient for temporally correlated video sequences because it does not remove temporal redundancy. In the proposed method, a vertex point is selected from not only the boundary points of the current frame but also the vertex points of the previous frame to remove temporal redundancy of shape information in video sequences. The problem of selecting optimal vertex points is modeled as finding shortest path in the directed acyclic graph with weight The boundary is approximated by a polygon which can be encoded with the smallest number of bits for maximum distortion. The temporal redundancy between two successive frames is efficiently removed with the proposed scheme, resulting in lower bit-rate than the conventional algorithms.

  • PDF

Transient Multipath routing protocol for low power and lossy networks

  • Lodhi, Muhammad Ali;Rehman, Abdul;Khan, Meer Muhammad;Asfand-e-yar, Muhammad;Hussain, Faisal Bashir
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2002-2019
    • /
    • 2017
  • RPL routing protocol for low-power and lossy networks is an Internet Engineering Task Force (IETF) recommended IPv6 based protocol for routing over Low power Lossy Networks (LLNs). RPL is proposed for networks with characteristics like small packet size, low bandwidth, low data rate, lossy wireless links and low power. RPL is a proactive routing protocol that creates a Directed Acyclic Graph (DAG) of the network topology. RPL is increasingly used for Internet of Things (IoT) which comprises of heterogeneous networks and applications. RPL proposes a single path routing strategy. The forwarding technique of RPL does not support multiple paths between source and destination. Multipath routing is an important strategy used in both sensor and ad-hoc network for performance enhancement. Multipath routing is also used to achieve multi-fold objectives including higher reliability, increase in throughput, fault tolerance, congestion mitigation and hole avoidance. In this paper, M-RPL (Multi-path extension of RPL) is proposed, which aims to provide temporary multiple paths during congestion over a single routing path. Congestion is primarily detected using buffer size and packet delivery ratio at forwarding nodes. Congestion is mitigated by creating partially disjoint multiple paths and by avoiding forwarding of packets through the congested node. Detailed simulation analysis of M-RPL against RPL in both grid and random topologies shows that M-RPL successfully mitigates congestion and it enhances overall network throughput.

Efficient Duplication Based Task Scheduling with Communication Cost in Heterogeneous Systems (이질 시스템에서 통신 시간을 고려한 효율적인 복제 기반 태스크 스케줄링)

  • Yoon, Wan-Oh;Baek, Jueng-Kuy;Shin, Kwang-Sik;Cheong, Jin-Ha;Choi, Sang-Bang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.3C
    • /
    • pp.219-233
    • /
    • 2008
  • Optimal scheduling of parallel tasks with some precedence relationship, onto a parallel machine is known to be NP-complete. The complexity of the problem increases when task scheduling is to be done in a heterogeneous environment, where the processors in the network may not be identical and take different amounts of time to execute the same task. This paper introduces a Duplication based Task Scheduling with Communication Cost in Heterogeneous Systems (DTSC), which provides optimal results for applications represented by Directed Acyclic Graphs (DAGs), provided a simple set of conditions on task computation and network communication time could be satisfied. Results from an extensive simulation show significant performance improvement from the proposed techniques over the Task duplication-based scheduling Algorithm for Network of Heterogeneous systems(TANH) and General Dynamic Level(GDL) scheduling algorithm.

Kinetics and Mechanism of the Anilinolysis of Ethylene Phosphorochloridate in Acetonitrile

  • Barai, Hasi Rani;Lee, Hai-Whang
    • Bulletin of the Korean Chemical Society
    • /
    • v.32 no.12
    • /
    • pp.4185-4190
    • /
    • 2011
  • The nucleophilic substitution reactions of ethylene phosphorochloridate (1c) with substituted anilines ($XC_6H_4NH_2$) and deuterated anilines ($XC_6H_4ND_2$) are investigated kinetically in acetonitrile at $5.0^{\circ}C$. The anilinolysis rate of 1c involving a cyclic five-membered ring is four thousand times faster than its acyclic counterpart (1a: diethyl chlorophosphate) because of great positive value of the entropy of activation of 1c (${\Delta}S^{\neq}=+30\;cal\;mol^{-1}K^{-1}$ compared to negative value of 1a (${\Delta}S^{\neq}=-45\;cal\;mol^{-1}K^{-1}$) over considerably unfavorable enthalpy of activation of 1c (${\Delta}H^{\neq}=27.7\;kcal\;mol^{-1}$) compared to 1a (${\Delta}H^{\neq}=8.3\;kcal\;mol^{-1}$). Great enthalpy and positive entropy of activation are ascribed to sterically congested transition state (TS) and solvent structure breaking in the TS. The free energy correlations exhibit biphasic concave upwards for substituent X variations in the X-anilines with a break point at X = 3-Me. The deuterium kinetic isotope effects are secondary inverse ($k_H/k_D$ < 1) with the strongly basic anilines and primary normal ($k_H/k_D$ > 1) with the weakly basic anilines and rationalized by the TS variation from a dominant backside attack to a dominant frontside attack, respectively. A concerted $S_N2$ mechanism is proposed and the primary normal deuterium kinetic isotope effects are substantiated by a hydrogen bonded, four-center-type TS.

Four proofs of the Cayley formula (케일리 공식의 네 가지 증명)

  • Seo, Seung-Hyun;Kwon, Seok-Il;Hong, Jin-Kon
    • Journal for History of Mathematics
    • /
    • v.21 no.3
    • /
    • pp.127-142
    • /
    • 2008
  • In this paper, we introduce four different approaches of proving Cayley formula, which counts the number of trees(acyclic connected simple graphs). The first proof was done by Cayley using recursive formulas. On the other hands the core idea of the other three proofs is the bijective method-find an one to one correspondence between the set of trees and a suitable family of combinatorial objects. Each of the three bijection gives its own generalization of Cayley formula. In particular, the last proof, done by Seo and Shin, has an application to computer science(theoretical computation), which is a typical example that pure mathematics supply powerful tools to other research fields.

