• Title/Summary/Keyword: Tree-Based Network

Search Result 634, Processing Time 0.025 seconds

A study on Public Key Authentication using Polynomial Secret Sharing in WSN (무선센서네트워크에서 다항식 비밀분산을 이용한 공개키 인증방식에 관한 연구)

  • Kim, Il-Do;Kim, Dong-Cheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.11
    • /
    • pp.2479-2487
    • /
    • 2009
  • Earlier researches on Sensor Networks preferred symmetric key-based authentication schemes in consideration of limitations in network resources. However, recent advancements in cryptographic algorithms and sensor-node manufacturing techniques have opened suggestion to public key-based solutions such as Merkle tree-based schemes. This paper proposes a new concept of public key-based authentication using Polynomial Secret Sharing that can be effectively applied to sensor networks and a detection of malicious node using the hash function. This scheme is based on exponential distributed data concept, a derivative from Shamir's (t,n) threshold scheme, in which the authentication of neighbouring nodes are done simultaneously while minimising resources of sensor nodes and providing network scalability.

Hierarchical Binary Search Tree (HBST) for Packet Classification (패킷 분류를 위한 계층 이진 검색 트리)

  • Chu, Ha-Neul;Lim, Hye-Sook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.3B
    • /
    • pp.143-152
    • /
    • 2007
  • In order to provide new value-added services such as a policy-based routing and the quality of services in next generation network, the Internet routers need to classify packets into flows for different treatments, and it is called a packet classification. Since the packet classification should be performed in wire-speed for every packet incoming in several hundred giga-bits per second, the packet classification becomes a bottleneck in the Internet routers. Therefore, high speed packet classification algorithms are required. In this paper, we propose an efficient packet classification architecture based on a hierarchical binary search fee. The proposed architecture hierarchically connects the binary search tree which does not have empty nodes, and hence the proposed architecture reduces the memory requirement and improves the search performance.

Energy Efficient Clustering Scheme in Sensor Networks using Splitting Algorithm of Tree-based Indexing Structures (트리기반 색인구조의 분할 방법을 이용한 센서네트워크의 에너지 효율적인 클러스터 생성 방법)

  • Kim, Hyun-Duk;Yu, Bo-Seon;Choi, Won-Ik
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.10
    • /
    • pp.1534-1546
    • /
    • 2010
  • In sensor network systems, various hierarchical clustering schemes have been proposed in order to efficiently maintain the energy consumption of sensor nodes. Most of these schemes, however, are hardly applicable in practice since these schemes might produce unbalanced clusters or randomly distributed clusters without taking into account of the distribution of sensor nodes. To overcome the limitations of such hierarchical clustering schemes, we propose a novel scheme called CSM(Clustering using Split & Merge algorithm), which exploits node split and merge algorithm of tree-based indexing structures to efficiently construct clusters. Our extensive performance studies show that the CSM constructs highly balanced clustering in a energy efficient way and achieves higher performance up to 1.6 times than the previous clustering schemes, under various operational conditions.

Protection Switching Methods for Point-to-Multipoint Connections in Packet Transport Networks

  • Kim, Dae-Ub;Ryoo, Jeong-dong;Lee, Jong Hyun;Kim, Byung Chul;Lee, Jae Yong
    • ETRI Journal
    • /
    • v.38 no.1
    • /
    • pp.18-29
    • /
    • 2016
  • In this paper, we discuss the issues of providing protection for point-to-multipoint connections in both Ethernet and MPLS-TP-based packet transport networks. We introduce two types of per-leaf protection-linear and ring. Neither of the two types requires that modifications to existing standards be made. Their performances can be improved by a collective signal fail mechanism proposed in this paper. In addition, two schemes - tree protection and hybrid protection - are newly proposed to reduce the service recovery time when a single failure leads to multiple signal fail events, which in turn places a significant amount of processing burden upon a root node. The behavior of the tree protection protocol is designed with minimal modifications to existing standards. The hybrid protection scheme is devised to maximize the benefits of per-leaf protection and tree protection. To observe how well each scheme achieves an efficient traffic recovery, we evaluate their performances using a test bed as well as computer simulation based on the formulae found in this paper.

A Study on the Deep Learning-based Tree Species Classification by using High-resolution Orthophoto Images (고해상도 정사영상을 이용한 딥러닝 기반의 산림수종 분류에 관한 연구)

  • JANG, Kwangmin
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.24 no.3
    • /
    • pp.1-9
    • /
    • 2021
  • In this study, we evaluated the accuracy of deep learning-based tree species classification model trained by using high-resolution images. We selected five species classed, i.e., pine, birch, larch, korean pine, mongolian oak for classification. We created 5,000 datasets using high-resolution orthophoto and forest type map. CNN deep learning model is used to tree species classification. We divided training data, verification data, and test data by a 5:3:2 ratio of the datasets and used it for the learning and evaluation of the model. The overall accuracy of the model was 89%. The accuracy of each species were pine 95%, birch 89%, larch 80%, korean pine 86% and mongolian oak 98%.

