• Title/Summary/Keyword: Intermediate Node

Search Result 164, Processing Time 0.029 seconds

Ultrasonographic Indeterminate Lymph Nodes in Preoperative Thyroid Cancer Patients: Malignancy Risk and Ultrasonographic Findings Predictive of Malignancy

  • Roh-Eul Yoo;Ji-hoon Kim;Jeong Mo Bae;Inpyeong Hwang;Koung Mi Kang;Tae Jin Yun;Seung Hong Choi;Chul-Ho Sohn;Jung Hyo Rhim;Sun-Won Park
    • Korean Journal of Radiology
    • /
    • v.21 no.5
    • /
    • pp.598-604
    • /
    • 2020
  • Objective: Proper management of lymph nodes (LNs) with ultrasonographic (US) indeterminate features in thyroid cancer patients remains elusive. We aimed to evaluate the malignancy risk and US findings predictive of malignancy for US indeterminate LNs in preoperative thyroid cancer patients through node-by-node correlation. Materials and Methods: A total of 348 LNs in 284 thyroid cancer patients, who underwent fine-needle aspiration or core-needle biopsy between December 2006 and June 2015, were included. We determined the malignancy risks for US probably benign, indeterminate, and suspicious categories. For US indeterminate LNs, which had neither echogenic hilum nor hilar vascularity in the absence of any suspicious finding, US findings were compared between benign and metastatic LNs using Mann-Whitney U test and Fisher's exact test. Results: US imaging diagnoses were probably benign in 20.7% (n = 72) cases, indeterminate in 23.6% (n = 82), and suspicious in 55.7% (n = 194). Malignancy risk of US indeterminate LNs (19.5% [16/82]) differed from those of the US probably benign (2.8% [2/72]) (p = 0.002) and US suspicious LNs (78.4% [152/194]) (p < 0.001). Among US indeterminate LNs, there were no significant differences in short, long, and long-to-short diameter (L/S) ratios between benign and metastatic LNs (3.9 vs. 3.8 mm, p = 0.619; 7.3 vs. 7.3 mm, p = 0.590; 1.9 vs. 1.9, p = 0.652). Conclusion: US indeterminate LNs were frequently encountered during preoperative evaluation and had intermediate malignancy risk. Given the lack of discriminative power of size criteria and L/S ratio, clinical factors such as surgical strategy and node size should be considered for proper triage of US indeterminate LNs in thyroid cancer.

Improved Compressed Network Coding Scheme for Energy-Efficient Data Communication in Wireless Sensor Networks

  • Zhou, Ying;Yang, Lihua;Yang, Longxiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.2946-2962
    • /
    • 2017
  • An improved energy-efficient compressed network coding method is proposed for the data communication in the wireless sensor networks (WSNs). In the method, the compressed sensing and network coding are jointly used to improve the energy efficiency, and the two-hop neighbor information is employed to choose the next hop to further reduce the number of the transmissions. Moreover, a new packet format is designed to facilitate the intermediate node selection. To theoretically verify the efficiency of the proposed method, the expressions for the number of the transmissions and receptions are derived. Simulation results show that, the proposed method has higher energy efficiency compared with the available schemes, and it only requires a few packets to reconstruct measurements with reasonable quality.

Efficient USN Routing Protocol using Sub-Clustering

  • Jeong, Su-Hyung;Yoo, Hae-Young
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.4
    • /
    • pp.466-469
    • /
    • 2008
  • The existing routing protocols in USN environment, PEGASIS is more efficient than LEACH, which is a hierarchical routing protocol, for network configuration based on power consumption. Despite its merit that it can reduce energy consumption per node, however, the PEGASIS protocol also has a weakness that it is less responsive to frequent changes that occur in the configuration of sensor network due to BS nodes that keep changing, which is a typical characteristic of the sensor network. To address this problem, this paper proposes to select sub-cluster heads and have them serve as intermediate nodes. This paper presents and analyses that this method can resolve the aforementioned problem of the PEGASIS algorithm.

DART: Fast and Efficient Distributed Stream Processing Framework for Internet of Things

  • Choi, Jang-Ho;Park, Junyong;Park, Hwin Dol;Min, Ok-gee
    • ETRI Journal
    • /
    • v.39 no.2
    • /
    • pp.202-212
    • /
    • 2017
  • With the advent of the Internet-of-Things paradigm, the amount of data production has grown exponentially and the user demand for responsive consumption of data has increased significantly. Herein, we present DART, a fast and lightweight stream processing framework for the IoT environment. Because the DART framework targets a geospatially distributed environment of heterogeneous devices, the framework provides (1) an end-user tool for device registration and application authoring, (2) automatic worker node monitoring and task allocations, and (3) runtime management of user applications with fault tolerance. To maximize performance, the DART framework adopts an actor model in which applications are segmented into microtasks and assigned to an actor following a single responsibility. To prove the feasibility of the proposed framework, we implemented the DART system. We also conducted experiments to show that the system can significantly reduce computing burdens and alleviate network load by utilizing the idle resources of intermediate edge devices.

