• Title/Summary/Keyword: Intermediate Node

Search Result 166, Processing Time 0.026 seconds

ZigBee Network Formation based on Trust Model and Trustworthiness Measurement (신뢰모델기반의 ZigBee 네트워크 구성 및 신뢰성 측정)

  • Hwang, Jae-Woo;Park, Ho-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.5
    • /
    • pp.1284-1294
    • /
    • 2010
  • The ZigBee is one of the most important technologies for composing USN. It is one of the IEEE 802.15.4 standards to support personal area networks. It uses a hierarchical routing or an on-demand route discovery strategy as an address allocation method. A hierarchical routing doesn't use a routing table but only uses a child node or a parent node as an intermediate node for data delivery. Therefore, the ZigBee network's topology greatly affects the overall network performance. In this paper, we propose a more trustworthy algorithm than only using the depth and widely variable LQI during network formation, and moreover we propose an algorithm to measure network's trustworthiness. We simulate our algorithm using the NS-2 and implement our network using the MG2400 ZigBee module for verifying performance.

Explicit Path Assignment(EPA) Algorithm using the Cache Information of MAP in Nested Mobile Network of HMIPv6 (HMIPv6의 중첩된 이동 네트워크에서 MAP의 캐시 정보를 이용한 명시적 경로 지정(Explicit Path Assignment) 알고리즘)

  • Song, Ji-Young;Kim, Byung-Gi
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.6
    • /
    • pp.451-460
    • /
    • 2006
  • In HMIPv6, the nested mobile network because of the mobility of node and router can be constituted. Many subnets exist and many mobile router(MR)s and mobile node(MN)s activate in the nested mobile network. If the nested depth is deeper, the number of mobile router that packet goes through, increases and data transmission delay owing to this might be larger. This paper proposes EPA algorithm which finds out the path from Mobility Anchor Point(MAP) to a destination mobile node using the binding cache information of MAP and processes the path information by adding it to packet header. If we apply EAP algorithm, the quantity of unnecessary packet within MAP domain can be decreased. Also, the transmission delay can be decreased in a intermediate mobile router because it supports packet re-transmission just by simple packet substitution.

Ultrasonographic Indeterminate Lymph Nodes in Preoperative Thyroid Cancer Patients: Malignancy Risk and Ultrasonographic Findings Predictive of Malignancy

  • Roh-Eul Yoo;Ji-hoon Kim;Jeong Mo Bae;Inpyeong Hwang;Koung Mi Kang;Tae Jin Yun;Seung Hong Choi;Chul-Ho Sohn;Jung Hyo Rhim;Sun-Won Park
    • Korean Journal of Radiology
    • /
    • v.21 no.5
    • /
    • pp.598-604
    • /
    • 2020
  • Objective: Proper management of lymph nodes (LNs) with ultrasonographic (US) indeterminate features in thyroid cancer patients remains elusive. We aimed to evaluate the malignancy risk and US findings predictive of malignancy for US indeterminate LNs in preoperative thyroid cancer patients through node-by-node correlation. Materials and Methods: A total of 348 LNs in 284 thyroid cancer patients, who underwent fine-needle aspiration or core-needle biopsy between December 2006 and June 2015, were included. We determined the malignancy risks for US probably benign, indeterminate, and suspicious categories. For US indeterminate LNs, which had neither echogenic hilum nor hilar vascularity in the absence of any suspicious finding, US findings were compared between benign and metastatic LNs using Mann-Whitney U test and Fisher's exact test. Results: US imaging diagnoses were probably benign in 20.7% (n = 72) cases, indeterminate in 23.6% (n = 82), and suspicious in 55.7% (n = 194). Malignancy risk of US indeterminate LNs (19.5% [16/82]) differed from those of the US probably benign (2.8% [2/72]) (p = 0.002) and US suspicious LNs (78.4% [152/194]) (p < 0.001). Among US indeterminate LNs, there were no significant differences in short, long, and long-to-short diameter (L/S) ratios between benign and metastatic LNs (3.9 vs. 3.8 mm, p = 0.619; 7.3 vs. 7.3 mm, p = 0.590; 1.9 vs. 1.9, p = 0.652). Conclusion: US indeterminate LNs were frequently encountered during preoperative evaluation and had intermediate malignancy risk. Given the lack of discriminative power of size criteria and L/S ratio, clinical factors such as surgical strategy and node size should be considered for proper triage of US indeterminate LNs in thyroid cancer.

Improved Compressed Network Coding Scheme for Energy-Efficient Data Communication in Wireless Sensor Networks

  • Zhou, Ying;Yang, Lihua;Yang, Longxiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.2946-2962
    • /
    • 2017
  • An improved energy-efficient compressed network coding method is proposed for the data communication in the wireless sensor networks (WSNs). In the method, the compressed sensing and network coding are jointly used to improve the energy efficiency, and the two-hop neighbor information is employed to choose the next hop to further reduce the number of the transmissions. Moreover, a new packet format is designed to facilitate the intermediate node selection. To theoretically verify the efficiency of the proposed method, the expressions for the number of the transmissions and receptions are derived. Simulation results show that, the proposed method has higher energy efficiency compared with the available schemes, and it only requires a few packets to reconstruct measurements with reasonable quality.

