• Title/Summary/Keyword: Directed Graph

Search Result 212, Processing Time 0.022 seconds

Automatic Creation of 3D Artificial Flowers with Interactive Evaluation on Evolutionary Engine

  • Min, Hyeun-Jeong;Cho, Sung-Bae
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.702-705
    • /
    • 2003
  • Directed graph and Lindenmayer system (L-system) are two major encoding methods of representation to develop creatures in an application field of artificial life. It is difficult to structurally define real morphology using the L-systems which are a grammatical rewriting system because they represent genotype as loops, procedure calls, variables, and parameters. This paper defines a class of representations called structured directed graph and interactive genetic algorithm for automatically creating 3D flower morphology. The experimental results show that natural flower morphology can be created by the proposed method.

  • PDF

A Minimum Spanning Tree Algorithm for Directed Graph (방향그래프의 최소신장트리 알고리즘)

  • Choi, Myeong-Bok;Lee, Sang-Un
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.159-171
    • /
    • 2011
  • This paper suggests an algorithm that obtains the Minimum Spanning Tree for directed graph (DMST). The existing Chu-Liu/Edmonds DMST algorithm has chances of the algorithm not being able to find DMST or of the sum of ST not being the least. The suggested algorithm is made in such a way that it always finds DMST, rectifying the disadvantage of Chu-Liu/Edmonds DMST algorithm. Firstly, it chooses the Minimum-Weight Arc (MWA) from all the nodes including a root node, and gets rid of the nodes in which cycle occurs after sorting them in an ascending order. In this process, Minimum Spanning Forest (MST) is obtained. If there is only one MSF, DMST is obtained. And if there are more than 2 MSFs, to determine MWA among all MST nodes, it chooses a method of directly calculating the sum of all the weights, and hence simplifies the emendation process for solving a cycle problem of Chu-Liu/Edmonds DMST algorithm. The suggested Sulee DMST algorithm can always obtain DMST that minimizes the weight of the arcs no matter if the root node is set or not, and it is also capable to find the root node of a graph with minimized weight.

A Query Model for Consecutive Analyses of Dynamic Multivariate Graphs (동적 다변량 그래프의 연속적 분석을 위한 질의 모델 설계 및 구현)

  • Bae, Yechan;Ham, Doyoung;Kim, Taeyang;Jeong, Hayjin;Kim, Dongyoon
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.6
    • /
    • pp.103-113
    • /
    • 2014
  • This study designed and implemented a query model for consecutive analyses of dynamic multivariate graph data. First, the query model consists of two procedures; setting the discriminant function, and determining an alteration method. Second, the query model was implemented as a query system that consists of a query panel, a graph visualization panel, and a property panel. A Node-Link Diagram and the Force-Directed Graph Drawing algorithm were used for the visualization of the graph. The results of the queries are visually presented through the graph visualization panel. Finally, this study used the data of worldwide import & export data of small arms to verify our model. The significance of this research is in the fact that, through the model which is able to conduct consecutive analyses on dynamic graph data, it helps overcome the limitations of previous models which can only perform discrete analysis on dynamic data. This research is expected to contribute to future studies such as online decision making and complex network analysis, that use dynamic graph models.

  • PDF

Network Intrusion Detection Based on Directed Acyclic Graph and Belief Rule Base

  • Zhang, Bang-Cheng;Hu, Guan-Yu;Zhou, Zhi-Jie;Zhang, You-Min;Qiao, Pei-Li;Chang, Lei-Lei
    • ETRI Journal
    • /
    • v.39 no.4
    • /
    • pp.592-604
    • /
    • 2017
  • Intrusion detection is very important for network situation awareness. While a few methods have been proposed to detect network intrusion, they cannot directly and effectively utilize semi-quantitative information consisting of expert knowledge and quantitative data. Hence, this paper proposes a new detection model based on a directed acyclic graph (DAG) and a belief rule base (BRB). In the proposed model, called DAG-BRB, the DAG is employed to construct a multi-layered BRB model that can avoid explosion of combinations of rule number because of a large number of types of intrusion. To obtain the optimal parameters of the DAG-BRB model, an improved constraint covariance matrix adaption evolution strategy (CMA-ES) is developed that can effectively solve the constraint problem in the BRB. A case study was used to test the efficiency of the proposed DAG-BRB. The results showed that compared with other detection models, the DAG-BRB model has a higher detection rate and can be used in real networks.

