• Title/Summary/Keyword: logical clustering

Search Result 28, Processing Time 0.024 seconds

A Clustered Dwarf Structure to Speed up Queries on Data Cubes

  • Bao, Yubin;Leng, Fangling;Wang, Daling;Yu, Ge
    • Journal of Computing Science and Engineering
    • /
    • v.1 no.2
    • /
    • pp.195-210
    • /
    • 2007
  • Dwarf is a highly compressed structure, which compresses the cube by eliminating the semantic redundancies while computing a data cube. Although it has high compression ratio, Dwarf is slower in querying and more difficult in updating due to its structure characteristics. We all know that the original intention of data cube is to speed up the query performance, so we propose two novel clustering methods for query optimization: the recursion clustering method which clusters the nodes in a recursive manner to speed up point queries and the hierarchical clustering method which clusters the nodes of the same dimension to speed up range queries. To facilitate the implementation, we design a partition strategy and a logical clustering mechanism. Experimental results show our methods can effectively improve the query performance on data cubes, and the recursion clustering method is suitable for both point queries and range queries.

A Study on the Clustering of software Module using the Heuristic Measurement (휴리스틱 측정방법을 사용한 소프트웨어 모듈의 집단화에 관한 연구)

  • Byun, Jung-Woo;Song, Young-Jae
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.9
    • /
    • pp.2353-2360
    • /
    • 1998
  • In the past. as the environment of the established soft ware system changed, most Re-Engineering perforned clustering on the basis of logical operation, In contrast, this paper proposes a method to perfonn clustering efficiently using the infonmltion sharing of each modult, of source programs that constitute the software For the clustering of related modules using the information sharing. We evaluated the result after measuring the degree of clustering using similarity and uniqueness algorithm on the basis of heuristic method of measurement. Thus, we could manipulate and achieve the clustering of related modules and procedures, This paper also prests a method to reconstruct the software system efficiently through the clustering and shows the possibility of its realization through real example.

  • PDF

Min-Distance Hop Count based Multi-Hop Clustering In Non-uniform Wireless Sensor Networks

  • Kim, Eun-Ju;Kim, Dong-Joo;Park, Jun-Ho;Seong, Dong-Ook;Lee, Byung-Yup;Yoo, Jae-Soo
    • International Journal of Contents
    • /
    • v.8 no.2
    • /
    • pp.13-18
    • /
    • 2012
  • In wireless sensor networks, an energy efficient data gathering scheme is one of core technologies to process a query. The cluster-based data gathering methods minimize the energy consumption of sensor nodes by maximizing the efficiency of data aggregation. However, since the existing clustering methods consider only uniform network environments, they are not suitable for the real world applications that sensor nodes can be distributed unevenly. To solve such a problem, we propose a balanced multi-hop clustering scheme in non-uniform wireless sensor networks. The proposed scheme constructs a cluster based on the logical distance to the cluster head using a min-distance hop count. To show the superiority of our proposed scheme, we compare it with the existing clustering schemes in sensor networks. Our experimental results show that our proposed scheme prolongs about 48% lifetime over the existing methods on average.

Location-Based Spiral Clustering Algorithm for Avoiding Inter-Cluster Collisions in WSNs

  • Yun, Young-Uk;Choi, Jae-Kark;Yoo, Sang-Jo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.4
    • /
    • pp.665-683
    • /
    • 2011
  • Wireless sensor networks (WSN) consist of a large amount of sensor nodes distributed in a certain region. Due to the limited battery power of a sensor node, lots of energy-efficient schemes have been studied. Clustering is primarily used for energy efficiency purpose. However, clustering in WSNs faces several unattained issues, such as ensuring connectivity and scheduling inter-cluster transmissions. In this paper, we propose a location-based spiral clustering (LBSC) algorithm for improving connectivity and avoiding inter-cluster collisions. It also provides reliable location aware routing paths from all cluster heads to a sink node during cluster formation. Proposed algorithm can simultaneously make clusters in four spiral directions from the center of sensor field by using the location information and residual energy level of neighbor sensor nodes. Three logical addresses are used for categorizing the clusters into four global groups and scheduling the intra- and inter-cluster transmission time for each cluster. We evaluated the performance with simulations and compared it with other algorithms.

