• Title/Summary/Keyword: computing model

Search Result 3,371, Processing Time 0.041 seconds

Estimation of Time Trends of Incidence of Prostate Canner - an Indian Scenario

  • Lalitha, Krishnappa;Suman, Gadicherla;Pruthvish, Sreekantaiah;Mathew, Aleyamma;Murthy, Nandagudi S.
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.12
    • /
    • pp.6245-6250
    • /
    • 2012
  • Background: With increase in life expectancy, adoption of newer lifestyles and screening using prostate specific antigen (PSA), the incidence of prostate cancer is on rise. Globally prostate cancer is the second most frequently diagnosed cancer and sixth leading cause of cancer death in men. The present communication makes an attempt to analyze the time trends in incidence for different age groups of the Indian population reported in different Indian registries using relative difference and regression approaches. Materials and Methods: The data published in Cancer Incidence in Five Continents for various Indian registries for different periods and/or publications by the individual registries served as the source materials. Trends were estimated by computing the mean annual percentage change (MAPC) in the incidence rates using the relative difference between two time periods (latest and oldest) and also by estimation of annual percentage change (EAPC) by the Poisson regression model. Results: Age adjusted incidence rates (AAR) of prostate cancer for the period 2005-2008 ranged from 0.8 (Manipur state excluding Imphal west) to 10.9 (Delhi) per $10^5$ person-years. Age specific incidence rates (ASIR) increased in all PBCRs especially after 55 years showing a peak incidence at +65 years clearly indicating that prostate cancer is a cancer of the elderly. MAPC in crude incidence rate(CR) ranged from 0.14 (Ahmedabad) to 8.6 (Chennai). Chennai also recorded the highest MAPC of 5.66 in ASIR in the age group of 65+. Estimated annual percentage change (EAPC) in the AAR ranged from 0.8 to 5.8 among the three registries. Increase in trend was seen in the 55-64 year age group cohort in many registries and in the 35-44 age group in Metropolitan cities such as Delhi and Mumbai. Conclusions: Several Indian registries have revealed an increasing trend in the incidence of prostate cancer and the mean annual percentage change has ranged from 0.14-8.6.

A Study on Efficient Fault-Diagnosis for Multistage Interconnection Networks (다단 상호 연결 네트워크를 위한 효율적인 고장 진단에 관한 연구)

  • Bae, Sung-Hwan;Kim, Dae-Ik;Lee, Sang-Tae;Chon, Byoung-SIl
    • The Journal of the Acoustical Society of Korea
    • /
    • v.15 no.5
    • /
    • pp.73-81
    • /
    • 1996
  • In multiprocessor systems with multiple processors and memories, efficient communication between processors and memories is critical for high performance. Various types of multistage networks have been proposed. The economic feasibility and the improvements in both computing throughput and fault tolerance/diagnosis have been some of the most important factors in the development of these computer systems. In this paper, we present an efficient algorithm for the diagnosis of generalized cube interconnection networks with a fan-in/fan-out of 2. Also, using the assumed fault model present total fault diagnosis by generating suitable fault-detection and fault-location test sets for link stuck fault, switching element fault in direct/cross states, including broadcast diagnosis methods based on some basic properties or generalized cube interconnection networks. Finally, we illustrate some example.

  • PDF

A Study on the Pressure Distributions of Horn Rudder Operating in Ship's Wake (선미 후류에서 작동하는 혼타의 압력분포에 관한 연구)

  • Do-Sung Kong;Jae-Moon Han;Jae-Moon Lew
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.39 no.2
    • /
    • pp.1-10
    • /
    • 2002
  • Hull-propeller-rudder interactions are studied by the iterative computational procedures. Hull effects on the propeller are reflected through the effective velocities computed by the vortex ring method which used the measured nominal wake as input data. A potential based panel method has been developed to solve the propeller-rudder interactions using the obtained effective velocities. Steady flow characteristics around the rudder surface can be obtained by computing the induced velocities on the rudder by the propeller and vice versa are computed by the iterative manner until the converged solutions are obtained. Flow characteristics around the propeller and the rudder are measured by Laser Doppler Velocimetry(L.D.V.) in large cavitation tunnel at Samsung Heavy industries. The gap flow model is adopted to solve the characteristics of the horn rudder. Numerical results are compared with the experimental values and the computed velocity fields and pressure distributions with rudder angle on the horn rudder surface show good agreement with measured ones in large cavitation tunnel.

