• 제목/요약/키워드: NodeB

Search Result 923, Processing Time 0.024 seconds

Level set method for the simulation of rising bubble based on triangular and Quadrilateral elements (삼각형 요소와 사각형 요소에 기초한 상승기포의 모사를 위한 Level set 방법)

  • Cho, M.H.;Choi, H.G.;Jeon, B.J.;Yoo, J.Y.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2011.05a
    • /
    • pp.10-13
    • /
    • 2011
  • A level set method is proposed to simulate the incompressible two-phase flow considering the effect of surface tension. For reinitialization of level set junction, a direct approach method is employed, instead of solving hyperbolic type equation. A mixed element is adopted, so that the continuity mid Navier-Stokes equations are solved by using the quadratic elements (six-node triangular element mid nine-node quadrilateral element), mid the level set function is solved by using the linear elements (three-node triangular element mid four-node quadrilateral element). In order to verify the accuracy mid robustness of the codes, the present methods are applied to a few benchmark problems. It is confirmed that the present results are in good qualitative mid quantitative agreements with the existing studies.

  • PDF

Development of High-Performance FEM Modeling System Based on Fuzzy Knowledge Processing

  • Lee, Joon-Seong
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.4 no.2
    • /
    • pp.193-198
    • /
    • 2004
  • This paper describes an automatic finite element (FE) mesh generation for three-dimensional structures consisting of tree-form surfaces. This mesh generation process consists of three subprocesses: (a) definition of geometric model, (b) generation of nodes, and (c) generation of elements. One of commercial solid modelers is employed for three-dimensional solid structures. Node is generated if its distance from existing node points is similar to the node spacing function at the point. The node spacing function is well controlled by the fuzzy knowledge processing. The Voronoi diagram method is introduced as a basic tool for element generation. Automatic generation of FE meshes for three-dimensional solid structures holds great benefits for analyses. Practical performances of the present system are demonstrated through several mesh generations for three-dimensional complex geometry.

EETCA: Energy Efficient Trustworthy Clustering Algorithm for WSN

  • Senthil, T.;Kannapiran, Dr.B.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.11
    • /
    • pp.5437-5454
    • /
    • 2016
  • A Wireless Sensor Network (WSN) is composed of several sensor nodes which are severely restricted to energy and memory. Energy is the lifeblood of sensors and thus energy conservation is a critical necessity of WSN. This paper proposes a clustering algorithm namely Energy Efficient Trustworthy Clustering algorithm (EETCA), which focuses on three phases such as chief node election, chief node recycling process and bi-level trust computation. The chief node election is achieved by Dempster-Shafer theory based on trust. In the second phase, the selected chief node is recycled with respect to the current available energy. The final phase is concerned with the computation of bi-level trust, which is triggered for every time interval. This is to check the trustworthiness of the participating nodes. The nodes below the fixed trust threshold are blocked, so as to ensure trustworthiness. The system consumes lesser energy, as all the nodes behave normally and unwanted energy consumption is completely weeded out. The experimental results of EETCA are satisfactory in terms of reduced energy consumption and prolonged lifetime of the network.

Automatic Mesh Generation System for a Novel FEM Modeling Based on Fuzzy Theory (퍼지이론을 이용한 FEM 모델링을 위한 자동 요소분할 시스템)

  • Lee Yang-Chang;Lee Joon-Seong;Choi Yoon-Jong;Kim Nam-Yong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.3
    • /
    • pp.343-348
    • /
    • 2005
  • This paper describes an automatic finite element (FE) mesh generation for three-dimensional structures consisting of free-form surfaces. This mesh generation process consists of three subprocesses: (a) definition of geometric model, i.e. analysis model, (b) generation of nodes, and (c) generation of elements. One of commercial solid modelers is employed for three-dimensional solid structures. Node is generated if its distance from existing node points is similar to the node spacing function at the point. The node spacing function is well controlled by the fuzzy knowledge processing. The Delaunay method is introduced as a basic tool for element generation. Automatic generation of FE meshes for three-dimensional solid structures holds great benefits for analyses. Practical performances of the present system are demonstrated through several mesh generations for three-dimensional complex geometry.

Packet Loss Patterns Adaptive Feedback Scheduling for Reliable Multicast

  • Baek, Jin-Suk;Kim, Cheon-Shik;Hong, You-Sik
    • Journal of Ubiquitous Convergence Technology
    • /
    • v.1 no.1
    • /
    • pp.28-34
    • /
    • 2007
  • Tree-based reliable multicast protocols provide scalability by distributing error-recovery tasks among several repair nodes. These repair nodes perform local error recovery for their receiver nodes using the data stored in their buffers. We propose a packet loss patterns adaptive feedback scheduling scheme to manage these buffers in an efficient manner. Under our scheme, receiver nodes send NAKs to repair nodes to request packet retransmissions only when the packet losses are independent events from other nodes. At dynamic and infrequent intervals, they also send ACKs to indicate which packets can be safely discarded from the repair node's buffer. Our scheme reduces delay in error recovery because the requested packets are almost always available in the repair node's buffers. It also reduces the repair node's workload because (a) each receiver node sends infrequent ACKs with non-fixed intervals and (b) their sending times are fairly distributed among all the receiver nodes.