On the design method of physical architecture based on the Design Structure Matrix (DSM) approach (물리적 아키텍처 설계에 대한 DSM 방법론 적용 사례 연구)

  • Choi, Sang Wook;Choi, Sang Taik;Jung, Yun Ho;Jang, Jae Deok
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.8 no.1
    • /
    • pp.21-28
    • /
    • 2012
  • Development of the system that has required performance is the most important figure and that is the key of project succeed. In order to perform that, systems engineering has come to the fore as a solution. In each step of system engineering process, particularly, requirement analysis and derivation, logical solution, architecture design step are known to affect many of the function and efficiency. Of these, this paper focus on architecture design. We introduce methodology for physical architecture design by applying DSM(Design Structure Matrix) methodology which is based on result of logical solution from MBSE methodology.

Separated Dual-layering Routing Scheme (SDRS) for Hierarchical Wireless Sensor Networks (계층형 무선센서네트워크를 위한 분리된 이중화 라우팅)

  • Choi, Hae-Won;Kim, Kyung-Jun;Kim, Hyun-Sung
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.4
    • /
    • pp.551-558
    • /
    • 2009
  • Most of clustering schemes focusing on the energy efficiency have only a cluster head in each cluster, thus the energy consumption of cluster head in a cluster can rapidly increase. To reduce the energy consumption, recently, the dual-layered clustering which is separated a cluster ranges into two parts, i.e., data aggregation layer and data transmission layer, based on a sensor equipped with geographical positioning system (GPS), was proposed. However, the logical regions existing within the dual-layered clustering range can not distinguish efficiently. This scheme leads to many messages collision and transmission delay among member nodes. In this paper, to solve these problems, we propose a separated dual-layered routing scheme using the position information and the cluster radius. Proposed scheme clearly distinguish the dual-layered clustering range and gets the balanced number of member nodes in each cluster. Therefore, the proposed routing scheme could prolong the overall network life time about 10% compared to the previous two layered clustering scheme and LEACH.

  • PDF

Machine learning-based categorization of source terms for risk assessment of nuclear power plants

  • Jin, Kyungho;Cho, Jaehyun;Kim, Sung-yeop
    • Nuclear Engineering and Technology
    • /
    • v.54 no.9
    • /
    • pp.3336-3346
    • /
    • 2022
  • In general, a number of severe accident scenarios derived from Level 2 probabilistic safety assessment (PSA) are typically grouped into several categories to efficiently evaluate their potential impacts on the public with the assumption that scenarios within the same group have similar source term characteristics. To date, however, grouping by similar source terms has been completely reliant on qualitative methods such as logical trees or expert judgements. Recently, an exhaustive simulation approach has been developed to provide quantitative information on the source terms of a large number of severe accident scenarios. With this motivation, this paper proposes a machine learning-based categorization method based on exhaustive simulation for grouping scenarios with similar accident consequences. The proposed method employs clustering with an autoencoder for grouping unlabeled scenarios after dimensionality reductions and feature extractions from the source term data. To validate the suggested method, source term data for 658 severe accident scenarios were used. Results confirmed that the proposed method successfully characterized the severe accident scenarios with similar behavior more precisely than the conventional grouping method.