A Study on the Selection Process of RFID Middleware and Quality Factor Evaluation in Ubiquitous Computing (유비쿼터스 컴퓨팅 환경에서 RFID 미들웨어 선정 프로세스 및 품질 요소 평가에 대한 연구)

  • Oh, Gi-Oug;Park, Jung-Oh
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.257-263
    • /
    • 2011
  • Conventional middleware is software providing services between clients and servers efficiently, but it is not applicable to RFID systems because of low consistency due to the absence of context awareness function, and problems in the management of meaning, security system, etc. Accordingly, we need a quality selection process and a quality evaluation method for selecting RFID middleware based on new criteria. This Paper proposed a new selection process based on international standard ISO/IEC 14598, and extracted and selected optimal quality factors through the proposed process. The selected quality factors were mapped to the quality characteristics of standard quality model ISO/IEC 9126, and to quality factors of RFID middleware of SUN, Microsoft, EPCglobal, IBM, etc. The results of these works showed that the quality factors extracted and selected through the proposed process were fair and adequate for evaluating the quality of RFID middleware.

Q-NAV: NAV Setting Method based on Reinforcement Learning in Underwater Wireless Networks (Q-NAV: 수중 무선 네트워크에서 강화학습 기반의 NAV 설정 방법)

  • Park, Seok-Hyeon;Jo, Ohyun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.6
    • /
    • pp.1-7
    • /
    • 2020
  • The demand on the underwater communications is extremely increasing in searching for underwater resources, marine expedition, or environmental researches, yet there are many problems with the wireless communications because of the characteristics of the underwater environments. Especially, with the underwater wireless networks, there happen inevitable delay time and spacial inequality due to the distances between the nodes. To solve these problems, this paper suggests a new solution based on ALOHA-Q. The suggested method use random NAV value. and Environments take reward through communications success or fail. After then, The environments setting NAV value from reward. This model minimizes usage of energy and computing resources under the underwater wireless networks, and learns and setting NAV values through intense learning. The results of the simulations show that NAV values can be environmentally adopted and select best value to the circumstances, so the problems which are unnecessary delay times and spacial inequality can be solved. Result of simulations, NAV time decreasing 17.5% compared with original NAV.

Design and Evaluation of Flexible Thread Partitioning System (융통성 있는 스레드 분할 시스템 설계와 평가)

  • Jo, Sun-Moon
    • Journal of Internet Computing and Services
    • /
    • v.8 no.3
    • /
    • pp.75-83
    • /
    • 2007
  • Multithreaded model is an effective parallel system in that it can reduce the long memory reference latency time and solve the synchronization problems. When compiling the non-strict functional programs for the multithreaded parallel machine, the most important thing is to find an set of sequentially executable instructions and to partitions them into threads. The existing partitioning algorithm partitions the condition of conditional expression, true expression and false expression into the basic blocks and apply local partitioning to these basic blocks. We can do the better partitioning if we modify the definition of the thread and allow the branching within the thread. The branching within the thread do not reduce the parallelism, do not increase the number of synchronization and do not violate the basic rule of the thread partitioning. On the contrary, it can lengthen the thread and reduce the number of synchronization. In the paper, we enhance the method of the partition of threads by combining the three basic blocks into one of two blocks.

  • PDF

Air Threat Evaluation System using Fuzzy-Bayesian Network based on Information Fusion (정보 융합 기반 퍼지-베이지안 네트워크 공중 위협평가 방법)

  • Yun, Jongmin;Choi, Bomin;Han, Myung-Mook;Kim, Su-Hyun
    • Journal of Internet Computing and Services
    • /
    • v.13 no.5
    • /
    • pp.21-31
    • /
    • 2012
  • Threat Evaluation(TE) which has air intelligence attained by identifying friend or foe evaluates the target's threat degree, so it provides information to Weapon Assignment(WA) step. Most of TE data are passed by sensor measured values, but existing techniques(fuzzy, bayesian network, and so on) have many weaknesses that erroneous linkages and missing data may fall into confusion in decision making. Therefore we need to efficient Threat Evaluation system that can refine various sensor data's linkages and calculate reliable threat values under unpredictable war situations. In this paper, we suggest new threat evaluation system based on information fusion JDL model, and it is principle that combine fuzzy which is favorable to refine ambiguous relationships with bayesian network useful to inference battled situation having insufficient evidence and to use learning algorithm. Finally, the system's performance by getting threat evaluation on an air defense scenario is presented.

