• Title/Summary/Keyword: Shortest Path Problem

Search Result 242, Processing Time 0.021 seconds

A Study on Application of Teaching-Learning Program based on Constructivist Views for Mathematically gifted Students in Primary School (초등 영재 교육에서의 구성주의 교수.학습 모형 적용 연구 - 알고리즘 문제를 중심으로 -)

  • Choi, Keun-Bae;Kim, Hong-Seon
    • Communications of Mathematical Education
    • /
    • v.21 no.2 s.30
    • /
    • pp.153-176
    • /
    • 2007
  • The purpose of this paper is to analyze teaching-learning program which can be applied to mathematically gifted students in primary school, Our program is based on constructivist views on teaching and learning of mathematics. Mainly, we study the algorithmic thinking of mathematically gifted students in primary school in connection with the network problems; Eulerian graph problem, the minimum connector problem, and the shortest path problem, The above 3-subjects are not familiar with primary school mathematics, so that we adapt teaching-learning model based on the social constructivism. To achieve the purpose of this study, seventeen students in primary school participated in the study, and video type(observation) and student's mathematical note were used for collecting data while the students studied. The results of our study were summarized as follows: First, network problems based on teaching-learning model of constructivist views help students learn the algorithmic thinking. Second, the teaching-learning model based on constructivist views gives an opportunity of various mathematical thinking experience. Finally, the teaching-learning model based on constructivist views needs more the ability of teacher's research and the time of teaching for students than an ordinary teaching-learning model.

  • PDF

QoS-Aware Approach for Maximizing Rerouting Traffic in IP Networks

  • Cui, Wenyan;Meng, Xiangru;Yang, Huanhuan;Kang, Qiaoyan;Zhao, Zhiyuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4287-4306
    • /
    • 2016
  • Network resilience provides an effective way to overcome the problem of network failure and is crucial to Internet protocol (IP) network management. As one of the main challenges in network resilience, recovering from link failure is important to maintain the constancy of packets being transmitted. However, existing failure recovery approaches do not handle the traffic engineering problem (e.g., tuning the routing-protocol parameters to optimize the rerouting traffic flow), which may cause serious congestions. Moreover, as the lack of QoS (quality of service) restrictions may lead to invalid rerouting traffic, the QoS requirements (e.g., bandwidth and delay) should also be taken into account when recovering the failed links. In this paper, we first develop a probabilistically correlated failure model that can accurately reflect the correlation between link failures, with which we can choose reliable backup paths (BPs). Then we construct a mathematical model for the failure recovery problem, which takes maximum rerouting traffic as the optimizing objective and the QoS requirements as the constraints. Moreover, we propose a heuristic algorithm for link failure recovery, which adopts the improved k shortest path algorithm to splice the single BP and supplies more protection resources for the links with higher priority. We also prove the correctness of the proposed algorithm. Moreover, the time and space complexity are also analyzed. Simulation results under NS2 show that the proposed algorithm improves the link failure recovery rate and increases the QoS satisfaction rate significantly.

A String Reconstruction Algorithm and Its Application to Exponentiation Problems (문자열 재구성 알고리즘 및 멱승문제 응용)

  • Sim, Jeong-Seop;Lee, Mun-Kyu;Kim, Dong-Kyue
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.9_10
    • /
    • pp.476-484
    • /
    • 2008
  • Most string problems and their solutions are relevant to diverse applications such as pattern matching, data compression, recently bioinformatics, and so on. However, there have been few works on the relations between string problems and cryptographic problems. In this paper, we consider the following string reconstruction problems and show how these problems can be applied to cryptography. Given a string x of length n over a constant-sized alphabet ${\sum}$ and a set W of strings of lengths at most an integer $k({\leq}n)$, the first problem is to find the sequence of strings in W that reconstruct x by the minimum number of concatenations. We propose an O(kn+L)-time algorithm for this problem, where L is the sum of all lengths of strings in a given set, using suffix trees and a shortest path algorithm for directed acyclic graphs. The other is a dynamic version of the first problem and we propose an $O(k^3n+L)$-time algorithm. Finally, we show that exponentiation problems that arise in cryptography can be successfully reduced to these problems and propose a new solution for exponentiation.

