• Title/Summary/Keyword: Tree-Based Network

Search Result 632, Processing Time 0.025 seconds

Dendroclimatological Investigation of High Altitude Himalayan Conifers and Tropical Teak In India

  • Borgaonkar, H.P.;Sikder, A.B.;Ram, Somaru;Kumar, K. Rupa;Pant, G.B.
    • The Korean Journal of Quaternary Research
    • /
    • v.21 no.1
    • /
    • pp.15-26
    • /
    • 2007
  • A wide tree-ring data network from Western Himalayan region as well as from Central and Peninsular India have been established by the Indian Institute of Tropical Meteorology (IITM), Pune, India. This includes several ring width and density chronologies of Himalayan conifers (Pinus, Picea, Cedrus, Abies)covering entire area of Western Himalaya and teak (Tectona grandis L.F.) from central and peninsular India. Many of these chronologies go back to $15^{th}$ century. Tree-ring based reconstructed pre-monsoon (March-April-May) summer climate of Western Himalaya do not show any significant increasing or decreasing trend since past several centuries. High altitude tree-ring chronologies near tree line-glacier boundary are sensitive to the winter temperature. Unprecedented higher growth in recent decades is closely associated with the warming trend over the Himalayan region. Dendroclimatic analysis of teak (Tectona grandis) from Central and Peninsular India show significant relationship with pre-monsoon and monsoon climate. Moisture index over the region indicates strong association with tree-ring variations rather than the direct influence of rainfall. It is evident that, two to three consecutive good monsoon years are capable of maintaining normal or above normal tree growth, even though the following year is low precipitation year.

  • PDF

Some Theoretical Results on the Algorithm for the Tree-like Queueing Networks with Blocking (봉쇄가 존재하는 나무형태 대기행렬 네트워크 알고리듬의 이론적 고찰)

  • Lee, Hyo-Seong
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.22 no.4
    • /
    • pp.51-69
    • /
    • 1997
  • Recently Lee et al[5] developed an approximation algorithm for the performance evaluation of the open queueing networks with blocking. This algorithm, which solves the exponential queueing networks with general configuration is developed based on the symmetrical decomposition approach and is reported to have many advantages over the previous algorithmsf. In addition to being very accurate, this algorithm is reported to be quite simple, pretty fast and solves very general configurations. In this study, we show that if a network has a tree-like configurations, the algorithm developed by Lee at al, always converges to the unique solution. To prove the theoretical results pertaining to the algorithm, some properties associated with symmetrical decomposition approach are exploited. The results obtained in this study such as the proofs of convergence of the algorithm as well as uniquences of the solution would contribute to the theoretical study for the non-tandem configurating of open queueing network.

  • PDF

Determination of Multicast Routing Scheme for Traffic Overload in network system (네트워크 시스템에서 트래픽 부하에 따른 멀티캣트 라우팅 방식)

  • Seul, Nam-O
    • Proceedings of the KIEE Conference
    • /
    • 2005.07d
    • /
    • pp.2936-2938
    • /
    • 2005
  • The deployment of multicast communication services in the internet is expected to lead a stable packet transfer even in heavy traffic as in network system environment. The core based tree scheme among many multicast protocols is the most popular and suggested recently. However, CBT exhibit two major deficiencies such as traffic concentration or poor core placement problem. so, measuring the bottleneck link bandwidth along a path is important for understanding th performance of multicast. We propose not only a definition of CBT's core link state that Steady-State, Normal-State and Bottleneck State according to the estimation link speed rate, but also the changeover of multicast routing scheme for traffic overload. In addition, we introduce anycast routing tree, a efficient architecture for construst shard multicast trees.

  • PDF

A Survey of Applications of Artificial Intelligence Algorithms in Eco-environmental Modelling

  • Kim, Kang-Suk;Park, Joon-Hong
    • Environmental Engineering Research
    • /
    • v.14 no.2
    • /
    • pp.102-110
    • /
    • 2009
  • Application of artificial intelligence (AI) approaches in eco-environmental modeling has gradually increased for the last decade. Comprehensive understanding and evaluation on the applicability of this approach to eco-environmental modeling are needed. In this study, we reviewed the previous studies that used AI-techniques in eco-environmental modeling. Decision Tree (DT) and Artificial Neural Network (ANN) were found to be major AI algorithms preferred by researchers in ecological and environmental modeling areas. When the effect of the size of training data on model prediction accuracy was explored using the data from the previous studies, the prediction accuracy and the size of training data showed nonlinear correlation, which was best-described by hyperbolic saturation function among the tested nonlinear functions including power and logarithmic functions. The hyperbolic saturation equations were proposed to be used as a guideline for optimizing the size of training data set, which is critically important in designing the field experiments required for training AI-based eco-environmental modeling.

REVIEW OF VARIOUS DYNAMIC MODELING METHODS AND DEVELOPMENT OF AN INTUITIVE MODELING METHOD FOR DYNAMIC SYSTEMS

  • Shin, Seung-Ki;Seong, Poong-Hyun
    • Nuclear Engineering and Technology
    • /
    • v.40 no.5
    • /
    • pp.375-386
    • /
    • 2008
  • Conventional static reliability analysis methods are inadequate for modeling dynamic interactions between components of a system. Various techniques such as dynamic fault tree, dynamic Bayesian networks, and dynamic reliability block diagrams have been proposed for modeling dynamic systems based on improvement of the conventional modeling methods. In this paper, we review these methods briefly and introduce dynamic nodes to the existing reliability graph with general gates (RGGG) as an intuitive modeling method to model dynamic systems. For a quantitative analysis, we use a discrete-time method to convert an RGGG to an equivalent Bayesian network and develop a software tool for generation of probability tables.