Automatic interpretation of awaked EEG by using constructive neural networks with forgetting factor

  • Nakamura, Masatoshi;Chen, Yvette;Sugi, Takenao;Ikeda Akio;Shibasaki Hiroshi
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1995.10a
    • /
    • pp.505-508
    • /
    • 1995
  • The automatic interpretation of awake background electroencephalogram (EEG), consisting of quantitative EEG interpretation and EEG report making, has been developed by the authors based on EEG data visually inspected by an electroencephalographer (EEGer). The present study was focused on the adaptability of the automatic EEG interpretation which was accomplished by the constructive neural network with forgetting factor. The artificial neural network (ANN) was constructed so as to give the integrative decision of the EEG by using the input signals of the intermediate judgment of 13 items of the EEG. The feature of the ANN was that it adapted to any EEGer who gave visual inspection for the training data. The developed method was evaluated based on the EEG data of 57 patients. The re-trained ANN adapted to another EEGer appropriately.

  • PDF

Performance Analsis of an Integranted Voice/Data Cut-Through Switching Network (음성과 데이터가 집적된 Cut-Through 교환망의 성능 분석)

  • 윤영식;은종관
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.14 no.4
    • /
    • pp.360-368
    • /
    • 1989
  • In this paper, the performance of an integrated voice/data cut-through switching network is studied. We first derive cut-through probabilities of voice and data packets at intermediate nodes. Then, the Laplace transform for the network delay is obtained. According to numerical results, the performance of cut-through switching is superior to that of packet switching for integrated voice/data networks.

  • PDF

A Method Enabling Exploitation of Spatial Diversity and Physical Layer Security in an Extreme Case of Source-Wiretapping without a Jamming Beamformer

  • Tran, Truc Thanh;Kong, Hyung Yun
    • Journal of Communications and Networks
    • /
    • v.17 no.5
    • /
    • pp.482-490
    • /
    • 2015
  • This article exploits spatial diversity for jamming to prevent wiretapping in the extreme case in which an eavesdropper is located near the source and a common jamming signal is unavailable. To address this challenge, the jamming signal is allowed to carry a random binary message. Then, it is proposed that the active intermediate node transmits this jamming signal and the decoding of this signal at both source and destination is physically secured as result of using the physical-layer security method. If the source and the destination securely and correctly decode this jamming message, the source transmits another message which is created from combining its information message and the decoded message using the network-coding method. Therefore, this method prevents the transmissions from being eavesdropped upon by the source-wiretapping.

Wind-induced aerostatic instability of cable-supported bridges by a two-stage geometric nonlinear analysis

  • Yang, Y.B.;Tsay, Jiunn-Yin
    • Interaction and multiscale mechanics
    • /
    • v.1 no.3
    • /
    • pp.381-396
    • /
    • 2008
  • The aerostatic instability of cable-supported bridges is studied, with emphasis placed on modeling of the geometric nonlinear effects of various components of cable-supported bridges. Two-node catenary cable elements, which are more rational than truss elements, are adopted for simulating cables with large or small sags. Aerostatic loads are expressed in terms of the mean drag, lift and pitching moment coefficients. The geometric nonlinear analysis is performed with the dead loads and wind loads applied in two stages. The critical wind velocity for aerostatic instability is obtained as the condition when the pitching angle of the bridge deck becomes unbounded. Unlike those existing in the literature, each intermediate step of the incremental-iterative procedure is clearly given and interpreted. As such, the solutions obtained for the bridges are believed to be more rational than existing ones. Comparisons and discussions are given for the examples studied.

Improving Channel Capacity in Bidirectional Cooperative MIMO Relay Network

  • Niyizamwiyitira, Christine;Kang, Chul-Gyu;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.956-958
    • /
    • 2010
  • The paper considers MIMO two-way scheme to optimize the end to end capacity in local wireless mesh network. The basic idea is to perform data transmission via intermediate cooperative nodes and cooperative relay therefore higher throughput can be achieved. Each node is equipped with multiple antennas, and has two time slots one for transmission (Tx) and the other is reception (Rx), which are arranged alternatively in the network. In the conventional SISO network, it takes at least four time slots to accomplish the function of two-way relay. Moreover, cooperative technique is used in order to enhance multiplexing of forward and backward streams.

  • PDF

Fuzzy Based Multi-Hop Broadcasting in High-Mobility VANETs

  • Basha, S. Karimulla;Shankar, T.N.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.165-171
    • /
    • 2021
  • Vehicular Ad hoc Network (VANET) is an extension paradigm of moving vehicles to communicate with wireless transmission devices within a certain geographical limit without any fixed infrastructure. The vehicles have most important participation in this model is usually positioned quite dimly within the certain radio range. Fuzzy based multi-hop broadcast protocol is better than conventional message dissemination techniques in high-mobility VANETs, is proposed in this research work. Generally, in a transmission range the existing number of nodes is obstacle for rebroadcasting that can be improved by reducing number of intermediate forwarding points. The proposed protocol stresses on transmission of emergency message projection by utilization subset of surrounding nodes with consideration of three metrics: inter-vehicle distance, node density and signal strength. The proposed protocol is fuzzy MHB. The method assessment is accomplished in OMNeT++, SUMO and MATLAB environment to prove the efficiency of it.