  • PDF

Automatic Mesh Generation System for a Novel FEM Modeling Based on Fuzzy Theory (퍼지이론을 이용한 FEM 모델링을 위한 자동 요소분할 시스템)

  • Lee Joon-Seong;Lee Yang-Chang;Choi Yoon-Jong
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2005.04a
    • /
    • pp.139-142
    • /
    • 2005
  • This paper describes an automatic finite element (FE) mesh generation for three-dimensional structures consisting of free-form surfaces. This mesh generation process consists of three subprocesses: (a) definition of geometric model, i.e. analysis model, (b) generation of nodes, and (c) generation of elements. One of commercial sol id modelers is employed for three-dimensional sol id structures. Node is generated if its distance from existing node points is similar to the node spacing function at the point. The node spacing function is well control led by the fuzzy knowledge processing. The Delaunay method is introduced as a basic tool for element generation. Automatic generation of FE meshes for three-dimensional sol id structures holds great benefits for analyses. Practical performances of the present system are demonstrated through several mesh generations for three-dimensional complex geometry.

  • PDF

Authentication Scheme in Wireless Mobile Multi-hop Networks (무선 모바일 멀티 홉 네트워크에서의 인증 기법 고찰 및 개선)

  • Lee, Yong;Lee, Goo Yeon
    • Journal of Industrial Technology
    • /
    • v.27 no.B
    • /
    • pp.43-51
    • /
    • 2007
  • In mobile multi-hop wireless networks, the authentication between a base station and a mobile multi-hop node, between multi-hop nodes, and between user a station and a multi-hop node is needed for the reliable and secure network operation. In this paper, we survey various authentication schemes which can be considered to be adopted in mobile multi-hop wireless networks and propose a concept of novel mutual authentication scheme applicable to mobile multi-hop network architecture. The scheme should resolve the initial trust gain problem of a multi-hop node at its entry to the network, the problem of rogue mobile multi-hop node and the problem of hop-by-hop authentication between multi-hop nodes. Effectively, the scheme is a hybrid scheme of the distributed authentication method and the centralized authentication method which are considered to be deployed in the wireless ad-hoc network and the wireless network connected to wired authentication servers, respectively.

  • PDF

AS B-tree: A study on the enhancement of the insertion performance of B-tree on SSD (AS B-트리: SSD를 사용한 B-트리에서 삽입 성능 향상에 관한 연구)

  • Kim, Sung-Ho;Roh, Hong-Chan;Lee, Dae-Wook;Park, Sang-Hyun
    • The KIPS Transactions:PartD
    • /
    • v.18D no.3
    • /
    • pp.157-168
    • /
    • 2011
  • Recently flash memory has been being utilized as a main storage device in mobile devices, and flashSSDs are getting popularity as a major storage device in laptop and desktop computers, and even in enterprise-level server machines. Unlike HDDs, on flash memory, the overwrite operation is not able to be performed unless it is preceded by the erase operation to the same block. To address this, FTL(Flash memory Translation Layer) is employed on flash memory. Even though the modified data block is overwritten to the same logical address, FTL writes the updated data block to the different physical address from the previous one, mapping the logical address to the new physical address. This enables flash memory to avoid the high block-erase cost. A flashSSD has an array of NAND flash memory packages so it can access one or more flash memory packages in parallel at once. To take advantage of the internal parallelism of flashSSDs, it is beneficial for DBMSs to request I/O operations on sequential logical addresses. However, the B-tree structure, which is a representative index scheme of current relational DBMSs, produces excessive I/O operations in random order when its node structures are updated. Therefore, the original b-tree is not favorable to SSD. In this paper, we propose AS(Always Sequential) B-tree that writes the updated node contiguously to the previously written node in the logical address for every update operation. In the experiments, AS B-tree enhanced 21% of B-tree's insertion performance.

Survey of B-ISUP Protocol for B-ISDN Network Node Interface (B-ISDN 망간 신호방식에 적용되는 사용자부 프로토콜의 검토)

  • Kim, K.Y,;Kim, W.S.
    • Electronics and Telecommunications Trends
    • /
    • v.9 no.3
    • /
    • pp.169-190
    • /
    • 1994
  • 본 고에서는 B-ISDN 망간 신호방식에 적용되는 사용자부 프로토콜에 대하여 기술한다. 기본적인 내용 구성은 B-ISUP(B-ISDN User Part)의 ITU-T 권고안 구성, 체계, 배경, 목적, 기능 그리고 메시지와 파라미터의 구성 및 기본호 절차로 이루어져 있다. 또한 미래 확장 가능한 기능에 대하여도 기술하며 마지막으로 간단하게 N-ISDN과의 연동시 메시지와 절차에 대해서도 기술한다.

Index based on Constraint Network for Spatio-Temporal Aggregation of Trajectory in Spatial Data Warehouse

  • Li Jing Jing;Lee Dong-Wook;You Byeong-Seob;Oh Young-Hwan;Bae Hae-Young
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.12
    • /
    • pp.1529-1541
    • /
    • 2006
  • Moving objects have been widely employed in traffic and logistic applications. Spatio-temporal aggregations mainly describe the moving object's behavior in the spatial data warehouse. The previous works usually express the object moving in some certain region, but ignore the object often moving along as the trajectory. Other researches focus on aggregation and comparison of trajectories. They divide the spatial region into units which records how many times the trajectories passed in the unit time. It not only makes the storage space quite ineffective, but also can not maintain spatial data property. In this paper, a spatio-temporal aggregation index structure for moving object trajectory in constrained network is proposed. An extended B-tree node contains the information of timestamp and the aggregation values of trajectories with two directions. The network is divided into segments and then the spatial index structure is constructed. There are the leaf node and the non leaf node. The leaf node contains the aggregation values of moving object's trajectory and the pointer to the extended B-tree. And the non leaf node contains the MBR(Minimum Bounding Rectangle), MSAV(Max Segment Aggregation Value) and its segment ID. The proposed technique overcomes previous problems efficiently and makes it practicable finding moving object trajectory in the time interval. It improves the shortcoming of R-tree, and makes some improvement to the spatio-temporal data in query processing and storage.

  • PDF