• Title/Summary/Keyword: Access tree

Search Result 299, Processing Time 0.024 seconds

Expert System for Tomato Smart Farm Using Decision Tree (의사결정나무를 이용한 토마토 스마트팜 전문가시스템)

  • Nam, Youn-man;Lee, In-yong;Baek, Woon-Bo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.27-30
    • /
    • 2018
  • We design an expert system for tomato smart farm using decision trees and construct a control system with decision structure similar to that of farmers by using the data generated by factors that vary depending on the surrounding environment of each house. At present, Smart farm's control system does not control itself like the way farmers have done so far. Therefore, the dependency of smart farm control system is still not high. Direct intervention by farmers is indispensable for environmental control based on surrounding environment such as sensor value in smart farm. Therefore, we aimed to design a controller that incorporates decision trees into the expert system to make a system similar to the decision making of farmers. Prior to controlling the equipment in the house, it automatically selects the most direct effect among the various environmental factors, and then builds an expert system for complex control by including criteria for decision making by farmers. This study focused on deriving results using data without using heavy tools. Data is coming out of many smart farms at present. We expect this to be a standard for a methodology that allows farmers to access quickly and easily and reduce direct intervention.

  • PDF

A Searching Technique of the Weak Connectivity Boundary using Small Unmanned Aerial Vehicle in Wireless Tactical Data Networks (무선 전술 데이터 네트워크에서 소형 무안항공기를 이용한 연결성 약화 지역 탐색 기법)

  • Li, Jin;Song, Ju-Bin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1C
    • /
    • pp.89-96
    • /
    • 2012
  • Since tactical robots are going to be grown and tactical data communications will be more network-centric, the reliability of wireless tactical data networks is going to be very important in the future. However, the connectivity of such wireless tactical data networks can be extremely uncertain in practical circumstances. In this paper, we propose a searching technique to find out the weak boundary area of the network connectivity using a small UAV(unmanned aerial vehicle) which has a simple polling access function to wireless nodes on the ground in wireless tactical data networks. The UA V calculates the network topology of the wireless tactical data networks and coverts it to the Lapalcian matrix. In the proposed algorithm, we iteratively search the eigenvalues and find a minimum cut in the network resulting in finding the weak boundary of the connectivity for the wireless tactical data networks. If a UAV works as a relay nodes for the weak area, we evaluate that the throughput performance of the proposed algorithm outperforms star connection method and MST(minimum Spanning Tree) connection method. The proposed algorithm can be applied for recovering the connectivity of wireless tactical data networks.

Privacy-Preserving Parallel Range Query Processing Algorithm Based on Data Filtering in Cloud Computing (클라우드 컴퓨팅에서 프라이버시 보호를 지원하는 데이터 필터링 기반 병렬 영역 질의 처리 알고리즘)

  • Kim, Hyeong Jin;Chang, Jae-Woo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.9
    • /
    • pp.243-250
    • /
    • 2021
  • Recently, with the development of cloud computing, interest in database outsourcing is increasing. However, when the database is outsourced, there is a problem in that the information of the data owner is exposed to internal and external attackers. Therefore, in this paper, we propose a parallel range query processing algorithm that supports privacy protection. The proposed algorithm uses the Paillier encryption system to support data protection, query protection, and access pattern protection. To reduce the operation cost of a checking protocol (SRO) for overlapping regions in the existing algorithm, the efficiency of the SRO protocol is improved through a garbled circuit. The proposed parallel range query processing algorithm is largely composed of two steps. It consists of a parallel kd-tree search step that searches the kd-tree in parallel and safely extracts the data of the leaf node including the query, and a parallel data search step through multiple threads for retrieving the data included in the query area. On the other hand, the proposed algorithm provides high query processing performance through parallelization of secure protocols and index search. We show that the performance of the proposed parallel range query processing algorithm increases in proportion to the number of threads and the proposed algorithm shows performance improvement by about 5 times compared with the existing algorithm.