Design and Implementation of the Sinkhole Traceback Protocol against DDoS attacks (DDoS 공격 대응을 위한 Sinkhole 역추적 프로토콜 설계 및 구현)

  • Lee, Hyung-Woo;Kim, Tae-Su
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.85-98
    • /
    • 2010
  • An advanced and proactive response mechanism against diverse attacks on All-IP network should be proposed for enhancing its security and reliability on open network. There are two main research works related to this study. First one is the SPIE system with hash function on Bloom filter and second one is the Sinkhole routing mechanism using BGP protocol for verifying its transmission path. Therefore, advanced traceback and network management mechanism also should be necessary on All-IP network environments against DDoS attacks. In this study, we studied and proposed a new IP traceback mechanism on All-IP network environments based on existing SPIE and Sinkhole routing model when diverse DDoS attacks would be happen. Proposed mechanism has a Manager module for controlling the regional router with using packet monitoring and filtering mechanism to trace and find the attack packet's real transmission path. Proposed mechanism uses simplified and optimized memory for storing and memorizing the packet's hash value on bloom filter, with which we can find and determine the attacker's real location on open network. Additionally, proposed mechanism provides advanced packet aggregation and monitoring/control module based on existing Sinkhole routing method. Therefore, we can provide an optimized one in All-IP network by combining the strength on existing two mechanisms. And the traceback performance also can be enhanced compared with previously suggested mechanism.

Development of The Korean Trust Index for Social Network Services (한국의 소셜네트워크서비스 신뢰지수 KTI 설계)

  • Kim, Yukyong;Jhee, Eun-Wha;Shin, Yongtae
    • Journal of Internet Computing and Services
    • /
    • v.15 no.6
    • /
    • pp.35-45
    • /
    • 2014
  • Due to the spread of unreliable online information on the social network services, the users are faced with a difficult problem for determining if the information is trustworthy or not. At present, the users should make a decision by themselves throughly for the trustworthiness of the information. Therefore, we need a way to systematically evaluate the trustworthiness of information on the social network services. In this paper, we design a trust index, called KTI (Korean Trust Index for SNS), as a criterion for measuring the trust degree of the information on the social network services. Using KTI, the users are readily able to determine whether the information is trustworthy. Consequently, we can estimate the social trust degree based on the variation of KTI. This paper derives the various factors affecting trust from the properties of the social network services, and proposes a model to evaluate the trustworthiness of information that is directly produced and distributed over the online network. Quantifying the trust degree of the information on the social network services allows the users to make efficient use of the social network.

A Detection Method of Interference from WiFi Network in IEEE 802.15.4 Network (IEEE 802.15.4 네트워크에서 WiFi 네트워크의 간섭 탐지 방법)

  • Song, Myong Lyol
    • Journal of Internet Computing and Services
    • /
    • v.14 no.4
    • /
    • pp.13-24
    • /
    • 2013
  • IEEE 802.15.4 network and WiFi network are installed to overlap each other and configured to use adjacent frequency bands in which case the communication service required by applications can not be guaranteed because of randomly increased frame transmission delay and frequent frame transmission failures at nodes in IEEE 802.15.4 network. In this paper, transmission delay model at IEEE 802.15.4 nodes and an experimental system to evaluate the interference from WiFi traffic are described, then elements for the evaluation of interference are measured with the analysis of their characteristics. A sequential method of using medium access layer and physical layer elements of IEEE 802.15.4 protocols is proposed to decide interference from WiFi network. With the proposed method, if an evaluation function having frame transmission failures and transmission delay as variables returns a value greater than a threshold, intensive measurements of wireless channel power are carried out subsequently and the final decision of interference is made by the calculated average channel power. Experimental results of the method show that the decision time is reduced with increased frequency of decision in comparison to an other similar method.