• Title/Summary/Keyword: communication tree

Search Result 772, Processing Time 0.101 seconds

An Efficient Hybrid Spatial Index Structure based on the R-tree (R-tree 기반의 효율적인 하이브리드 공간 인덱스 구조)

  • Kang, Hong-Koo;Kim, Joung-Joon;Han, Ki-Joon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.771-772
    • /
    • 2009
  • 최근 대표적인 공간 인덱스 구조인 R-tree를 기반으로 KD-tree나 Quad-tree와 같은 공간 분할 특성을 이용하여 인덱싱 성능을 향상시키기 위한 연구가 활발하다. 본 논문에서는 기존에 제시된 R-tree 기반 인덱스 구조인 SQR-tree와 PMR-tree의 특성을 결합하여 대용량 공간 데이타를 보다 효율적으로 처리하는 인덱스 구조인 MSQR-tree(Mapping-based SQR-tree)를 제시한다. SQR-tree는 Quad-tree를 확장한 SQ-tree와 각 SQ-tree 리프 노드마다 실제로 공간 객체를 저장하는 R-tree가 연계되어 있는 인덱스 구조이고, PMR-tree는 R-tree에 R-tree 리프 노드를 직접 접근할 수 있는 매핑 트리를 적용한 인덱스 구조이다. 본 논문에서 제시하는 MSQR-tree는 SQR-tree를 기본 구조로 가지고 R-tree마다 매핑 트리가 적용된 구조를 갖는다. 따라서, MSQR-tree에서는 SQR-tree와 같이 질의가 여러 R-tree에서 분산 처리되고, PMR-tree와 같이 매핑 트리를 통해 R-tree 리프 노드를 빠르게 접근할 수 있다. 마지막으로 성능 실험을 통해 MSQR-tree의 우수성을 입증하였다.

Technique for Improving performance of FP-Tree and DRFP (FP-Tree 및 DRFP 의 성능 개선 기법)

  • Cho, Kyung Soo;Jeong, Jae-ho;Kim, Young Hee;Kim, Ung-mo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.844-847
    • /
    • 2010
  • FP-tree는 연관성 규칙 알고리즘 전체의 성능을 향상 시키며 DB 스캔을 단 2회로 줄였다. 하지만 빈발 항목과 모든 트랜잭션의 tree 정보를 메모리에 상주 시키면서 많은 메모리 공간을 요구했다. 그래서 나온 DRFP알고리즘은 메모리 요구 문제를 저장장치에 저장함으로 해결 하였으나 FP-tree와는 달리 시간 성능에서의 문제점을 가졌다. 그래서 우리는 이러한 문제점을 보완할 NRFP-tree(Nare disc-Resident Frequent pattern Tree)를 제안한다.

A K-Nearest Neighbor Search Algorithm for DGR-Tree (DGR-Tree를 위한 KNN 검색 알고리즘)

  • Lee, Deuk-Woo;Kang, Hong-Koo;Han, Ki-Joon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.799-800
    • /
    • 2009
  • 유비쿼터스 컴퓨팅 환경에서의 LBS에서는 점차 대용량화 및 밀집화 경향을 보이는 POI에 대한 빠른 KNN 검색이 중요하다. 따라서 본 논문에서는 기존의 DGR-Tree를 위해서 POI에 대한 빠른 KNN 검색을 위한 KNN 검색 알고리즘을 제시하고, 또한 성능 평가를 통해 그 우수성을 입증한다.

Hash Tree based Communication Protocol in V2X Environments Including Internet of Vehicles for Providing Secure Vehicular Communication Services (차량인터넷을 포함한 V2X 환경에서 안전한 차량 통신 서비스 제공을 위한 해시 트리 기반 통신 프로토콜)

  • Jin, Byungwook;Cha, Siho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.1
    • /
    • pp.27-34
    • /
    • 2018
  • Various messages generated in vehicles are transmitted based on the wireless telecommunication which is a core technology of vehicle to everything (V2X). However, the hackers attack them upon penetration to the system and network to cause the generation of users' inconveniences for vehicular communication. Moreover, huge damage could be occurred in terms of physical and materialistic areas if the users in the vehicles were attacked in the communication environment. Therefore, this study was to design the safe communication protocol using hash tree technique in the V2X environments. Using hash tree technique, processes of issuing certificate and registration and communication protocol were designed, and safety analysis was performed on the attacking technique which is occurred in the existing vehicles. Approximately 62% of decrease in the capacity analysis was found upon comparative analysis of telecommunication processes with the system to issue the certificate which is used in the existing vehicles.

Relation Extraction Using Suffix Tree and Distant Supervision (Suffix Tree와 Distant Supervision을 이용한 관계 추출)

  • Lee, HyunGoo;Choi, Maengsik;Kim, Harksoo
    • Annual Conference on Human and Language Technology
    • /
    • 2014.10a
    • /
    • pp.149-152
    • /
    • 2014
  • 자연어처리 분야에서 관계 추출은 중요한 연구 분야이다. 많은 관계 추출 연구는 지도 학습 방법을 사용하지만 정답을 구축하는 비용이 큰 문제가 있다. 본 논문에서는 distant supervision을 이용하여 데이터를 구축하고, suffix tree를 이용한 규칙기반 관계 추출 모델을 제안한다. Suffix tree를 이용한 관계추출의 Macro F1-measure는 84.05%로 관계 추출에서 사용이 가능함을 보였다.

