• Title/Summary/Keyword: Node reliability

Search Result 375, Processing Time 0.026 seconds

Topology-aware Packet Size and Forward Rate for Energy Efficiency and Reliability in Dynamic Wireless Body Area Networks (동적 무선 인체 통신망의 에너지 효율과 신뢰성을 위한 토폴로지 인식 기반 패킷 크기 및 포워딩 비율 결정 방법)

  • Nguyen-Xuan, Sam;Kim, Dongwan;An, Sunshin
    • Journal of Internet Computing and Services
    • /
    • v.15 no.2
    • /
    • pp.9-18
    • /
    • 2014
  • The sensors attached on/in a person are moved since human body frequency changes their activity, therefore in wireless body area networks, nodal mobility and non-line-of-sight condition will impact on performance of networks such as energy efficiency and reliable communication. We then proposed schemes which study on forwarding decisions against frequent change of topology and channel conditions to increase reliable connections and improve energy efficiency. In this work, we control the size of packets, forwarding rate based on ratio of input links and output links at each node. We also robust the network topology by extending the peer to peer IEEE 802.15.4-based. The adaptive topology from chain-based to grid-based can optimal our schemes. The simulation shows that these approaches are not only extending network lifetime to 48.2 percent but also increase around 6.08 percent the packet delivery ratio. The "hot spots" problem is also resolved with this approach.

A Multi-path QoS Routing Protocol for the OFDM-TDMA Mesh Networks (OFDM-TDMA 메쉬 네트워크를 위한 다중경로 QoS 라우팅 프로토콜)

  • Choi, Jungwook;Lee, Hyukjoon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.14 no.1
    • /
    • pp.57-67
    • /
    • 2015
  • A large amount of work has been done in the areas of routing, MAC, QoS, capacity, location service, cooperative communication, fault tolerance, mobility models and various applications of mesh networks thanks to their merits of cost-effective way of deployment and flexibility in extending wireline services. Although multi-path routing protocols have been proposed to be used to provide QoS and fault-tolerance, there has not been any significant results discussed that support both in the literature to our best knowledge as they are often required in military and public safety applications. In this paper, we present a novel routing protocol for a mesh network based on the OFDM-TDMA collision-free MAC that discovers and maintains multiple paths that allows retransmitting and forwarding packets that have been blocked due to a link failure using an alternative next-hop node such that the delay-capacity tradeoff is reduced and the reliability is enhanced. Simulation results show that the proposed protocol performs well in terms of both the QoS and delivery ratio.

IoT Multi-Phase Authentication System Using Token Based Blockchain (블록체인 기반의 토큰을 이용한 IoT 다단계 인증 시스템)

  • Park, Hwan;Kim, Mi-sun;Seo, Jae-hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.6
    • /
    • pp.139-150
    • /
    • 2019
  • IoT(Internet of Things) security is becoming increasingly important because IoT potentially has a variety of security threats, including limited hardware specifications and physical attacks. This paper is a study on the certification technology suitable for the lightened IoT environment, and we propose a system in which many gateways share authentication information and issue authentication tokens for mutual authentication using blockchain. The IoT node can be issued an authentication token from one gateway to continuously perform authentication with a gateway in the block-chain network using an existing issued token without performing re-authentication from another gateway participating in the block-chain network. Since we do not perform re-authentication for other devices in a blockchain network with only one authentication, we proposed multi phase authentication consisting of device authentication and message authentication in order to enhance the authentication function. By sharing the authentication information on the blockchain network, it is possible to guarantee the integrity and reliability of the authentication token.

A Study on Contract Management Platform Based on Blockchain (블록체인 기반의 계약관리 플랫폼 연구)

  • Kim, Sunghwan;Kim, Younggon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.3
    • /
    • pp.97-103
    • /
    • 2019
  • Electronic contract systems are widely used to integrate and manage the contract management process based on the development of ICT technology. Recently, improvement methods using block chain technology are being studied. However, contract management systems have processing performance, security vulnerabilities, data entry, and service accessibility issues. In this paper, we propose a block - chain based contract management platform with block chain, smart contract, and Rest API. The suggested platform includes the RPBFT algorithm which solves the processing performance and security vulnerability of the existing consensus authentication algorithm, and the algorithm to prevent data entry and enhance transparency of participants. The block-chain-based contract management platform proposed in this paper provides a use environment with improved processing performance, security, reliability, and transparency, and can be used through API without burdening construction. Therefore, The effect can be expected.