Virtual Network Embedding through Security Risk Awareness and Optimization

  • Gong, Shuiqing;Chen, Jing;Huang, Conghui;Zhu, Qingchao;Zhao, Siyi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.2892-2913
    • /
    • 2016
  • Network virtualization promises to play a dominant role in shaping the future Internet by overcoming the Internet ossification problem. However, due to the injecting of additional virtualization layers into the network architecture, several new security risks are introduced by the network virtualization. Although traditional protection mechanisms can help in virtualized environment, they are not guaranteed to be successful and may incur high security overheads. By performing the virtual network (VN) embedding in a security-aware way, the risks exposed to both the virtual and substrate networks can be minimized, and the additional techniques adopted to enhance the security of the networks can be reduced. Unfortunately, existing embedding algorithms largely ignore the widespread security risks, making their applicability in a realistic environment rather doubtful. In this paper, we attempt to address the security risks by integrating the security factors into the VN embedding. We first abstract the security requirements and the protection mechanisms as numerical concept of security demands and security levels, and the corresponding security constraints are introduced into the VN embedding. Based on the abstraction, we develop three security-risky modes to model various levels of risky conditions in the virtualized environment, aiming at enabling a more flexible VN embedding. Then, we present a mixed integer linear programming formulation for the VN embedding problem in different security-risky modes. Moreover, we design three heuristic embedding algorithms to solve this problem, which are all based on the same proposed node-ranking approach to quantify the embedding potential of each substrate node and adopt the k-shortest path algorithm to map virtual links. Simulation results demonstrate the effectiveness and efficiency of our algorithms.

Independent Set Bin Packing Algorithm for Routing and Wavelength Assignment (RWA) Problem (경로설정과 파장 배정 문제의 독립집합 상자 채우기 알고리즘)

  • Lee, Sang-Un
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.1
    • /
    • pp.111-118
    • /
    • 2015
  • This paper deals with the routing and wavelength assignment problem (RWAP) that decides the best lightpaths for multiple packet demands for (s,t) in optical communication and assigns the minimum number of wavelengths to given lightpaths. There has been unknown of polynomial-time algorithm to obtain the optimal solution for RWAP. Hence, the RWAP is classified as NP-complete problem and one can obtain the approximate solution in polynomial-time. This paper decides the shortest main and alternate lightpath with same hop count for all (s,t) for given network in advance. When the actual demands of communication for particular multiple packet for (s,t), we decrease the maximum utilized edge into b utilized number using these dual-paths. Then, we put these (s,t) into b-wavelength bins without duplicated edge. This algorithm can be get the optimal solution within O(kn) computational complexity. For two experimental data, the proposed algorithm shows that can be obtain the known optimal solution.

Real-Time Change Detection Architecture Based on SOM for Video Surveillance Systems (영상 감시시스템을 위한 SOM 기반 실시간 변화 감지 기법)

  • Kim, Jongwon;Cho, Jeongho
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.4
    • /
    • pp.109-117
    • /
    • 2019
  • In modern society, due to various accidents and crime threats committed to an unspecified number of people, individual security awareness is increasing throughout society and various surveillance techniques are being actively studied. Still, there is a decline in robustness due to many problems, requiring higher reliability monitoring techniques. Thus, this paper suggests a real-time change detection technique to complement the low robustness problem in various environments and dynamic/static change detection and to solve the cost efficiency problem. We used the Self-Organizing Map (SOM) applied as a data clustering technique to implement change detection, and we were able to confirm the superiority of noise robustness and abnormal detection judgment compared to the detection technique applied to the existing image surveillance system through simulation in the indoor office environment.