  • PDF

Performance Analysis of a TH-PPM UWB System using Dyadic Tree Structure (다이애딕 구조를 이용한 TH-PPM UWB 시스템의 성능 분석)

  • Park, Joong-Hoo;Choi, Ginkyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.3
    • /
    • pp.87-92
    • /
    • 2008
  • In this paper, certain scaling functions are generated using the dyadic subband tree structure and applied to a time-hopping, pulse position modulation, ultra-wideband (TH-PPM UWB) system. Scaling functions can be obtained by iterating a lowpass filter at each level using a critically sampled dyadic tree. The performance of the TH-PPM UWB system employing scaling functions as the mono-cycle waveform is evaluated through computer simulations in a Rayleigh fading environment.

  • PDF

An indexing method for moving or static objects in limited region (제한된 영역에서의 이동 및 고정 객체에 대한 색인 기법)

  • Yoon Jong-sun;Park Hyun-ju
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.11a
    • /
    • pp.15-18
    • /
    • 2004
  • 이동 객체를 효율적으로 처리하기 위해 여러 가지 색인 기법들이 제안되었다. 이들 중 3D R-tree와 같은 색인 기법은 시간과 공간을 동일한 차원으로 생각하고 있으나, 실제로 이 두 차원은 단위와 성격이 다르므로 분리해서 처리해야 한다. 특히 본 논문에서 고려하는 환경은 실내와 같은 한정된 공간이므로, 이런 환경에서는 시간과 공간이 같이 성장하는 것이 아니라 공간은 한정되어 있는 반면 시간 차원만이 성장한다. 따라서 R-tree와 1차원(시간차원)의 TB-tree 두 개의 색인을 유지하여, 공간정보와 고정된 객체는 R-tree에, 시간 정보와 이동 객체는 TB-tree에 저장하는 시공간 분리 트리(STS-tree : Separation of Time and Space tree)를 제안한다.

  • PDF

A File/Directory Reconstruction Method of APFS Filesystem for Digital Forensics

  • Cho, Gyu-Sang;Lim, Sooyeon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.8-16
    • /
    • 2022
  • In this paper, we propose a method of reconstructing the file system to obtain digital forensics information from the APFS file system when meta information that can know the structure of the file system is deleted due to partial damage to the disk. This method is to reconstruct the tree structure of the file system by only retrieving the B-tree node where file/directory information is stored. This method is not a method of constructing nodes based on structural information such as Container Superblock (NXSB) and Volume Checkpoint Superblock (APSB), and B-tree root and leaf node information. The entire disk cluster is traversed to find scattered B-tree leaf nodes and to gather all the information in the file system to build information. It is a method of reconstructing a tree structure of a file/directory based on refined essential data by removing duplicate data. We demonstrate that the proposed method is valid through the results of applying the proposed method by generating numbers of user files and directories.

Evolutionary Algorithm for solving Optimum Communication Spanning Tree Problem (최적 통신 걸침 나무 문제를 해결하기 위한 진화 알고리즘)

  • Soak Sang-Moon;Chang Seok-Cheol;Byun Sung-Cheal;Ahn Byung-Ha
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.4
    • /
    • pp.268-276
    • /
    • 2005
  • This paper deals with optimum communication spanning tree(OCST) problem. Generally, OCST problem is known as NP-hard problem and recently, it is reveled as MAX SNP hard by Papadimitriou and Yannakakis. Nevertheless, many researchers have used polynomial approximation algorithm for solving this problem. This paper uses evolutionary algorithm. Especially, when an evolutionary algorithm is applied to tree network problem such as the OCST problem, representation and genetic operator should be considered simultaneously because they affect greatly the performance of algorithm. So, we introduce a new representation method to improve the weakness of previous representation which is proposed for solving the degree constrained minimum spanning tree problem. And we also propose a new decoding method to generate a reliable tree using the proposed representation. And then, for finding a suitable genetic operator which works well on the proposed representation, we tested three kinds of genetic operators using the information of network or the genetic information of parents. Consequently, we could confirm that the proposed method gives better results than the previous methods.

An SDN based hopping multicast communication against DoS attack

  • Zhao, Zheng;Liu, Fenlin;Gong, Daofu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2196-2218
    • /
    • 2017
  • Multicast communication has been widely used in the Internet. However, multicast communication is vulnerable to DoS attack due to static router configuration. In this paper, HMC, a hopping multicast communication method based on SDN, is proposed to tackle this problem. HMC changes the multicast tree periodically and makes it difficult for the attackers to launch an accurate attack. It also decreases the probability of multicast communication being attacked by DoS and in the meanwhile, the QoS constrains are not violated. In this research, the routing problem of HMC is proven to be NP-complete and a heuristic algorithm is proposed to solve it. Experiments show that HMC has the ability to resist DoS attack on multicast route effectively. Theoretically, the multicast compromised probability can drop more than 0.6 when HMC is adopt. In addition, experiments demonstrate that HMC achieves shorter average multicast delay and better robustness compared with traditional method, and more importantly, it better defends DoS attack.