• Title/Summary/Keyword: number of nodes

Search Result 2,162, Processing Time 0.032 seconds

Is Level V Dissection Necessary for Low-risk Patients with Papillary Thyroid Cancer Metastasis in Lateral Neck Levels II, III, and IV

  • Yu, Wen-Bin;Tao, Song-Yun;Zhang, Nai-Song
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.9
    • /
    • pp.4619-4622
    • /
    • 2012
  • Whether it is beneficial to dissect level V in papillary thyroid cancer (PTC) patients with positive lateral neck lymph nodes at levels II-IV is still controversial, especially for low risk cases. In this study, we reviewed the medical records of 47 patients who underwent 47 ipsilateral selective lateral neck dissections (levels II-IV) for previously untreated papillary thyroid carcinomas between October 2006 and October 2008 to assist in establishing the optimal strategy for lateral neck dissection in low risk PTC patients with clinically negative level V nodes. All 47 patients were confirmed to have positive lymph nodes pathologically. Seventeen (36.12%), 36 (76.6%), and 34 (72.34%) patients had positive lymph nodes in levels II, III, and IV, respectively. The mean number of pathologically positive lymph nodes was 1.7 in level II, 2.9 in level III, 2.8 in level IV. No death and distant metastasis were recorded during follow up period. Just 2 patients exhibited recurrence to lymph nodes, and only one showed nodal recurrence in ipsilateral level V, who had positive lymph nodes in all of levels II, III, and IV at initial neck surgery. In conclusion, for PTC low risk patients with clinically negative lymph nodes in level V, non-performance of level V dissection would still achieve good survival results as traditional modified radical neck dissection, with a "wait and see" strategy to be recommended.

An Analytical Model for LR-WPAN Performance in the Presence of Hidden Nodes (은닉노드를 고려한 LR-WPAN 성능의 분석적 모델)

  • Lee, Kang-Woo;Shin, Youn-Soon;Hyun, Gyu-Wan;Ahn, Jong-Suk;Kim, Hie-Cheol
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.133-142
    • /
    • 2009
  • This paper proposes an analytical performance model of IEEE 802.15.4 in the presence of hidden nodes. Conventional 802.15.4 mathematical models assume ideal situations where every node can detect the transmission signal of every other nodes different from the realistic environments. Since nodes can be randomly located in real environments so that some nodes' presence is hidden from other ones, this assumption leads to wrong performance evaluation of 802.15.4. For solving this problem, we develop an extended performance model which combines the traditional 802.15.4 performance model with one for accounting the presence of hidden nodes. The extended model predicts the rapid performance degradation of 802.15.4 due to the small number of hidden nodes. The performance, for example, degrades by 62% at maximum when 5% of the total nodes are hidden. These predictions are confirmed to be equal to those of ns-2 simulations by less than 6% difference.

A Congestion Control Scheme Considering Traffic in Large-Scale Wireless Sensor Networks (대규모 무선 센서 네트워크에서 트래픽을 고려한 혼잡제어)

  • Kwak, Moon-Sang;Hong, Young Sik
    • Journal of KIISE
    • /
    • v.42 no.1
    • /
    • pp.114-121
    • /
    • 2015
  • Large-scale wireless sensor networks are constructed by using a large number of sensor nodes that are non-uniformly deployed over a wide area. As a result, the data collected by the sensor nodes are similar to that from one another since a high density of the sensor nodes may cause an overlap. As a result of the characteristics of the traffic, data is collected from a plurality of sensor nodes by a sink node, and when the sensor nodes transmit their collected data to the sink node, the sensor nodes around the sink node have a higher amount of traffic than the sensor nodes far away from the sink node. Thus, the former sensor encounter bottlenecks due to traffic congestion and have an energy hole problem more often than the latter ones, increasing energy consumption. This paper proposes a congestion control scheme that considers traffic flows in order to control traffic congestion of the sensor nodes that are non-uniformly deployed over a large-scale wireless sensor network.