Recovery of Software Module-View using Dependency and Author Entropy of Modules (모듈의 의존관계와 저자 엔트로피를 이용한 소프트웨어 모듈-뷰 복원)

  • Kim, Jung-Min;Lee, Chan-Gun;Lee, Ki-Seong
    • Journal of KIISE
    • /
    • v.44 no.3
    • /
    • pp.275-286
    • /
    • 2017
  • In this study, we propose a novel technique of software clustering to recover the software module-view by using the dependency and author entropy of modules. The proposed method first performs clustering of modules based on structural and logical dependencies, then it migrates selected modules from the clustered result by utilizing the author entropy of each module. In order to evaluate the proposed method, we calculated the MoJoFM values of the recovery result by applying the method to open-source projects among which ground-truth decompositions are well-known. Compared to the MoJoFM values of previously studied techniques, we demonstrated the effectiveness of the proposed method.

Efficient Error Recovery Protocol for ATM Clustering Systems (ATM 클러스터링 시스템을 위한 효율적인 에러 복구 프로토콜)

  • Jeong, Jae-Ung;Lee, Jong-Gwon;Kim, Yong-Jae;Kim, Tak-Gon;Park, Gyu-Ho;Yu, Seung-Hwa
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.12
    • /
    • pp.1493-1503
    • /
    • 1999
  • ATM Clustering System과 같이 SAN(System Area Network) 환경에서 동작하는 시스템은 낮은 지연시간과 넓은 대역폭의 네트워크가 필수적이나 기존의 에러 복구 프로토콜들은 이러한 요구를 충족시키기에는 큰 오버헤드를 가지고 있다. 제안된 새로운 에러 복구 프로토콜은 ATM Clustering System 환경에서 최적의 성능을 나타내는 light-weight 프로토콜로 에러가 없는 상황과 에러 복구가 진행중인 상황에 따라 acknowledgement 주기를 적응적으로 변화시키는 adaptive acknowledgement scheme를 제안하여 적용하였다. 제안된 프로토콜은 상용 툴인 SDT를 이용한 논리 검증 받았고, DEVSim++ 환경에서의 성능 분석을 통해 프로토콜이 최상의 성능을 보이기 위한 파라메터 값을 찾았고, 이 값을 적용하였을 때의 성능을 기존의 프로토콜과 비교하여 제안된 프로토콜이 더 우수함을 확인하였다.Abstract While a system working with SAN, such as ATM Clustering System, requires a network with low latency and wide bandwidth, the previous error recovery protocols have a serious network overhead to satisfy this requirement. The suggested error recovery protocol is a light-weight protocol which can shows its best performance at ATM Clustering System and uses a newly suggested adaptive acknowledgement scheme. In the adaptive acknowledgement scheme, the period of acknowledgement is dynamically changed depending on the state of the network. We proved the logical correctness of our protocol with SDT and did performance analysis with DEVSim++. From the analysis, we found the optimal parameter values for best performance and showed that our protocol works better than the previous error recovery protocols.

Alert Correlation Analysis based on Clustering Technique for IDS (클러스터링 기법을 이용한 침입 탐지 시스템의 경보 데이터 상관관계 분석)

  • Shin, Moon-Sun;Moon, Ho-Sung;Ryu, Keun-Ho;Jang, Jong-Su
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.665-674
    • /
    • 2003
  • In this paper, we propose an approach to correlate alerts using a clustering analysis of data mining techniques in order to support intrusion detection system. Intrusion detection techniques are still far from perfect. Current intrusion detection systems cannot fully detect novel attacks. However, intrucsion detection techniques are still far from perfect. Current intrusion detection systems cannot fully detect novel attacks or variations of known attacks without generating a large amount of false alerts. In addition, all the current intrusion detection systems focus on low-level attacks or anomalies. Consequently, the intrusion detection systems to underatand the intrusion behind the alerts and take appropriate actions. The clustering analysis groups data objects into clusters such that objects belonging to the same cluster are similar, while those belonging to different ones are dissimilar. As using clustering technique, we can analyze alert data efficiently and extract high-level knowledgy about attacks. Namely, it is possible to classify new type of alert as well as existed. And it helps to understand logical steps and strategies behind series of attacks using sequences of clusters, and can potentially be applied to predict attacks in progress.