• Title/Summary/Keyword: QoS performance

Search Result 1,143, Processing Time 0.024 seconds

Prognostic Factor Analysis of Overall Survival in Gastric Cancer from Two Phase III Studies of Second-line Ramucirumab (REGARD and RAINBOW) Using Pooled Patient Data

  • Fuchs, Charles S.;Muro, Kei;Tomasek, Jiri;Van Cutsem, Eric;Cho, Jae Yong;Oh, Sang-Cheul;Safran, Howard;Bodoky, Gyorgy;Chau, Ian;Shimada, Yasuhiro;Al-Batran, Salah-Eddin;Passalacqua, Rodolfo;Ohtsu, Atsushi;Emig, Michael;Ferry, David;Chandrawansa, Kumari;Hsu, Yanzhi;Sashegyi, Andreas;Liepa, Astra M.;Wilke, Hansjochen
    • Journal of Gastric Cancer
    • /
    • v.17 no.2
    • /
    • pp.132-144
    • /
    • 2017
  • Purpose: To identify baseline prognostic factors for survival in patients with disease progression, during or after chemotherapy for the treatment of advanced gastric or gastroesophageal junction (GEJ) cancer. Materials and Methods: We pooled data from patients randomized between 2009 and 2012 in 2 phase III, global double-blind studies of ramucirumab for the treatment of advanced gastric or GEJ adenocarcinoma following disease progression on first-line platinum- and/or fluoropyrimidine-containing therapy (REGARD and RAINBOW). Forty-one key baseline clinical and laboratory factors common in both studies were examined. Model building started with covariate screening using univariate Cox models (significance level=0.05). A stepwise multivariable Cox model identified the final prognostic factors (entry+exit significance level=0.01). Cox models were stratified by treatment and geographic region. The process was repeated to identify baseline prognostic quality of life (QoL) parameters. Results: Of 1,020 randomized patients, 953 (93%) patients without any missing covariates were included in the analysis. We identified 12 independent prognostic factors of poor survival: 1) peritoneal metastases; 2) Eastern Cooperative Oncology Group (ECOG) performance score 1; 3) the presence of a primary tumor; 4) time to progression since prior therapy <6 months; 5) poor/unknown tumor differentiation; abnormally low blood levels of 6) albumin, 7) sodium, and/or 8) lymphocytes; and abnormally high blood levels of 9) neutrophils, 10) aspartate aminotransferase (AST), 11) alkaline phosphatase (ALP), and/or 12) lactate dehydrogenase (LDH). Factors were used to devise a 4-tier prognostic index (median overall survival [OS] by risk [months]: high=3.4, moderate=6.4, medium=9.9, and low=14.5; Harrell's C-index=0.66; 95% confidence interval [CI], 0.64-0.68). Addition of QoL to the model identified patient-reported appetite loss as an independent prognostic factor. Conclusions: The identified prognostic factors and the reported prognostic index may help clinical decision-making, patient stratification, and planning of future clinical studies.

A Study on the Bandwidth Assignment Scheme for Video Data Using Dynamic Parameters in the Wireless ATM Networks (무선 ATM망에서 동적 변수를 이용한 비디오 데이터의 대역폭 할당방식에 대한 연구)

  • Jang, Dong-Hyeok;Kim, Seung-Hwan;Lee, Sun-Sook;Kwon, Oh-Seok
    • The KIPS Transactions:PartC
    • /
    • v.9C no.1
    • /
    • pp.73-78
    • /
    • 2002
  • In WATM networks, in order to perform dynamic slot allocation required slots of mobile terminals are estimated based on DP (Dynamic Parameter) reflecting characteristics of traffic. In VBR (Variable Bit Rate) traffic, slot allocation is done at MT considering both time-dependent characteristics and QoS (Quality of Service) requirements. In this paper, DPs-buffer state information and buffer state change-are transmitted through in-band signaling. BS (Base Station) performs dynamic slot allocation considering traffic characteristics of each MT (Mobile Terminal), in other words, buffer state information informs the potentiality of 'buffer full state'to BS if MT buffer is over the specific threshold value and buffer state change notifies change in buffer state of incoming cells to MT. If buffer state information is equal to 'low (more than threshold)' and 'abrupt increase' it generates 'buffer full' state cell transmission delay or cell loss might occur. At this time BS should assign additional slots to MT, and then MT consumes cells in its buffer. In simulation, the proposed scheme shows better performance in cell delay and loss than EPSA (Estimation-Prorated Slot Assignment) in-band scheme.

