• Title/Summary/Keyword: Active node

Search Result 235, Processing Time 0.025 seconds

Design of Active Node Architecture for Active Networks (액티브 네트워크를 위한 액티브 노드 구조 설계)

  • 이병기;조국현
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10c
    • /
    • pp.578-580
    • /
    • 1999
  • 액티브 네트워크는 사용자에 의해 커스터마이즈된 응용이나 프로토콜을 망 내의 노드들에 동적으로 삽입하여 망 노드들이 새로운 사용자 요구나 서비스에 신속하게 대응할 수 있도록 한다. 액티브 네트워크는 패킷내에 새로운 응용이나 프로토콜에 대한 코드와 데이터를 캡슐화시켜 전송하는 액티브 패킷과 이러한 액티브패킷을 수신하여 처리하는 액티브 노드로 이루어진다. 본 논문에서는 액티브 네트워크 구조와 구성 요소들에 대해 기술하고, 이를 통해 액티브 패킷의 구조와 수신된 액티브 패킷을 처리할 수 있는 액티브 노드의 구조를 제안한다.

  • PDF

Performance Evaluation of Dynamic Numbering Schemes on SQL (SQL 호스트에서 동적 번호 부여 방식의 성능 평가)

  • Hong, Dong-Kweon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.3
    • /
    • pp.437-443
    • /
    • 2009
  • There has been many active researches on dynamic XML numbering scheme for efficient retrievals and updates of XML. There are two major approaches for dynamic numbering schemes. One approach is dependant on adjacent node numbers when they assign new number for newly inserted node. While the other approach is independent on adjacent node numbers. In this paper we explain the table schema and procedures for our experiments on an SQL host to compare the performance of the two approaches and shows W3C XQuery performance results of the two approaches on the SQL host.

Comparative Effectiveness of Risk-adapted Surveillance vs Retroperitoneal Lymph Node Dissection in Clinical Stage I Nonseminomatous Germ Cell Testicular Cancer: A Retrospective Follow-up Study of 81 Patients

  • Fan, Gang;Zhang, Lin;Yi, Lu;Jiang, Zhi-Qiang;Ke, Yang;Wang, Xiao-Shan;Xiong, Ying-Ying;Han, Wei-Qin;Zhou, Xiao;Liu, Chun;Yu, Xie
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.8
    • /
    • pp.3267-3272
    • /
    • 2015
  • Purpose: To retrospective assess the potential predictors for relapse and create an effective clinical mode for surveillance after orchidectomy in clinical stage I non-seminomatous germ cell testicular tumors (CSI-NSGCTs). Materials and Methods: We analyzed data for CSI-NSGCTs patients with non-lymphatic vascular invasion, %ECa < 50% (percentage of embryonal carcinoma < 50%), and negative or declining tumor markers to their half-life following orchidectomy (defined as low-risk patients); these patients were recruited from four Chinese centers between January 1999 and October 2013. Patients were divided into active surveillance group and retroperitoneal lymph node dissection (RPLND) group according to different therapeutic methods after radical orchidectomy was performed. The disease-free survival rates (DFSR) and overall survival rates (OSR) of the two groups were compared by Kaplan-Meier analysis. Results: A total of 121 patients with CSI-NSGCT were collected from four centers, and 81 low-risk patients, including 54 with active surveillance and 27 with RPLND, were enrolled at last. The median follow-up duration was 66.2 (range 6-164) months in the RPLND group and 65.9 (range 8-179) months in the surveillance group. OSR was 100% in active surveillance and RPLND groups, and DFSR was 89.8% and 87.0%, respectively. No significant difference was observed between these two groups ($X_2=0.108$, P=0.743). No significant difference was observed between the patients with a low percentage of embryonal carcinoma (<50%) and those without embryonal carcinoma (87.0% and 91.9%, $X_2=0.154$, P=0.645). No treatment-related complications were observed in the active surveillance group whereas minor and major complications were observed in 13.0% and 26.1% of the RPLND group, respectively. Conclusions: Active surveillance resulted in similar DFSR and OSR compared with RPLND in our trial. Patients with low-risk CSI-NSGCTs could benefit from risk-adapted surveillance after these patients were subjected to radical orchidectomy.

Active Node and Active Network Modeling For Network Traffic Progress (네트워크 트래픽 성능 향상을 위한 액티브 노드 및 액티브 네트워크 설계)

  • Choi Byung-Sun;Hwang Young-Chul;Lee Seong-Hyun;Lee Won-Goo;Lee Jae-Kwang
    • 한국컴퓨터산업교육학회:학술대회논문집
    • /
    • 2003.11a
    • /
    • pp.119-126
    • /
    • 2003
  • Computer simulation has used to a area of military training from about several years ago. War game model(or computer simulation) endow a military man with field training such as combat experience without operating combat strength or capabilities. To samely construct simulation environment against actual combat environment is to well construct DB to operate war game model, associate among federates on network. Thus, we construct virtual combat environment enabling to efficiently manage network traffic among federates(or active nodes) on active network that construct virtual military training space such as urgent combat field needed to rapidly transfer combat information including image and video.

  • PDF

A scheme of EEMR protocol for energy efficient in wireless sensor networks (EEMR 프로토콜을 이용한 무선 센서 네트워크 노드의 에너지 소비 절감 방법)

  • Cho, Ik-Lae;Lee, Ho-Sun;Lee, Kyoon-Ha
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.229-237
    • /
    • 2005
  • One of the important issues of in this research is effective usage of energy to increase life time of nodes which form a network. Existing LEEM protocol causes unnecessary active time due to small packets with shorter transfer time than active interval period of node and packets with transfer time of more than twice of active interval period of node. In this paper, we propose Energy-Efficient MAC by Reservation (EEMR) protocol which can increase energy effectiveness in wireless sensor network environment by reducing unnecessary active time using a method that reserves next-hop depend upon the size of packet. We evaluated effectiveness of our proposed method through experiments. The result showed that using EEMR protocol had better energy effectiveness than existing LEEM protocol by 15%.