An Efficient Energy Charging Scheme for Wireless Sensor Networks Using a Mobile Sink Capable of Wireless Power Transmission

  • Park, Kyoung nam;Yoon, Ikjune
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.5
    • /
    • pp.1-9
    • /
    • 2019
  • In this paper, we propose the algorithms which determine 1) the efficient anchor-node visiting route of mobile sink in terms of energy supply and 2) the efficient energy amount to be charged to each anchor node, by using the information of each anchor node and the mobile sink. Wireless sensor networks (WSNs) using mobile sinks can be deployed in more challenging environments such as those that are isolated or dangerous, and can also achieve a balanced energy consumption among sensors which leads to prolong the network lifetime. Most mobile sinks visit only some anchor nodes which store the data collected by the nearby sensor nodes because of their limited energy. The problem of these schemes is that the lifetime of the anchor nodes can be shorten due to the increased energy consumption, which rapidly reduces the overall lifetime of WSN. This study utilizes a mobile sink capable of wireless power transmission to solve this problem, so a mobile sink can gather data from anchor nodes while charging energy to them. Through the performance verification, it is confirmed that the number of blackout nodes and the amount of collected data are greatly improved regardless of the size of the network.

A Mechanism for Handling Selfish Nodes using Credit in Sensor Networks (센서 네트워크에서 크레딧을 이용한 이기적인 노드 처리 방안)

  • Choe, Jong-Won;Yoo, Dong-Hee
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.2
    • /
    • pp.120-129
    • /
    • 2008
  • The purpose of sensor network is gathering the information from sensor nodes. If there are selfish node that deliberately avoid packet forwarding to save their own energy, the sensor network has trouble to collect information smoothly. To solve this problem we suggest a mechanism which uses credit payment schema according to the amount of forwarding packets. Sensor nodes use credits to send their own message and they forward packets of other sensor nodes to get credits. To offer authenticity we combined the roles of sink node and server, also we used piggybacking not to send additional report message. The packet trace route is almost fixed because sensor node doesn't have mobility. In this case, it happens that some sensor nodes which don't receive forwarding packets therefore they can't get credit. So, we suggested the way to give more credits to these sensor nodes. Finally, we simulated the suggested mechanism to evaluate performance with ns2(network simulator). As a result, packet transmission rate was kept on a high rate and the number of arrival packets to sink node was increased. Also, we could verify that more sensor nodes live longer due to deceasing the energy consumption of sensor nodes.

An Efficient Data Dissemination Protocol for Cluster-based Wireless Sensor Networks (클러스터 기반의 무선 센서네트워크에서 통신량을 줄인 데이터 보급방법)

  • Cho, Ji-Eun;Choe, Jong-Won
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.3
    • /
    • pp.222-230
    • /
    • 2009
  • A sensor network is an important element of the ubiquitous and it consists of sensor fields that contain sensor nodes and sink nodes that collect data from sensor nodes. Since each sensor node has limited resources, one of the important issues covered in the past sensor network studies has been maximizing the usage of limited energy to extend network lifetime. However, most studies have only considered fixed sink nodes, which created various problems for cases with multiple mobile sink nodes. Accordingly, while maintaining routes to mobile sink nodes, this study aims to deploy the hybrid communication mode that combines single and multi-hop modes for intra-cluster and inter-cluster transmission to resolve the problem of failed data transmission to mobile sink nodes caused by disconnected routes. Furthermore, a 2-level hierarchical routing protocol was used to reduce the number of sensor nodes participating in data transmission, and cross-shape trajectory forwarding was employed in packet transmission to provide an efficient data dissemination method.