A Network Adaptive SVC Streaming Protocol for Improving Video Quality (비디오 품질 향상을 위한 네트워크 적응적인 SVC 스트리밍 프로토콜)

  • Kim, Jong-Hyun;Koo, Ja-Hon;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.5
    • /
    • pp.363-373
    • /
    • 2010
  • The existing QoS mechanisms for video streaming are short of the consideration for various user environments and the characteristic of streaming applying programs. In order to overwhelm this problem, studies on the video streaming protocols exploiting scalable video coding (SVC), which provide spatial, temporal, and qualitative scalability in video coding, are progressing actively. However, these protocols also have the problem to deepen network congestion situation, and to lower fairness between other traffics, as they are not equipped with congestion control mechanisms. SVC based streaming protocols also have the problem to overlook the property of videos encoded in SVC, as the protocols transmit the streaming simply by extracting the bitstream which has the maximum bit rate within available bandwidth of a network. To solve these problems, this study suggests TCP-friendly network adaptive SVC streaming(T-NASS) protocol which considers both network status and SVC bitstream property. T-NASS protocol extracts the optimal SVC bitstream by calculating TCP-friendly transmission rate, and by perceiving the network status on the basis of packet loss rate and explicit congestion notification(ECN). Through the performance estimation using an ns-2 network simulator, this study identified T-NASS protocol extracts the optimal bitstream as it uses TCP-friendly transmission property and perceives the network status, and also identified the video image quality transmitted through T-NASS protocol is improved.

A New Incentive Based Bandwidth Allocation Scheme For Cooperative Non-Orthogonal Multiple Access (협력 비직교 다중 접속 네트워크에서 새로운 인센티브 기반 주파수 할당 기법)

  • Kim, Jong Won;Kim, Sung Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.6
    • /
    • pp.173-180
    • /
    • 2021
  • Non Orthogonal Multiple Access (NOMA) is a technology to guarantee the explosively increased Quality of Service(QoS) of users in 5G networks. NOMA can remove the frequent orthogonality in Orthogonal Multiple Access (OMA) while allocating the power differentially to classify user signals. NOMA can guarantee higher communication speed than OMA. However, the NOMA has one disadvantage; it consumes a more energy power when the distance increases. To solve this problem, relay nodes are employed to implement the cooperative NOMA control idea. In a cooperative NOMA network, relay node participations for cooperative communications are essential. In this paper, a new bandwidth allocation scheme is proposed for cooperative NOMA platform. By employing the idea of Vickrey-Clarke-Groves (VCG) mechanism, the proposed scheme can effectively prevent selfishly actions of relay nodes in the cooperative NOMA network. Especially, base stations can pay incentives to relay nodes as much as the contributes of relay nodes. Therefore, the proposed scheme can control the selfish behavior of relay nodes to improve the overall system performance.

A Design of Bandwidth Allocation Scheme with Priority Consideration for Upstream Channel of Ethernet PON (Ethernet PON에서 서비스 클래스별 우선 순위를 고려한 상향 채널 대역 할당 기법)

  • 이호숙;유태환;문지현;이형호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.11A
    • /
    • pp.859-866
    • /
    • 2003
  • In this paper, we designed the bandwidth allocation scheme with priority consideration for upstream channel access of EthernetPON. The objective of our scheme is to control the multi services in more effective way according to their CoS(Class of Service) or QoS(Quality of Service). The designed scheme considers transmission priority in the both side of OLT and ONU. In the OLT's view, the Two-step scheduling algorithm is applied with which we can support multiple bandwidth allocation policies simultaneously, i.e. SBA for the time-sensitive, constant rate transmission services and DBA for the best-effort services. This Two-step scheduling algorithm reduces the scheduling complexity by separating the process of transmission start time decision from the process of grant generation. In the ONU's view, the proposed scheme controls 8 priority queues of the 802.1d recommended 8 service classes. Higher priority queue is serviced in prior during the allowed GATE time from OLT. The OPNET modeling and simulation result compares the performance of each bandwidth allocation policy with SBA or DBA only approach.

Survivability Analysis of MANET Routing Protocols under DOS Attacks

  • Abbas, Sohail;Haqdad, Muhammad;Khan, Muhammad Zahid;Rehman, Haseeb Ur;Khan, Ajab;Khan, Atta ur Rehman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3639-3662
    • /
    • 2020
  • The network capability to accomplish its functions in a timely fashion under failures and attacks is known as survivability. Ad hoc routing protocols have been studied and extended to various domains, such as Intelligent Transport Systems (ITSs), Unmanned Aerial Vehicles (UAVs), underwater acoustic networks, and Internet of Things (IoT) focusing on different aspects, such as security, QoS, energy. The existing solutions proposed in this domain incur substantial overhead and eventually become burden on the network, especially when there are fewer attacks or no attack at all. There is a need that the effectiveness of these routing protocols be analyzed in the presence of Denial of Service (DoS) attacks without any intrusion detection or prevention system. This will enable us to establish and identify the inherently stable routing protocols that are capable to survive longer in the presence of these attacks. This work presents a DoS attack case study to perform theoretical analysis of survivability on node and network level in the presence of DoS attacks. We evaluate the performance of reactive and proactive routing protocols and analyse their survivability. For experimentation, we use NS-2 simulator without detection or prevention capabilities. Results show that proactive protocols perform better in terms of throughput, overhead and packet drop.