Loss Reduction in Heavy Loaded Distribution Networks Using Cyclic Sub Tree Search (순환적 부분트리 탐색법을 이용한 중부하 배전계통의 손실최소화)

  • Choi, Sang-Yule;Shin, Myong-Chul
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.50 no.5
    • /
    • pp.241-247
    • /
    • 2001
  • Network reconfiguration in distribution systems is realized by changing the status of sectionalizing switches, and is usually done for loss reduction of load balancing in the system. This paper presents an effective heuristic based switching scheme to solve the distribution feeder loss reduction problem. The proposed algorithm consists of two parts. One is to set up a decision tree to represent the various switching operations available. Another is to apply a proposed technique called cyclic best first search. the proposed algorithm identify the most effective the set of switch status configuration of distribution system for loss reduction. To demonstrate the validity of the proposed algorithm, numerical calculations are carried out the 32, 69 bus system models.

  • PDF

Simple Assessment of Taxonomic Status and Genetic Diversity of Korean Long-Tailed Goral (Naemorhedus caudatus) Based on Partial Mitochondrial Cytochrome b Gene Using Non-Invasive Fecal Samples

  • Kim, Baek-Jun
    • Proceedings of the National Institute of Ecology of the Republic of Korea
    • /
    • v.2 no.1
    • /
    • pp.32-41
    • /
    • 2021
  • South Korea presently harbors less than 800 long-tailed gorals (Naemorhedus caudatus), an endangered species. I report for the first time on the taxonomic status and genetic diversity of the Korean species using non-invasive fecal sampling based on mitochondrial cytochrome b gene sequence analyses. To determine the taxonomic status of this species, I reconstructed a consensus neighbor-joining tree and generated a minimum spanning network combining haplotype sequences obtained from feces with a new goral-specific primer set developed using known sequences of the Korean goral and related species (e.g., Russian goral, Chinese goral, Himalayan goral, Japanese serow, etc.). I also examined the genetic diversity of this species. The Korean goral showed only three different haplotypes. The phylogenetic tree and parsimony haplotype network revealed a single cluster of Korean and Russian gorals, separate from related species. Generally, the Korean goral has a relatively low genetic diversity compared with that of other ungulate species (e.g., moose and red deer). I preliminarily showcased the application of non-invasive fecal sampling to the study of genetic characteristics, including the taxonomic status and genetic diversity of gorals, based on mitochondrial DNA. More phylogenetic studies are necessary to ensure the conservation of goral populations throughout South Korea.

Hash Tree based Communication Protocol in V2X Environments Including Internet of Vehicles for Providing Secure Vehicular Communication Services (차량인터넷을 포함한 V2X 환경에서 안전한 차량 통신 서비스 제공을 위한 해시 트리 기반 통신 프로토콜)

  • Jin, Byungwook;Cha, Siho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.1
    • /
    • pp.27-34
    • /
    • 2018
  • Various messages generated in vehicles are transmitted based on the wireless telecommunication which is a core technology of vehicle to everything (V2X). However, the hackers attack them upon penetration to the system and network to cause the generation of users' inconveniences for vehicular communication. Moreover, huge damage could be occurred in terms of physical and materialistic areas if the users in the vehicles were attacked in the communication environment. Therefore, this study was to design the safe communication protocol using hash tree technique in the V2X environments. Using hash tree technique, processes of issuing certificate and registration and communication protocol were designed, and safety analysis was performed on the attacking technique which is occurred in the existing vehicles. Approximately 62% of decrease in the capacity analysis was found upon comparative analysis of telecommunication processes with the system to issue the certificate which is used in the existing vehicles.

An Efficient Overlay for Unstructured P2P File Sharing over MANET using Underlying Cluster-based Routing

  • Shah, Nadir;Qian, Depei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.799-818
    • /
    • 2010
  • In traditional unstructured P2P file sharing network, each peer establishes connections with a certain number of randomly chosen other peers. This would lead to redundant traffic and P2P network partition in mobile ad hoc network (MANET). We propose an approach to construct an efficient unstructured P2P overlay over MANET using underlying cluster-based routing (CBRP). One of the peers in the P2P network is used as a root-peer to connect all peers. Each peer maintains connection with physically closer peers such that it can reach the root-peer. The peer constructs a minimum-spanning tree consisting of itself, its directly connected neighbor peers and 2-hop away neighbor peers to remove far away redundant links and to build an overlay closer to the physical network. Due to on-demand nature of inter-cluster routing of CBRP, the positioning algorithm for MANET is used to retrieve the file by a peer from the source peer via shorter path in the physical network. We can show by simulation that our approach performs better in comparison with the existing approach.

A Comparison of Predicting Movie Success between Artificial Neural Network and Decision Tree (기계학습 기반의 영화흥행예측 방법 비교: 인공신경망과 의사결정나무를 중심으로)

  • Kwon, Shin-Hye;Park, Kyung-Woo;Chang, Byeng-Hee
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.4
    • /
    • pp.593-601
    • /
    • 2017
  • In this paper, we constructed the model of production/investment, distribution, and screening by using variables that can be considered at each stage according to the value chain stage of the movie industry. To increase the predictive power of the model, a regression analysis was used to derive meaningful variables. Based on the given variables, we compared the difference in predictive power between the artificial neural network, which is a machine learning analysis method, and the decision tree analysis method. As a result, the accuracy of artificial neural network was higher than that of decision trees when all variables were added in production/ investment model and distribution model. However, decision trees were more accurate when selected variables were applied according to regression analysis results. In the screening model, the accuracy of the artificial neural network was higher than the accuracy of the decision tree regardless of whether the regression analysis result was reflected or not. This paper has an implication which we tried to improve the performance of movie prediction model by using machine learning analysis. In addition, we tried to overcome a limitation of linear approach by reflecting the results of regression analysis to ANN and decision tree model.