Mesh Reconstruction Using Redistibution of Nodes in Sub-domains and Its Application to the Analyses of Metal Forming Problems (영역별 절점재구성을 통한 격자재구성 및 소성가공해석)

  • Hong, Jin-Tae;Yang, Dong-Yol
    • Korean Journal of Computational Design and Engineering
    • /
    • v.12 no.4
    • /
    • pp.255-262
    • /
    • 2007
  • In the finite element analysis of forming process, objects are described with a finite number of elements and nodes and the approximated solutions can be obtained by the variational principle. One of the shortcomings of a finite element analysis is that the structure of mesh has become inefficient and unusable because discretization error increases as deformation proceeds due to severe distortion of elements. If the state of current mesh satisfies a certain remeshing criterion, analysis is stopped instantly and resumed with a reconstructed mesh. In the study, a new remeshing algorithm using tetrahedral elements has been developed, which is adapted to the desired mesh density. In order to reduce the discretization error, desired mesh sizes in each lesion of the workpiece are calculated using the Zinkiewicz and Zhu's a-posteriori error estimation scheme. The pre-constructed mesh is constructed based on the modified point insertion technique which is adapted to the density function. The object domain is divided into uniformly-sized sub-domains and the numbers of nodes in each sub-domain are redistributed, respectively. After finishing the redistribution process of nodes, a tetrahedral mesh is reconstructed with the redistributed nodes, which is adapted to the density map and resulting in good mesh quality. A goodness and adaptability of the constructed mesh is verified with a testing measure. The proposed remeshing technique is applied to the finite element analyses of forging processes.

A Cluster-Based Energy-Efficient Routing Protocol without Location Information for Sensor Networks

  • Lee, Gil-Jae;Kong, Jong-Uk;Lee, Min-Sun;Byeon, Ok-Hwan
    • Journal of Information Processing Systems
    • /
    • v.1 no.1 s.1
    • /
    • pp.49-54
    • /
    • 2005
  • With the recent advances in Micro Electro Mechanical System (MEMS) technology, low cost and low power consumption wireless micro sensor nodes have become available. However, energy-efficient routing is one of the most important key technologies in wireless sensor networks as sensor nodes are highly energy-constrained. Therefore, many researchers have proposed routing protocols for sensor networks, especially cluster-based routing protocols, which have many advantages such as reduced control messages, bandwidth re-usability, and improved power control. Some protocols use information on the locations of sensor nodes to construct clusters efficiently. However, it is rare that all sensor nodes know their positions. In this article, we propose another cluster-based routing protocol for sensor networks. This protocol does not use information concerning the locations of sensor nodes, but uses the remaining energy of sensor networks and the desirable number of cluster heads according to the circumstances of the sensor networks. From performance simulation, we found that the proposed protocol shows better performance than the low-energy adaptive clustering hierarchy (LEACH).

Qos Enhancement in PCF of IEEE 802.11 through Simulation (시뮬레이션을 통한 IEEE 802.11 PCF의 QoS 향상에 관한 연구)

  • Kim Joong-jae;Kim Seong-cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.8
    • /
    • pp.1676-1682
    • /
    • 2005
  • PCF(Point Coordination Function) of IEEE 802.11 MAC protocol is an access method oat generally has better performance under high offered load conditions. And it is also appropriate for sending data of time-limited applications. In this paper we consider the QoS(Quality of Service) enhancement method according to the change of nodes in the IEEE 802.11 WLAN. We assume that the un consists or QoS nodes and non-QoS nodes. The QoS nodes has a mechanism to support QoS. we can find the appropriate network parameters by many simulations. And the changes of network status are considered according to the number of nodes.

An Efficient Cluster Header Election Technique in Zigbee Environments (Zigbee환경에서 효율적인 Cluster Header 선출 기법)

  • Lee, Joo-Hyun;Lee, Kyung-Hwa;Lee, Jun-Bok;Shin, Yong-Tae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.3
    • /
    • pp.346-350
    • /
    • 2010
  • Since sensor nodes have restriction of using resources in Zigbee network, number of study on improving efficiency is currently ongoing[1]. Clustering mechanism based on hierarchy structure provides a prevention of duplicated information and a facility of a network expansion[2]. however overheads can occurs when the cluster header is elected and the election of a incorrect cluster header causes to use resources inefficiently. In this paper, we propose that the cluster header election mechanism using distances between nodes and density of nodes in accordance with the operation of the central processing system in which the sync nodes are having information of location and energy with respect to general nodes based on hierachy clustering mechanism.