  • PDF

A Study on Storing Node Addition and Instance Leveling Using DIS Message in RPL (RPL에서 DIS 메시지를 이용한 Storing 노드 추가 및 Instance 평준화 기법 연구)

  • Bae, Sung-Hyun;Yun, Jeong-Oh
    • Journal of IKEEE
    • /
    • v.22 no.3
    • /
    • pp.590-598
    • /
    • 2018
  • Recently, interest in IoT(Internet of Things) technology, which provides Internet services to objects, is increasing. IoT offers a variety of services in home networks, healthcare, and disaster alerts. IoT with LLN(Low Power & Lossy Networks) feature frequently loses sensor node. RPL, the standard routing protocol of IoT, performs global repair when data loss occurs in a sensor node. However, frequent loss of sensor nodes due to lower sensor nodes causes network performance degradation due to frequent full path reset. In this paper, we propose an additional selection method of the storage mode sensor node to solve the network degradation problem due to the frequent path resetting problem even after selecting the storage mode sensor node, and propose a method of equalizing the total path resetting number of each instance.

Job Creation and Job Destruction in Korean Mining and Manufacturing, 1981-2000 (1981-2000년간 한국 광공업 5인 이상 사업체에서의 일자리 창출과 소멸)

  • Kim, Hye Won
    • Journal of Labour Economics
    • /
    • v.27 no.2
    • /
    • pp.29-66
    • /
    • 2004
  • In this paper, I investigate job creation and destruction in Korean mining and manufacturing between 1982 and 2000 using the raw data of Annual Mining and Manufacturing Survey. The rate of job creation and destruction of continuing plants averaged 9.75 and 10.33, respectively, which are higher than those of OECD countries, Chile, and Colombia. The created jobs showed weak persistence and the concentration of job reallocation is high, compared with other countries. Job reallocation accounts for major fraction of worker reallocation and the fraction has increased before 1997. Analysis of time series data of job flow revealed a general pattern of pro-cyclic job creation and counter-cyclic job destruction. However job reallocation in Korea is strongly acyclic whereas the rate is known to be counter-cyclical in the U.S.

  • PDF

Integrative Analysis of Microarray Data with Gene Ontology to Select Perturbed Molecular Functions using Gene Ontology Functional Code

  • Kim, Chang-Sik;Choi, Ji-Won;Yoon, Suk-Joon
    • Genomics & Informatics
    • /
    • v.7 no.2
    • /
    • pp.122-130
    • /
    • 2009
  • A systems biology approach for the identification of perturbed molecular functions is required to understand the complex progressive disease such as breast cancer. In this study, we analyze the microarray data with Gene Ontology terms of molecular functions to select perturbed molecular functional modules in breast cancer tissues based on the definition of Gene ontology Functional Code. The Gene Ontology is three structured vocabularies describing genes and its products in terms of their associated biological processes, cellular components and molecular functions. The Gene Ontology is hierarchically classified as a directed acyclic graph. However, it is difficult to visualize Gene Ontology as a directed tree since a Gene Ontology term may have more than one parent by providing multiple paths from the root. Therefore, we applied the definition of Gene Ontology codes by defining one or more GO code(s) to each GO term to visualize the hierarchical classification of GO terms as a network. The selected molecular functions could be considered as perturbed molecular functional modules that putatively contributes to the progression of disease. We evaluated the method by analyzing microarray dataset of breast cancer tissues; i.e., normal and invasive breast cancer tissues. Based on the integration approach, we selected several interesting perturbed molecular functions that are implicated in the progression of breast cancers. Moreover, these selected molecular functions include several known breast cancer-related genes. It is concluded from this study that the present strategy is capable of selecting perturbed molecular functions that putatively play roles in the progression of diseases and provides an improved interpretability of GO terms based on the definition of Gene Ontology codes.

Improved Routing Metrics for Energy Constrained Interconnected Devices in Low-Power and Lossy Networks

  • Hassan, Ali;Alshomrani, Saleh;Altalhi, Abdulrahman;Ahsan, Syed
    • Journal of Communications and Networks
    • /
    • v.18 no.3
    • /
    • pp.327-332
    • /
    • 2016
  • The routing protocol for low-power and lossy networks (RPL) is an internet protocol based routing protocol developed and standardized by IETF in 2012 to support a wide range of applications for low-power and lossy-networks (LLNs). In LLNs consisting of resource-constrained devices, the energy consumption of battery powered sensing devices during network operations can greatly impact network lifetime. In the case of inefficient route selection, the energy depletion from even a few nodes in the network can damage network integrity and reliability by creating holes in the network. In this paper, a composite energy-aware node metric ($RER_{BDI}$) is proposed for RPL; this metric uses both the residual energy ratio (RER) of the nodes and their battery discharge index. This composite metric helps avoid overburdening power depleted network nodes during packet routing from the source towards the destination oriented directed acyclic graph root node. Additionally, an objective function is defined for RPL, which combines the node metric $RER_{BDI}$ and the expected transmission count (ETX) link quality metric; this helps to improve the overall network packet delivery ratio. The COOJA simulator is used to evaluate the performance of the proposed scheme. The simulations show encouraging results for the proposed scheme in terms of network lifetime, packet delivery ratio and energy consumption, when compared to the most popular schemes for RPL like ETX, hop-count and RER.