Revitalization of Elementary School Plots, as Small Public Parks -A Case Study of School Subject Parks in Seoul - (소공원으로서 초등학교부지의 활용방안 - 서울시 학교공원화사업 대상지를 중심으로 -)

  • Nam, Mi-A;Lee, Eun-Heui
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.9 no.1
    • /
    • pp.14-30
    • /
    • 2006
  • It is difficult to secure public lots in the downtown area, school lots can be made the best use of important source to increase the area of green land in the city. The tree-planting campaign for schools has been in force since 1999 by the city of Seoul and at present; it is currently established as the plan of school parks. Thereupon, the purpose of this study is to present some ways to revitalize elementary schools to be used as vest pocket parks through the research of elementary schools, which are subject to the plan of school parks in Seoul. The results of this study are as below : The subjects to revitalize school parks as vest pocket parks are as follows. First, the land has to be utilized for security of space. Second, in addition to the front and back gate, another passage to the park has to be set up for easy access. Third, the fence has to be formed as a hedge used outside the park. Fourth, selecting plants, species of trees suitable for the landscape of school and taking into consideration the aspect of ecology. Finally, it is urgent to enact socially and economically proper standard of law by the new standards of area for school landscape considering not only the building law and regulations of general landscape, but also specific characteristics of school landscape.

Traffic Engineering and Manageability for Multicast Traffic in Hybrid SDN

  • Ren, Cheng;Wang, Sheng;Ren, Jing;Wang, Xiong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2492-2512
    • /
    • 2018
  • Multicast communication can effectively reduce network resources consumption in contrast with unicast. With the advent of SDN, current researches on multicast traffic are mainly conducted in the SDN scenario, thus to mitigate the problems of IP multicast such as the unavoidable difficulty in traffic engineering and high security risk. However, migration to SDN cannot be achieved in one step, hybrid SDN emerges as a transitional networking form for ISP network. In hybrid SDN, for acquiring similar TE and security performance as in SDN multicast, we redirect every multicast traffic to an appropriate SDN node before reaching the destinations of the multicast group, thus to build up a core-based multicast tree substantially which is first introduced in CBT. Based on the core SDN node, it is possible to realize dynamic control over the routing paths to benefit traffic engineering (TE), while multicast traffic manageability can also be obtained, e.g., access control and middlebox-supported network services. On top of that, multiple core-based multicast trees are constructed for each multicast group by fully taking advantage of the routing flexibility of SDN nodes, in order to further enhance the TE performance. The multicast routing and splitting (MRS) algorithm is proposed whereby we jointly and efficiently determine an appropriate core SDN node for each group, as well as optimizing the traffic splitting fractions for the corresponding multiple core-based trees to minimize the maximum link utilization. We conduct simulations with different SDN deployment rate in real network topologies. The results indicate that, when 40% of the SDN switches are deployed in HSDN as well as calculating 2 trees for each group, HSDN multicast adopting MRS algorithm can obtain a comparable TE performance to SDN multicast.

An Efficient Multicast Architecture for IP-Based Mobile Core Networks (IP기반 모바일 코어 네트워크에서의 효율적인 멀티캐스트 아키텍처)

  • Kim Won-Tea;Kim Hyo-Eun;Park Yong-Jin
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.6 s.348
    • /
    • pp.9-22
    • /
    • 2006
  • When the legacy multicast routing protocols are adopted in If-based mobile core networks, there are some problems such as traffic injection from unnecessary sources, traffic overhead by group management and router performance degradation by large amount of multicast session information. In this paper, we propose a stateless multicast mechanism which has no need to maintain multicast information for session status and reduces redundant network overhead for maintaining multicast tree. In addition interworking with IGMPv3 gets rid of traffic from unnecessary sources which have no registration from receivers. The operations of essential components including a gateway node for interworking with the legacy Internet multicast network, a gateway node for transparency to radio access network and a intermediate node in mobile core networks, are definitely defined and the proposed communication architecture is completed. Finally we evaluate and approve the performance of the proposed architecture by means of well-designed network simulation.

Uridylate kinase as a New Phylogenetic Molecule for Procaryotes

  • Lee, Dong-Geun;Lee, Jin-Ok;Lee, Jae-Hwa
    • 한국생물공학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.810-814
    • /
    • 2003
  • For the phylogenetic analysis of procaryotes, 16S rRNA gene has been used. In spite of it's common use, so high conservative of 16S rRNA gene limited resolving power, hence other molecule was applied in this study and the result was compared with that of 16S rRNA. COG (Clusters of Orthologous of protein) algorithm revealed that three COGs were only detected in 42 procaryotes ; transcription elongation factor (COG0195), bacterial DNA primase (COG0358) and uridylate kinase (COG0528). Uridylate kinase gene was selected owing to the similarity and one single copy number in each genome. Phylogenetic tree of 16S rRNA gene and uridylate kinase showed similarities and differences. Uridylate kinase may help the problem of very high conservative of 16S rRNA gene in rhylogenetic analysis and it would help to access more accurate discrimination and phylogenetic analysis of bacteria.

