• Title/Summary/Keyword: multi-path routing

Search Result 235, Processing Time 0.024 seconds

Development of distributed inundation routing method using SIMOD method (SIMOD 기법을 이용한 분포형 침수 추적 기법 개발)

  • Lee, Suk Ho;Lee, Dong Seop;Kim, Jin Man;Kim, Byung Sik
    • Journal of Korea Water Resources Association
    • /
    • v.49 no.7
    • /
    • pp.579-588
    • /
    • 2016
  • Changes in precipitation due to climate change is made to induce the local and intensive rainfall, it is increasing damage caused by inland inundation. Therefore, it requires a technique for predicting damage caused by flooding. In this study, in order to determine whether this flood inundated by any route when the levee was destroyed, Which can simulate the path of the flood inundation model was developed for the SIMOD (Simplified Inundation MODel). Multi Direction Method (MDM) for differential distributing the adjacent cells by using the slope and Flat-Water Assumption (FWA)-If more than one level higher in the cell adjacent to the cell level is the lowest altitude that increases the water level is equal to the adjacent cells- were applied For the evaluation of the model by setting the flooding scenarios were estimated hourly range from the target area. SIMOD model can significantly reduce simulation time because they use a simple input data of topography (DEM) and inflow flood. Since it is possible to predict results within minutes, if you can only identify inflow flood through the runoff model or levee collapse model. Therefore, it could be used to establish an evacuation plan due to flooding, such as EAP (Emergency Action Plan).

Clustered Tributaries-Deltas Architecture for Energy Efficient and Secure Wireless Sensor Network (무선 센서 네트워크에서 에너지 효율성과 보안성을 제공하기 위한 클러스터 기반의 Tributaries-Deltas)

  • Kim, Eun-Kyung;Seo, Jae-Won;Chae, Ki-Joon;Choi, Doo-Ho;Oh, Kyung-Hee
    • The KIPS Transactions:PartC
    • /
    • v.15C no.5
    • /
    • pp.329-342
    • /
    • 2008
  • The Sensor Networks have limitations in utilizing energies, developing energy-efficient routing protocol and secure routing protocol are important issues in Sensor Network. In the field of data management, Tributaries and Deltas(TD) which incorporates tree topology and multi-path topology effectively have been suggested to provide efficiency and robustness in data aggregation. And our research rendered hierarchical property to TD and proposed Clustering-based Tributaries-Deltas. Through this new structure, we integrated efficiency and robustness of TD structure and advantages of hierarchical Sensor Network. Clustering-based Tributaries-Deltas was proven to perform better than TD in two situations through our research. The first is when a Base Station (BS) notices received information as wrong and requests the network's sensing data retransmission and aggregation. And the second is when the BS is mobile agent with mobility. In addition, we proposed key establishment mechanism proper for the newly proposed structure which resulted in new Sensor Network structure with improved security and energy efficiency as well. We demonstrated that the new mechanism is more energy-efficient than previous one by analyzing consumed amount of energy, and realized the mechanism on TmoteSKY sensor board using TinyOS 2.0. Through this we proved that the new mechanism could be actually utilized in network design.

Study on Vehicle Routing Problem with Minimum Delivery Completion Time (특송소화물 배송완료시간 최소화를 위한 차량경로문제 연구)

  • Lee, Sang-Heon
    • Journal of Korean Society of Transportation
    • /
    • v.22 no.7 s.78
    • /
    • pp.107-117
    • /
    • 2004
  • The growing demand for customer-response, made-to-order manufacturing and satisfactory delivery are stimulating the importance of commercial fleet management problem. Moreover, the rapid transformation to the customer-oriented multi-frequency, relatively small fleet, such as home delivery and Perishable goods, requiring prompt delivery and advanced real-time operation of vehicle fleets. In this paper we consider the vehicle routing problem(VRP) to minimize delivery completion time which is equal to the time that last customer wait for the vehicle in fleet operation. The mathematical formulation is different from those for the classical VRP which is minimizing cost/distance/time by running vehicles in manager's point of view. The key aspect of this model is not considering the return time from the last customer to depot in every vehicle path. Thereby, the vehicle dispatcher can afford to dynamically respond to customer demand and vehicle availability. The customer's position concerned with minimizing waiting time that may be applied for the delivery of product required freshness or delivery time. Extensive experiments are carried out to compare the performance of minimizing delivery completion time by using the ILOG Solver which has the advantage of solving quickly an interim solution very near an optimal solution. The experimental results show that the suggested model can easily find near optimal solution in a reasonable computational time under the various combination of customers and vehicles.

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

Systematic Literature Review for HRD in Korea Franchise Business (국내 프랜차이즈 사업에서의 인적자원개발에 관한 체계적 문헌 고찰)

  • KIM, Eunsung;LEE, Sang-Seub
    • The Korean Journal of Franchise Management
    • /
    • v.10 no.2
    • /
    • pp.33-47
    • /
    • 2019
  • Purpose - The purpose of this study is to classify and analyze existing studies from various angles through systematic literature review of how human resources development has been researched in the domestic franchise business. These studies are intended to suggest the direction in which human resource development research should be conducted in the future in the franchise business. Research design, data, and methodology - This study is based on systematic literature review methodology. It has gone through the process of subject language setting, literature search routing, search term selection, literature selection, literature classification and literature analysis. The systematic literature review identified 59 peer-reviewed dissertations and scientific journal publications on the subject of HRD in Korea franchise business. Result - This study analyzed by research methods, research industries, research population and dependent variable using the systematic review process. The literature studied in the 2000s mainly led to research on education and training of franchise employees in beauty franchise business. In the literature studied since 2010, human resources development was mainly studied in the supervisor in the restaurant franchise business, and in the study of competence rather than education and training. According to the research methods, statistical methods were mostly relatively simple, such as t-test or one-way distribution analysis until the 2000s, and after 2010, in-depth and structural studies using multiple return analysis, structural method analysis, path analysis, multi-dimensional scale analysis, AHP, etc were conducted. When classified by study dependant, early research until the 2000s focused on the study of education and training, which is an independent variable, on the satisfaction of education programs, job satisfaction, and immersion. On the other hand, studies conducted since 2010 have produced more complex results using various medium variants, and those related to management performance and relationship performance have been mainly studied, rather than the satisfaction of the education itself. Conclusions - While the domestic franchise business is expanding in terms of quantity, such as the number of franchises and franchises, the development in terms of quality for the joint growth of franchises and franchisees is still lacking. In order for the franchisee to continue to grow with each other, the franchisee must identify and develop their current performance or expected capabilities through capacity modeling at various targets and levels.