A novel coupled finite element method for hydroelastic analysis of FG-CNTRC floating plates under moving loads

  • Nguyen, Vu X.;Lieu, Qui X.;Le, Tuan A.;Nguyen, Thao D.;Suzuki, Takayuki;Luong, Van Hai
    • Steel and Composite Structures
    • /
    • v.42 no.2
    • /
    • pp.243-256
    • /
    • 2022
  • A coupled finite element method (FEM)-boundary element method (BEM) for analyzing the hydroelastic response of functionally graded carbon nanotube-reinforced composite (FG-CNTRC) floating plates under moving loads is firstly introduced in this article. For that aim, the plate displacement field is described utilizing a generalized shear deformation theory (GSDT)-based FEM, meanwhile the linear water-wave theory (LWWT)-relied BEM is employed for the fluid hydrodynamic modeling. Both computational domains of the plate and fluid are coincidentally discretized into 4-node Hermite elements. Accordingly, the C1-continuous plate element model can be simply captured owing to the inherent feature of third-order Hermite polynomials. In addition, this model is also completely free from shear correction factors, although the shear deformation effects are still taken into account. While the fluid BEM can easily handle the free surface with a lower computational effort due to its boundary integral performance. Material properties through the plate thickness follow four specific CNT distributions. Outcomes gained by the present FEM-BEM are compared with those of previously released papers including analytical solutions and experimental data to validate its reliability. In addition, the influences of CNT volume fraction, different CNT configurations, water depth, and load speed on the hydroelastic behavior of FG-CNTRC plates are also examined.

Improved Bitcoin Network Neighbors Connection Algorithm to Reduce Block Propagation Time (블록 전파 시간 단축을 위한 비트코인 네트워크 이웃 연결 알고리즘 개선)

  • Bang, Jiwon;Choi, Mi-Jung
    • KNOM Review
    • /
    • v.23 no.1
    • /
    • pp.26-33
    • /
    • 2020
  • Bitcoin is an electronic money that does not rely on centralized institutions such as banks and financial institutions, unlike the world's paper currencies such as dollar, won, euro and yen. In Bitcoin network, a block with transaction details is generated by mining, and the message that the block has been created is broadcast to all participating nodes in a broadcasting method to secure reliability through verification. Likewise, the mining and block propagation methods in the Bitcoin network are greatly affected by the performance of the P2P network. For example, in the case of mining, the node receiving the reward for mining varies depending on whether the block is first mined in the network and the proof of mining is propagated faster. In this paper, we applied local characteristics and Round-to-Trip(RTT) measurement to solve the problems of the existing neighbor connection method and block propagation method performed in Bitcoin network. An algorithm to improve block propagation speed is presented. Through experiments, we compare the performance of the improved algorithm with the existing algorithm to verify that the overall block propagation time is reduced.

Volumetric CT Texture Analysis of Intrahepatic Mass-Forming Cholangiocarcinoma for the Prediction of Postoperative Outcomes: Fully Automatic Tumor Segmentation Versus Semi-Automatic Segmentation

  • Sungeun Park;Jeong Min Lee;Junghoan Park;Jihyuk Lee;Jae Seok Bae;Jae Hyun Kim;Ijin Joo
    • Korean Journal of Radiology
    • /
    • v.22 no.11
    • /
    • pp.1797-1808
    • /
    • 2021
  • Objective: To determine whether volumetric CT texture analysis (CTTA) using fully automatic tumor segmentation can help predict recurrence-free survival (RFS) in patients with intrahepatic mass-forming cholangiocarcinomas (IMCCs) after surgical resection. Materials and Methods: This retrospective study analyzed the preoperative CT scans of 89 patients with IMCCs (64 male; 25 female; mean age, 62.1 years; range, 38-78 years) who underwent surgical resection between January 2005 and December 2016. Volumetric CTTA of IMCCs was performed in late arterial phase images using both fully automatic and semi-automatic liver tumor segmentation techniques. The time spent on segmentation and texture analysis was compared, and the first-order and second-order texture parameters and shape features were extracted. The reliability of CTTA parameters between the techniques was evaluated using intraclass correlation coefficients (ICCs). Intra- and interobserver reproducibility of volumetric CTTAs were also obtained using ICCs. Cox proportional hazard regression were used to predict RFS using CTTA parameters and clinicopathological parameters. Results: The time spent on fully automatic tumor segmentation and CTTA was significantly shorter than that for semi-automatic segmentation: mean ± standard deviation of 1 minutes 37 seconds ± 50 seconds vs. 10 minutes 48 seconds ± 13 minutes 44 seconds (p < 0.001). ICCs of the texture features between the two techniques ranged from 0.215 to 0.980. ICCs for the intraobserver and interobserver reproducibility using fully automatic segmentation were 0.601-0.997 and 0.177-0.984, respectively. Multivariable analysis identified lower first-order mean (hazard ratio [HR], 0.982; p = 0.010), larger pathologic tumor size (HR, 1.171; p < 0.001), and positive lymph node involvement (HR, 2.193; p = 0.014) as significant parameters for shorter RFS using fully automatic segmentation. Conclusion: Volumetric CTTA parameters obtained using fully automatic segmentation could be utilized as prognostic markers in patients with IMCC, with comparable reproducibility in significantly less time compared with semi-automatic segmentation.