An Adaptive Contention-window Adjustment Technique Based on Individual Class Traffic for IEEE 802.11e Performance (802.11e의 성능 향상을 위한 개별적 클래스 트래픽에 기반한 동적 충돌 윈도우 크기 조절 기법)

  • Um, Jin-Yeong;Oh, Kyung-Sik;Ahn, Jong-Suk
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.2
    • /
    • pp.191-195
    • /
    • 2008
  • This paper proposes a technique for improving IEEE 802.11e EDCA's performance by dynamically adjusting each class's contention window size based on each class's traffic amount. For providing differentiated service differently from 802.11, 802.11e EDCA maintains four classes each of which specifies different static minimum and maximum contention window sizes. Since the initial window sites significantly affect the 802.11e performance, several window adjustment schemes have been proposed. One of the schemes known as CWminAS (CWmin Adaptation Scheme) dynamically and synchronously determines the four windows' site based on the periodically measured collision rate. This method, however, can lower the send probability of high priority classes since it can't differentiate their collisions from those of low priority classes, leading to the channel underutilization. For solving this problem, we propose ACATICT(Adaptive Contention-window Adjustment Technique based on Individual Class Traffic) algorithm which adapts each class window size based on each individual collision rate rather than one average collision rate. Our simulation experiments show that ACATICT achieves better utilization by around 10% at maximum.

The Effect of Feedback Path Congestion on the Multimedia Congestion Control Algorithm (멀티미디어 혼잡제어 알고리즘에서의 회신경로 혼잡에 대한 영향 분석)

  • Jung Gi Sung;Hong Min-cheol;Yoo Myungsik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.7B
    • /
    • pp.481-488
    • /
    • 2005
  • As the demand on the multimedia application increases, the congestion control algorithm for the multimedia applications becomes an important research issue. The ultimate goal of congestion control is to adapt the trans-mission rate at the sender to the mont of network resource available on the forward path. In general, the congestion control algorithms use the round trip time(RTT) to estimate the network congestion on the forward path. however, since the RTT includes the delay on both forward and backward paths, it is possible for the algorithms using the RTT to make a wrong decision such as deciding the congestion on the forward path due to the congestion built on the backward path. In this paper, we enhance the performance of RRC-OTT(Receiver-based rate control with one-way Trip Time) algorithm, which uses the one-way trip time(OTT) to estimate the network congestion. By separating the estimation mechanism on the forward path from the backward path, the performance of RRC-OTT algorithm is hardly affected by the congestion built on the backward path.

Mini-Bin Based Implementation Complexity Improvement in Fair Packet Schedulers (공정 패킷 스케줄러에서 미니빈 기반 구현 복잡도 개선)

  • Kim, Tae-Joon;Kim, Hwang-Rae
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.8
    • /
    • pp.1020-1029
    • /
    • 2006
  • Realization of high-capacity quality-of-service router needs fair packet schedulers with a lower complexity. Timestamp based fair packet schedulers have the ideal complexity of O(log V), where V is the maximum number of admitted flows, but it has been recently reduced to O(1) using bin concept. However, the latency property was deteriorated and the bandwidth utilization was also declined. In addition, traffic flows requiring strong delay bound may not be admitted. To overcome these problems, this paper proposes a Mini-Bin based Start-Time (MBST) scheduler with variable complexity and evaluates its performance. The MBST scheduler uses the timestamp calculation scheme of start-time based schedulers to enhance the bandwidth utilization and also introduces mini-bin concept to improve the latency, The performance evaluation shows that the proposed scheduler can reduce the complexity of the legacy start-tine based schedulers by $1.8{\sim}5$ times without deteriorating the bandwidth utilization property.

  • PDF

Delay Guaranteed Bandwidth-Efficient Multicast Routing in Wireless Multi-hop Networks (다중 홉 무선 네트�p에서 지연을 고려한 멀티케스트 루팅)

  • Sohn, Hee-Seok;Lee, Chae Y.
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.41 no.2
    • /
    • pp.53-65
    • /
    • 2016
  • Static wireless multi-hop networks, such as wireless mesh networks and wireless sensor networks have proliferated in recent years because of they are easy to deploy and have low installation cost. Two key measures are used to evaluate the performance of a multicast tree algorithm or protocol : end-to-end delay and the number of transmissions. End-to-end delay is the most important measure in terms of QoS because it affects the total throughput in wireless networks. Delay is similar to the hop count or path length from the source to each destination and is directly related to packet success ratio. In wireless networks, each node uses the air medium to transmit data, and thus, bandwidth consumption is related to the number of transmission nodes. A network has many transmitting nodes, which will cause many collisions and queues because of congestion. In this paper, we optimize two metrics through a guaranteed delay scheme. We provide an integer linear programming formulation to minimize the number of transmissions with a guaranteed hop count and preprocessing to solve the aforementioned problem. We extend this scheme not only with the guaranteed minimum hop count, but also with one or more guaranteed delay bounds to compromise two key metrics. We also provide an explanation of the proposed heuristic algorithm and show its performance and results.