A Coordinate System of Classification for Effective Visualizations of Story Properties (스토리 창작 특성의 효과적 가시화를 위한 분류 좌표계 연구)

  • Kim, Myoung-Jun
    • Journal of Digital Contents Society
    • /
    • v.18 no.6
    • /
    • pp.1119-1125
    • /
    • 2017
  • Genres and actions of stories can be used to classify stories, and used effectively as well for visualizing story properties. This paper proposes a Genre-Action coordinate system for visualizing story property data in 2-dimension that has similarities between the genre and action items along the axes, i.e. a property of spatial continuum. With the proposed Genre-Action coordinate system we found that the genre and action items in the axes are arranged according to their similarities and we were able to achieve a spatially meaningful visualization of story properties where the related data form clusters.

Route Determination Service for the Open LBS (개방형 LBS 를 위한 경로탐색 서비스)

  • Kim, Sung-Soo;Kim, Jae-Chul;Kim, Kwang-Soo;Park, Jong-Hyun;Lee, Jong-Hun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11b
    • /
    • pp.713-716
    • /
    • 2003
  • 현재 국내 LBS 가 중요한 서비스로 널리 확산되기 위해서는 서비스간의 상호운용성이 제공되어야 한다. 본 논문에서는 LBS 서비스간 상호운용성을 제공하는 개방형 LBS 를 위한 경로탐색 서비스에 대한 설계 및 구현기법을 제시한다. 최단경로문제(Shortest Path Problem)는 통신망 및 교통망의 분석, 생산라인의 품질 관리 등의 다양한 분야 등의 네트워크 흐름 최적화 문제 중에서 가장 많이 연구되고 있는 문제다. 도로 교통망에서는 교차로상에서의 회전 제약 문제 등의 제한조건이 존재한다. 본 논문에서 경로탐색은 듀얼 그래프(dual graph)를 이용하여 회전제약조건을 만족하는 경로를 구할 수 있었고, 사용자 경로탐색 기준에 따른 탐색기법도 제시한다. 또한, 구현된 서비스는OpenLS의 표준화된 인터페이스를 구현하여 상호운용성(interoperability)을 지원하며, 자바를 이용한 웹서비스로 구현되어 이식성, 운영체제 및 프로그래밍 언어 독립성을 제공할 수 있는 장점이 있다.

  • PDF

Virtual Network Embedding with Multi-attribute Node Ranking Based on TOPSIS

  • Gon, Shuiqing;Chen, Jing;Zhao, Siyi;Zhu, Qingchao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.522-541
    • /
    • 2016
  • Network virtualization provides an effective way to overcome the Internet ossification problem. As one of the main challenges in network virtualization, virtual network embedding refers to mapping multiple virtual networks onto a shared substrate network. However, existing heuristic embedding algorithms evaluate the embedding potential of the nodes simply by the product of different resource attributes, which would result in an unbalanced embedding. Furthermore, ignoring the hops of substrate paths that the virtual links would be mapped onto may restrict the ability of the substrate network to accept additional virtual network requests, and lead to low utilization rate of resource. In this paper, we introduce and extend five node attributes that quantify the embedding potential of the nodes from both the local and global views, and adopt the technique for order preference by similarity ideal solution (TOPSIS) to rank the nodes, aiming at balancing different node attributes to increase the utilization rate of resource. Moreover, we propose a novel two-stage virtual network embedding algorithm, which maps the virtual nodes onto the substrate nodes according to the node ranks, and adopts a shortest path-based algorithm to map the virtual links. Simulation results show that the new algorithm significantly increases the long-term average revenue, the long-term revenue to cost ratio and the acceptance ratio.

Correlation Analysis between Traffic and Speed on the road using Taxi Data (택시 데이터를 이용한 구간 내 교통량과 차량 속도 간의 상관관계 분석)

  • Kim, Hoyong;Jung, Hanmin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.586-589
    • /
    • 2018
  • As the convergence of traffic system and Big-data technology, new convenient services which is helpful for drivers and pedestrian are appeared. Recently, the various researches about the traffic system, such as prediction of traffic jam and finding the shortest path, are studied. In this paper, we collect the data of taxi trips in Daegu City, and visualize them on the map of Daegu City. And then, we select specific sections of roads in the city, and by using the data of location and speed about taxis and the information of the road sections, calculate the traffic of that section and the average speed of cars on that section. As a result of this, we give help solving the problem of the specific road sections.

  • PDF