Conceptional Approach for Assembly Reconfiguration of Papering Robot Modules (선체 수직 외벽 Papering 용 로봇 모듈의 조합 최적설계의 개념적 접근)

  • Chung W.J.;Kim S.H.;Kim K.K.;Kim H.G.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2005.06a
    • /
    • pp.2015-2018
    • /
    • 2005
  • In this paper, we are willing to prepare the reasonable optimization, Combinatorial Optimization and Genetic Algorithm. Thus we define position status of end-effect (or terminative link module) using promised form, (G, M(G), A(G), and so on.). For this preparing step, the reorganizing procedure of Link and Joint Module is necessary, like as enumerating the kinematically identical assembly group of several links and joints. Thus, we draw a G, directed graph in a first step. Because, directed graph contains the path information between adjacent Link Module and Joint Module. From the directed graph,G, we can incite the Incidence Matrix, M(G). The incidence matrix, M(G), contains the contact information of the Link (Joint) Module and the type of Link (Joint). At the end of this paper, we generalize the modular information as a matrix form, A(G). From this matrix, we can make a population of assembly status. That is the finial output of this paper.

  • PDF

A Study on Optimal Scheduling with Directed Acyclic Graphs Task onto Multiprocessors (다중프로세서에서 비순환 타스크 그래프의 최적 스케쥴링에 관한 연구)

  • 조민환
    • Journal of the Korea Society of Computer and Information
    • /
    • v.4 no.4
    • /
    • pp.40-46
    • /
    • 1999
  • The task scheduling has an effect on system execution time in a precedence constrained task graph onto the multiprocessor system. This problem is known to be NP-hard. many people made an effort to obtain near optimal schedule. We compared modified critical path schedule with many other methods(CP, MH, DL Swapping) For testing this subject, we created randomly a directed acyclic task graph with many root nodes and terminal nodes simulation result convinced for us that the modified critical path algorithm is superior to the other scheduling algorithm.

  • PDF

Comparative Study on Static Task Scheduling Algorithms in Global Heterogeneous Environment (전역 이기종 환경에서의 정적 태스크 스케줄링의 비교 연구)

  • Kim Jung-Hwan
    • The KIPS Transactions:PartA
    • /
    • v.13A no.2 s.99
    • /
    • pp.163-170
    • /
    • 2006
  • Most scheduling problems including DAG(Directed Acyclic Graph)-based are known to be NP-complete, so many heuristic-based scheduling algorithms have been researched. HEFT and CPOP are such algorithms which have been devised to be effective in heterogeneous environment. We proposed, in the previous research, three scheduling algorithms which are effective in realistic global heterogeneous environment: CPOC, eCPOPC and eCPOP. In this paper, the heuristics which are used in the above five algorithms will be systematically analyzed. Those algorithms will be also studied experimentally using various benchmarks. Experimental results show that the eCPOC generates better schedules than any other algorithms and the heuristics which are used in the proposed algorithms are effective in the global heterogeneous environment.