The Geometric Properties of the Drainage Structures based on Fractal Tree (Fractal 나무를 기반으로 한 배수구조의 기하학적 특성)

  • Kim, Joo-Cheol;Kim, Jae-Han
    • Journal of Korea Water Resources Association
    • /
    • v.41 no.8
    • /
    • pp.797-806
    • /
    • 2008
  • The geometric properties of the drainage structures are analyzed through depicting the drainage network which is composed of the whole drainage paths in the natural basin defined at the specific scale. The theoretical consideration is performed on the general structures of networks organized by ramification process based on Fractal tree and Horton's law. The drainage network is generated via ArcGIS, ordered by Strahler's ordering scheme and investigated with Strahler's order. As a results of the Richardson's method it is shown that there may exist the distinct behavioral characteristics between overland-flow and channel flow and the natural stream networks would be space-filling Fractals. As a result, it is shown that the values estimated by considering the overland-flow on being applied to the field data give the different results from the empirical method applied until now. As expected, therefore the results obtained from this study are sure to be devoted further researches on the channel networks.

Performance Analysis of Deadlock-free Multicast Algorithms in Torus Networks (토러스 네트워크에서 무교착 멀티캐스트 알고리즘의 성능분석)

  • Won, Bok-Hee;Choi, Sang-Bang
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.3
    • /
    • pp.287-299
    • /
    • 2000
  • In this paper, we classify multicast methods into three categories, i.e., tree-based, path-based, and hybrid-based multicasts, for a multicomputer employing the bidirectional torus network and wormhole routing. We propose the dynamic partition multicast routing (DPMR) as a path-based algorithm. As a hybrid-based algorithm, we suggest the hybrid multicast routing (HMR), which employs the tree-based approach in the first phase of routing and the path-based approach in the second phase. Performance is measured in terms of the average latency for various message length to compare three multicast routing algorithms. We also compare the performance of wormhole routing having variable buffer size with virtual cut-through switching. The message latency for each switching method is compared using the DPMR algorithm to evaluate the buffer size trade-off on the performance.

  • PDF

Bayesian Inferrence and Context-Tree Matching Method for Intelligent Services in a Mobile Environment (모바일 환경에서의 지능형 서비스를 위한 베이지안 추론과 컨텍스트 트리 매칭방법)

  • Kim, Hee-Taek;Min, Jun-Ki;Cho, Sung-Bae
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.2
    • /
    • pp.144-152
    • /
    • 2009
  • To provide intelligent service in mobile environment, it needs to estimate user's intention or requirement, through analyzing context information of end-users such as preference or behavior patterns. In this paper, we infer context information from uncertain log stored in mobile device. And we propose the inference method of end-user's behavior to match context information with service, and the proposed method is based on context-tree. We adopt bayesian probabilistic method to infer uncertain context information effectively, and the context-tree is constructed to utilize non-numerical context which is hard to handled with mathematical method. And we verify utility of proposed method by appling the method to intelligent phone book service.

Case Analyses of the Selection Process of an Excavation Method (지하공사 사례를 기반으로 한 터파기 공법 선정프로세스 분석)

  • Park, Sang-Hyun;Lee, Ghang;Choi, Myung-Seok;Kang, Hyun-Jeong;Rhim, Hong-Cheol
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2007.04a
    • /
    • pp.101-104
    • /
    • 2007
  • As the proportion of underground construction increases, the impact of inappropriate selection of a underground construction method for a construction size increases. The purpose of this study is to develop an objective way of selecting an excavation method. There have been several attempts to achieve the same goal using various data mining methods such as the artificial neural network, the support vector machine, and the case-based reasoning. However, they focused only on the selection of a retaining wall construction method out of six types of retaining walls. When we categorized an underground construction work into four groups and added more number of independent variables (i.e., more number of construction methods), the predictability decreased. As an alternative, we developed a decision tree by analyzing 25 earthwork cases with detailed information. We implemented the developed decision tree as a computer-supported program called Dr. underground and are still in the process of validating and revising the decision tree. This study is still in a preliminary stage and will be improved by collecting and analyzing more cases.

  • PDF

Real Time Current Prediction with Recurrent Neural Networks and Model Tree

  • Cini, S.;Deo, Makarand Chintamani
    • International Journal of Ocean System Engineering
    • /
    • v.3 no.3
    • /
    • pp.116-130
    • /
    • 2013
  • The prediction of ocean currents in real time over the warning times of a few hours or days is required in planning many operation-related activities in the ocean. Traditionally this is done through numerical models which are targeted toward producing spatially distributed information. This paper discusses a complementary method to do so when site-specific predictions are desired. It is based on the use of a recurrent type of neural network as well as the statistical tool of model tree. The measurements made at a site in Indian Ocean over a period of 4 years were used. The predictions were made over 72 time steps in advance. The models developed were found to be fairly accurate in terms of the selected error statistics. Among the two modeling techniques the model tree performed better showing the necessity of using distributed models for different sub-domains of data rather than a unique one over the entire input domain. Typically such predictions were associated with average errors of less than 2.0 cm/s. Although the prediction accuracy declined over longer intervals, it was still very satisfactory in terms of theselected error criteria. Similarly prediction of extreme values matched with that of the rest of predictions. Unlike past studies both east-west and north-south current components were predicted fairly well.