  • PDF

A Novel Active User Identification Method for Space based Constellation Network

  • Kenan, Zhang;Xingqian, Li;Kai, Ding;Li, Li
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.212-216
    • /
    • 2022
  • Space based constellation network is a kind of ad hoc network in which users are self-organized without center node. In space based constellation network, users are allowed to enter or leave the network at any given time. Thus, the number of active users is an unknown and time-varying parameter, and the performance of the network depends on how accurately this parameter is estimated. The so-called problem of active user identification, which consists of determining the number and identities of users transmitting in space based constellation network is discussed and a novel active user identification method is proposed in this paper. Active user identification code generated by transmitter address code and receiver address code is used to spread spectrum. Subspace-based method is used to process received signal and judgment model is established to identify active users according to the processing results. The proposed method is simulated under AWGN channel, Rician channel and Rayleigh channel respectively. Numerical results indicate that the proposed method obtains at least 1.16dB Eb/N0 gains compared with reference methods when miss alarm rate reaches 10-3.

A Design of Security Protocol for Active Warehouse Condition Management System based on Ubiquitous Environment (유비쿼터스 환경에능동형 창고 상태관리를 위한 보안 프로토콜 설계)

  • John, Young-Jun;Choi, Yong-Sik;Shin, Seung-Ho;Park, Sang-Min
    • Journal of the Korea Safety Management & Science
    • /
    • v.8 no.6
    • /
    • pp.91-108
    • /
    • 2006
  • RFID/USN is important infrastructure of the ubiquitous society. And so, It is various and practical research is attempted. These two base technology have physical characteristic and complement relationship. Like this relationship is applied Following example that is system research which manages warehouse stocks and conditions. First, We adhere RFID Tag at the Pallet of the warehouse and do identification goods. And then, It grasps the environment state information of stocks with sensor module which has Zigbee wireless communication function. From like this process RFID Tag information and jop-control command of sensor node also it is exposed to air. Therefore, We control sensor node in USN/RFID environment through the mobile device. And system design for the security Apply of the process is main purpose of this paper's. We propose the condition and function of the mobile device to the secondary. And We define the relation of the sensor node with RFID to be arranged to a warehouse. Finally, This paper is designed to find a trade-off of the following viewpoints. First, We offer suitable sensor-control information to a actual manager. Second, We offer RFID tag security approach to control the action of the sensor. Third, It increases the survivability of sensor node form.

The Algorithm for an Energy-efficient Particle Sensor Applied LEACH Routing Protocol in Wireless Sensor Networks (무선센서네트워크에서 LEACH 라우팅 프로토콜을 적용한 파티클 센서의 에너지 효율적인 알고리즘)

  • Hong, Sung-Hwa;Kim, Hoon-Ki
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.3
    • /
    • pp.13-21
    • /
    • 2009
  • The sensor nodes that form a wireless sensor network must perform both routing and sensing roles, since each sensor node always has a regular energy drain. The majority of sensors being used in wireless sensor networks are either unmanned or operated in environments that make them difficult for humans to approach. Furthermore, since many wireless sensor networks contain large numbers of sensors, thus requiring the sensor nodes to be small in size and cheap in price, the amount of power that can be supplied to the nodes and their data processing capacity are both limited. In this paper, we proposes the WSN(Wireless Sensor Network) algorithm which is applied sensor node that has low power consumption and efficiency measurement. Moreover, the efficiency routing protocol is proposed in this paper. The proposed algorithm reduces power consumption of sensor node data communication. It has not researched in LEACH(Low-Energy Adaptive Clustering Hierarchy) routing protocol. As controlling the active/sleep mode based on the measured data by sensor node, the energy consumption is able to be managed. In the event, the data is transferred to the local cluster head already set. The other side, this algorithm send the data as dependent on the information such as initial and present energy, and the number of rounds that are transformed into cluster header and then transferred. In this situation, the assignment of each node to cluster head evenly is very important. We selected cluster head efficiently and uniformly distributed the energy to each cluster node through the proposed algorithm. Consequently, this caused the extension of the WSN life time.

Design of Active Network Node (액티브 네트워크 노드의 설계)

  • 김동영;한민호;이영석;나중찬
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04d
    • /
    • pp.578-580
    • /
    • 2003
  • 액티브 네트워크 상의 각각의 노드는 패킷을 통해 전달된 프로그램을 수행시키는 역활을 수행한다. 본 논문에서는 액티브 네트워크 노드의 설계를 기술한다. 이를 위해 액티브 네트워크의 개념을 기술하고, 노드운영체제, 수행환경, 액티브네트워크 응용프로그램의 구조를 설명하고, 또한 응용프로그램을 계발하기 위한 프로그래밍 모델에 대하여 기술한다.

  • PDF

Node Operating System in the Active Network (능동 네트워크에서 노드 운영체제)

  • 장승주;이영석;나중찬
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10c
    • /
    • pp.388-390
    • /
    • 2002
  • 본 논문은 액티브 네트워크에서 자원 관리를 담당하는 노드 운영체제의 구조와 기능을 설계하였다. 본 논문에서 제안하는 노드 운영체제는 도메인, 채널, 쓰레드, 메모리, 파일 모듈로 이루어져 있다. 본 논문에서 노드 운영체제의 도메인, 패널, 쓰레드, 메모리, 파일 모듈의 설계 내용에 대해서 기술한다.

  • PDF