Efficient USN Routing Protocol using Sub-Clustering

  • Jeong, Su-Hyung;Yoo, Hae-Young
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.4
    • /
    • pp.466-469
    • /
    • 2008
  • The existing routing protocols in USN environment, PEGASIS is more efficient than LEACH, which is a hierarchical routing protocol, for network configuration based on power consumption. Despite its merit that it can reduce energy consumption per node, however, the PEGASIS protocol also has a weakness that it is less responsive to frequent changes that occur in the configuration of sensor network due to BS nodes that keep changing, which is a typical characteristic of the sensor network. To address this problem, this paper proposes to select sub-cluster heads and have them serve as intermediate nodes. This paper presents and analyses that this method can resolve the aforementioned problem of the PEGASIS algorithm.

DART: Fast and Efficient Distributed Stream Processing Framework for Internet of Things

  • Choi, Jang-Ho;Park, Junyong;Park, Hwin Dol;Min, Ok-gee
    • ETRI Journal
    • /
    • v.39 no.2
    • /
    • pp.202-212
    • /
    • 2017
  • With the advent of the Internet-of-Things paradigm, the amount of data production has grown exponentially and the user demand for responsive consumption of data has increased significantly. Herein, we present DART, a fast and lightweight stream processing framework for the IoT environment. Because the DART framework targets a geospatially distributed environment of heterogeneous devices, the framework provides (1) an end-user tool for device registration and application authoring, (2) automatic worker node monitoring and task allocations, and (3) runtime management of user applications with fault tolerance. To maximize performance, the DART framework adopts an actor model in which applications are segmented into microtasks and assigned to an actor following a single responsibility. To prove the feasibility of the proposed framework, we implemented the DART system. We also conducted experiments to show that the system can significantly reduce computing burdens and alleviate network load by utilizing the idle resources of intermediate edge devices.

Automatic interpretation of awaked EEG by using constructive neural networks with forgetting factor

  • Nakamura, Masatoshi;Chen, Yvette;Sugi, Takenao;Ikeda Akio;Shibasaki Hiroshi
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1995.10a
    • /
    • pp.505-508
    • /
    • 1995
  • The automatic interpretation of awake background electroencephalogram (EEG), consisting of quantitative EEG interpretation and EEG report making, has been developed by the authors based on EEG data visually inspected by an electroencephalographer (EEGer). The present study was focused on the adaptability of the automatic EEG interpretation which was accomplished by the constructive neural network with forgetting factor. The artificial neural network (ANN) was constructed so as to give the integrative decision of the EEG by using the input signals of the intermediate judgment of 13 items of the EEG. The feature of the ANN was that it adapted to any EEGer who gave visual inspection for the training data. The developed method was evaluated based on the EEG data of 57 patients. The re-trained ANN adapted to another EEGer appropriately.

  • PDF

Performance Analsis of an Integranted Voice/Data Cut-Through Switching Network (음성과 데이터가 집적된 Cut-Through 교환망의 성능 분석)

  • 윤영식;은종관
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.14 no.4
    • /
    • pp.360-368
    • /
    • 1989
  • In this paper, the performance of an integrated voice/data cut-through switching network is studied. We first derive cut-through probabilities of voice and data packets at intermediate nodes. Then, the Laplace transform for the network delay is obtained. According to numerical results, the performance of cut-through switching is superior to that of packet switching for integrated voice/data networks.

  • PDF

A Method Enabling Exploitation of Spatial Diversity and Physical Layer Security in an Extreme Case of Source-Wiretapping without a Jamming Beamformer

  • Tran, Truc Thanh;Kong, Hyung Yun
    • Journal of Communications and Networks
    • /
    • v.17 no.5
    • /
    • pp.482-490
    • /
    • 2015
  • This article exploits spatial diversity for jamming to prevent wiretapping in the extreme case in which an eavesdropper is located near the source and a common jamming signal is unavailable. To address this challenge, the jamming signal is allowed to carry a random binary message. Then, it is proposed that the active intermediate node transmits this jamming signal and the decoding of this signal at both source and destination is physically secured as result of using the physical-layer security method. If the source and the destination securely and correctly decode this jamming message, the source transmits another message which is created from combining its information message and the decoded message using the network-coding method. Therefore, this method prevents the transmissions from being eavesdropped upon by the source-wiretapping.

Wind-induced aerostatic instability of cable-supported bridges by a two-stage geometric nonlinear analysis

  • Yang, Y.B.;Tsay, Jiunn-Yin
    • Interaction and multiscale mechanics
    • /
    • v.1 no.3
    • /
    • pp.381-396
    • /
    • 2008
  • The aerostatic instability of cable-supported bridges is studied, with emphasis placed on modeling of the geometric nonlinear effects of various components of cable-supported bridges. Two-node catenary cable elements, which are more rational than truss elements, are adopted for simulating cables with large or small sags. Aerostatic loads are expressed in terms of the mean drag, lift and pitching moment coefficients. The geometric nonlinear analysis is performed with the dead loads and wind loads applied in two stages. The critical wind velocity for aerostatic instability is obtained as the condition when the pitching angle of the bridge deck becomes unbounded. Unlike those existing in the literature, each intermediate step of the incremental-iterative procedure is clearly given and interpreted. As such, the solutions obtained for the bridges are believed to be more rational than existing ones. Comparisons and discussions are given for the examples studied.