  • PDF

A Study on the Relationship between the Number of Visitors and Degradation of Natural Resources in Bukhansan National Park (북한산국립공원의 탐방객 수와 훼손의 상관관계 연구)

  • Kang, Da-In;Sung, Hyun-Chan
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.19 no.4
    • /
    • pp.81-89
    • /
    • 2016
  • This study aims to understand the relationship between visitors and the degradation of natural resources in Bukhansan national park. We analyzed the trend of the number of visitors, destruction of natural resources and decrease of biodiversity per year. We further compared three types of trails, heavily-used trails and rarely-used trails and a trail with limited access, regarding the degree of destruction in the National Park through a field survey. Our result showed that increasing number of visitors had direct and indirect impact on the destruction of natural resources in the National Park. The direct impact came from visitors' excessive use of trails. Naturally, increasing number of visitors caused an immoderate use of natural resources. Physical degradation such as exposure of tree root, poor drainage of trails, trail erosion was more severe than other types of trails. Decreasing biodiversity or mild disturbance around trails is the indirect impact such as broken bough, worn-bark in rarely-used trails. Destruction scale greatly increased as the number of visitors increased. Real-named reservation system helped to prevent trails from degradation. Our result calls for the need of controlling the number of visitors to Bukhansan National Park to mitigate the degradation. We recommend dispersing visitors from the heavily-used trails to other trails and implementing real-named reservation system in the rarely-used trails for the effective management of the national park.

Performance Analysis of Dualrate MC-CDMA Systems Based on Code Grouping (코드그룹화에 의한 이중전송률 MC-CDMA 시스템의 성능분석)

  • Kim, Nam-Sun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.4
    • /
    • pp.112-120
    • /
    • 2006
  • Multicarrier code division multiple access(MC-CDMA) system that combines multicarrier modulation with CDMA offers robustness to frequency selective fading and can support higher rate data transmission with higher spectral efficiency. A new asynchronous MC-CDMA system to implement multiple data rate communications is proposed in this paper. In a W-CDMA downlink the orthogonal variable spreading factor(OVSF) code is used for variable spreading factor for various multimedia traffic. Proposed system utilizes the OVSF code that generated by generation property for spreading. The proposed MC-CDMA system use different lengths of OVSF code as a spreading code according to their data rate. The groupwise processing is accomplished by code grouping in OVSF code generation tree. For the analysis of average BER performance, numerical method and computer simulation were used. We also compare the system performance with that of a single rate MC-CDMA system used orthogonal code as a spreading code.

  • PDF

A Lossless Multicast Handoff Method for Wireless ATM Networks (무선 ATM 망을 위한 손실없는 멀티캐스트 핸드오프 기법)

  • 하은용
    • The KIPS Transactions:PartC
    • /
    • v.8C no.1
    • /
    • pp.88-96
    • /
    • 2001
  • Future mobile communication networks, which consist of ATM-based B-ISDN backbone networks and wireless ATM networks, will provide u user with broadband connection and QoS service. These network systems need the lossless handoff methods which support user mobility, satisfy ATM features such as ATM cell ordering and no ATM cell duplication and minimize buffer requirement for ATM cell buffering. In this paper we suggest a multicast-based handoff method to supp$\alpha$t lossless connection as well as to minimize buffer overhead. It establishes a dynamic multicast connection between source terminal and wireless member AP (access point)s. When the mobile terminal receives data packet correctly, it notifies the positive acknowledgement of the packet to all member APs. And member APs then release the MT related temporary buffer space for MT's future movement. Therefore member APs can eliminate unnecessary buffer usage and manage the buffer space efficiently. Analysis result shows that our handoff method has better performance in buffer requirement for lossless and seamless connection services over VCT (virtual connection tree) method and other dynamic multicast-based handoff methods.

  • PDF