비방향성 그래프에서의 빠른 신뢰도계산에 관한 연구

  • 이광원;성대현;김유탁
    • Proceedings of the Korean Institute of Industrial Safety Conference
    • /
    • 1998.11a
    • /
    • pp.231-237
    • /
    • 1998
  • 현대산업에서는 눈부신 기술의 발달로 모든 시스템이 대형화, 복잡화되고 있다. 이들 시스템의 고장은 사회적으로 커다란 문제를 야기할 수 있으며, 이에 이들 시스템의 신뢰도 계산은 필요하다. 이때 신뢰도계산을 목적으로 Network나 통신망 등의 시스템구조는 비방향성 graph로 아주 쉽게 표현될 수 있다. 지금까지는 시스템의 신뢰도 계산방법중 가장 빠른 것으로는 domination이론을 이용한 것들이 발표되었으나, 모두 방향성 graph(directed graph)에 대한 연구(1∼8)이었다. 이에 본 연구에서는 non direct graph에서 domination성질을 관찰하여보고, 이의 결과를 기초로 하여 효과적인 신뢰도 계산방법과 식을 제시하여 본다. (중략)

  • PDF

Robust Similarity Measure for Spectral Clustering Based on Shared Neighbors

  • Ye, Xiucai;Sakurai, Tetsuya
    • ETRI Journal
    • /
    • v.38 no.3
    • /
    • pp.540-550
    • /
    • 2016
  • Spectral clustering is a powerful tool for exploratory data analysis. Many existing spectral clustering algorithms typically measure the similarity by using a Gaussian kernel function or an undirected k-nearest neighbor (kNN) graph, which cannot reveal the real clusters when the data are not well separated. In this paper, to improve the spectral clustering, we consider a robust similarity measure based on the shared nearest neighbors in a directed kNN graph. We propose two novel algorithms for spectral clustering: one based on the number of shared nearest neighbors, and one based on their closeness. The proposed algorithms are able to explore the underlying similarity relationships between data points, and are robust to datasets that are not well separated. Moreover, the proposed algorithms have only one parameter, k. We evaluated the proposed algorithms using synthetic and real-world datasets. The experimental results demonstrate that the proposed algorithms not only achieve a good level of performance, they also outperform the traditional spectral clustering algorithms.

THE ANNIHILATING-IDEAL GRAPH OF A RING

  • ALINIAEIFARD, FARID;BEHBOODI, MAHMOOD;LI, YUANLIN
    • Journal of the Korean Mathematical Society
    • /
    • v.52 no.6
    • /
    • pp.1323-1336
    • /
    • 2015
  • Let S be a semigroup with 0 and R be a ring with 1. We extend the definition of the zero-divisor graphs of commutative semigroups to not necessarily commutative semigroups. We define an annihilating-ideal graph of a ring as a special type of zero-divisor graph of a semigroup. We introduce two ways to define the zero-divisor graphs of semigroups. The first definition gives a directed graph ${\Gamma}$(S), and the other definition yields an undirected graph ${\overline{\Gamma}}$(S). It is shown that ${\Gamma}$(S) is not necessarily connected, but ${\overline{\Gamma}}$(S) is always connected and diam$({\overline{\Gamma}}(S)){\leq}3$. For a ring R define a directed graph ${\mathbb{APOG}}(R)$ to be equal to ${\Gamma}({\mathbb{IPO}}(R))$, where ${\mathbb{IPO}}(R)$ is a semigroup consisting of all products of two one-sided ideals of R, and define an undirected graph ${\overline{\mathbb{APOG}}}(R)$ to be equal to ${\overline{\Gamma}}({\mathbb{IPO}}(R))$. We show that R is an Artinian (resp., Noetherian) ring if and only if ${\mathbb{APOG}}(R)$ has DCC (resp., ACC) on some special subset of its vertices. Also, it is shown that ${\overline{\mathbb{APOG}}}(R)$ is a complete graph if and only if either $(D(R))^2=0,R$ is a direct product of two division rings, or R is a local ring with maximal ideal m such that ${\mathbb{IPO}}(R)=\{0,m,m^2,R\}$. Finally, we investigate the diameter and the girth of square matrix rings over commutative rings $M_{n{\times}n}(R)$ where $n{\geq} 2$.