Clinicopathologic Characteristics of Trop Family Proteins (Trop-2 and EpCAM) in Gastric Carcinoma

  • Hye Sung Kim;Younghoon Kim;Hye Seung Lee
    • Journal of Gastric Cancer
    • /
    • v.24 no.4
    • /
    • pp.391-405
    • /
    • 2024
  • Purpose: Trop family proteins, including epithelial cell adhesion molecule (EpCAM) and Trop-2, have garnered attention as potential therapeutic and diagnostic targets for various malignancies. This study aimed to elucidate the clinicopathological significance of these proteins in gastric carcinoma (GC) and to reinforce their potential as biomarkers for patient stratification in targeted therapies. Materials and Methods: Immunohistochemical (IHC) analyses of EpCAM and Trop-2 were performed on GC and precancerous lesions, following rigorous orthogonal validation of the antibodies to ensure specificity and sensitivity. Results: Strong membranous staining (3+) for Trop-2 was observed in 49.3% of the GC cases, whereas EpCAM was strongly expressed in almost all cases (93.2%), indicating its widespread expression in GC. A high Trop-2 expression level, characterized by an elevated H-score, was significantly associated with intestinal type by Lauren classification, gastric mucin type, presence of lymph node metastasis, human epidermal growth factor receptor 2-positivity, and Epstein-Barr virus (EBV)-positivity. Patients with a high Trop-2 expression level exhibited poorer survival outcomes on univariate and multivariate analyses. High EpCAM expression levels were prevalent in differentiated histologic type, microsatellite instability-high, and EBV-negative cancer, and were correlated with high densities of CD3 and CD8 T cells and elevated combined positive score for programmed death-ligand 1. Conclusions: These results highlight the differential expression of Trop-2 and EpCAM and their prognostic implications in GC. The use of meticulously validated antibodies ensured the reliability of our IHC data, thereby offering a robust foundation for future therapeutic strategies targeting Trop family members in GC.

Mobility Support Scheme Based on Machine Learning in Industrial Wireless Sensor Network (산업용 무선 센서 네트워크에서의 기계학습 기반 이동성 지원 방안)

  • Kim, Sangdae;Kim, Cheonyong;Cho, Hyunchong;Jung, Kwansoo;Oh, Seungmin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.11
    • /
    • pp.256-264
    • /
    • 2020
  • Industrial Wireless Sensor Networks (IWSNs) is exploited to achieve various objectives such as improving productivity and reducing cost in the diversity of industrial application, and it has requirements such as low-delay and high reliability packet transmission. To accomplish the requirement, the network manager performs graph construction and resource allocation about network topology, and determines the transmission cycle and path of each node in advance. However, this network management scheme cannot treat mobile devices that cause continuous topology changes because graph reconstruction and resource reallocation should be performed as network topology changes. That is, despite the growing need of mobile devices in many industries, existing scheme cannot adequately respond to path failure caused by movement of mobile device and packet loss in the process of path recovery. To solve this problem, a network management scheme is required to prevent packet loss caused by mobile devices. Thus, we analyse the location and movement cycle of mobile devices over time using machine learning for predicting the mobility pattern. In the proposed scheme, the network manager could prevent the problems caused by mobile devices through performing graph construction and resource allocation for the predicted network topology based on the movement pattern. Performance evaluation results show a prediction rate of about 86% compared with actual movement pattern, and a higher packet delivery ratio and a lower resource share compared to existing scheme.

The IEEE 802.15.4e based Distributed Scheduling Mechanism for the Energy Efficiency of Industrial Wireless Sensor Networks (IEEE 802.15.4e DSME 기반 산업용 무선 센서 네트워크에서의 전력소모 절감을 위한 분산 스케줄링 기법 연구)

  • Lee, Yun-Sung;Chung, Sang-Hwa
    • Journal of KIISE
    • /
    • v.44 no.2
    • /
    • pp.213-222
    • /
    • 2017
  • The Internet of Things (IoT) technology is rapidly developing in recent years, and is applicable to various fields. A smart factory is one wherein all the components are organically connected to each other via a WSN, using an intelligent operating system and the IoT. A smart factory technology is used for flexible process automation and custom manufacturing, and hence needs adaptive network management for frequent network fluctuations. Moreover, ensuring the timeliness of the data collected through sensor nodes is crucial. In order to ensure network timeliness, the power consumption for information exchange increases. In this paper, we propose an IEEE 802.15.4e DSME-based distributed scheduling algorithm for mobility support, and we evaluate various performance metrics. The proposed algorithm adaptively assigns communication slots by analyzing the network traffic of each node, and improves the network reliability and timeliness. The experimental results indicate that the throughput of the DSME MAC protocol is better than the IEEE 802.15.4e TSCH and the legacy slotted CSMA/CA in large networks with more than 30 nodes. Also, the proposed algorithm improves the throughput by 15%, higher than other MACs including the original DSME. Experimentally, we confirm that the algorithm reduces power consumption by improving the availability of communication slots. The proposed algorithm improves the power consumption by 40%, higher than other MACs.