• Title/Summary/Keyword: Intermediate Node

Search Result 164, Processing Time 0.021 seconds

Lymph Node Ratio is More Predictive than Traditional Lymph Node Stratification in Lymph Node Positive Invasive Breast Cancer

  • Bai, Lian-Song;Chen, Chuang;Gong, Yi-Ping;Wei, Wen;Tu, Yi;Yao, Feng;Li, Juan-Juan;Wang, Li-Jun;Sun, Sheng-Rong
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.2
    • /
    • pp.753-757
    • /
    • 2013
  • Objective: To evaluate the relationships between lymph node ratio (LNR, the ratio of positive lymph nodes in excised axillary lymph nodes) and disease-free survival (DFS) by comparing with traditional absolute positive lymph node number (pN classification) for prediction of breast cancer (BC) progrnosis. Methods and Patients: We retrospectively reviewed patients who received comprehensive therapy in Department of Breast Surgery, Hubei Cancer Hospital, China from Jan 2002 to Dec 2006 (Group A), and Department of Breast and Thyroid Surgery, Renmin Hospital of Wuhan University, China from Jun 2008 to May 2012 (Group B). Patients were allocated to low-risk (${\leq}0.20$), intermediate-risk (> 0.20 but ${\leq}0.65$), high-risk (>0.65) groups by LNR. The primary endpoint was 5-DFS. Results: A total of 294 patients were included in our study. LNR was verified as a negative prognostic factor for DFS (P=0.002 in Group A, P<0.0001 in Group B). Then we found the effects of pN and LNR delamination on disease-free survival (DFS) had statistical significance (P=0.012 for pN and P=0.031 for LNR stratification in Group A, both of them P<0.001 in Group B). Compared to pN staging, LNR staging displayed superior performance in prognosis, the adjusted hazard ratio of recurrence being 2.07 (95%CI, 1.07 to 4.0) for intermediate risk group (P=0.030) and 2.44 (95%CI, 1.21 to 4.92) for high risk group (P=0.013) in Group A. Conclusions: LNR stratification proved an adverse prognostic factor of DFS in lymph nodes positive invasive BC using cut-off values 0.20 and 0.65, and was more predictive than traditional pN classification for 5-DFS.

Detection of Malicious Node using Timestamp in USN Adapted Diffie-Hellman Algorithm (Diffie-Hellman 알고리즘이 적용된 USN에서 타임스탬프를 이용한 악의적인 노드 검출)

  • Han, Seung-Jin;Choi, Jun-Hyeog
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.1
    • /
    • pp.115-122
    • /
    • 2009
  • In this paper, we proposed scheme that we use a difference of timestamp in time in Ubiquitous environments as we use the Diffie-Hellman method that OTP was applied to when it deliver a key between nodes, and can detect a malicious node at these papers. Existing methods attempted the malicious node detection in the ways that used correct synchronization or directed antenna in time. We propose an intermediate malicious node detection way at these papers without an directed antenna addition or the Trusted Third Party (TTP) as we apply the OTP which used timestamp to a Diffie-Hellman method, and we verify safety regarding this. A way to propose at these papers is easily the way how application is possible in Ubiquitous environment.

Network Coding-based Maximum Lifetime Algorithm for Sliding Window in WSNs

  • Sun, Baolin;Gui, Chao;Song, Ying;Chen, Hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1298-1310
    • /
    • 2019
  • Network coding (NC) is a promising technology that can improve available bandwidth and packet throughput in wireless sensor networks (WSNs). Sliding window is an improved technology of NC, which is a supplement of TCP/IP technology and can improve data throughput and network lifetime on WSNs. This paper proposes a network coding-based maximum lifetime algorithm for sliding window in WSNs (NC-MLSW) which improves the throughput and network lifetime in WSN. The packets on the source node are sent on the WSNs. The intermediate node encodes the received original packet and forwards the newly encoded packet to the next node. Finally, the destination node decodes the received encoded data packet and recovers the original packet. The performance of the NC-MLSW algorithm is studied using NS2 simulation software and the network packet throughput, network lifetime and data packet loss rate were evaluated. The simulations experiment results show that the NC-MLSW algorithm can obviously improve the network packet throughput and network lifetime.

Homomorphic Subspace MAC Scheme for Secure Network Coding

  • Liu, Guangjun;Wang, Xiao
    • ETRI Journal
    • /
    • v.35 no.1
    • /
    • pp.173-176
    • /
    • 2013
  • Existing symmetric cryptography-based solutions against pollution attacks for network coding systems suffer various drawbacks, such as highly complicated key distribution and vulnerable security against collusion. This letter presents a novel homomorphic subspace message authentication code (MAC) scheme that can thwart pollution attacks in an efficient way. The basic idea is to exploit the combination of the symmetric cryptography and linear subspace properties of network coding. The proposed scheme can tolerate the compromise of up to r-1 intermediate nodes when r source keys are used. Compared to previous MAC solutions, less secret keys are needed for the source and only one secret key is distributed to each intermediate node.

Ground Beam Structure Based Joint Stiffness Controlling Method for the Design of Compliant Mechanism (바닥 보 구조 기반 조인트 강성 조절법을 이용한 컴플라이언트 메커니즘의 설계)

  • Kim, Myung-Jin;Jang, Gang-Won;Kim, Yoon-Young
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 2007.04a
    • /
    • pp.151-156
    • /
    • 2007
  • Topology optimization has been widely used in many research areas due to its ability in providing intial designs for the problems with complex boundary conditions. This also has been useful in compliant mechanisms, but resulting layouts may not be immediately manufacturable because they usually consist of members with varying widths and shapes. Also, there occurs some numerical difficulties such as checkerboards or hinge patterns which result from 1-node connection, and intermediate values which make the manufacturing of the designed structure difficult. Though there are many remedies given to avoid this problems, they cannot be prevented. One may avoid this difficulty by employing uniform ground beams and explicit hinge joints. The proposed method is to connect uniform ground beams with elastic short-beam hinge joints. By choosing the widths of short beams as design variables, dominant deformations can occur mainly by flexible joints having intermediate widths. Unlike the conventional methods used for compliance minimization, intermediate widths must appear in compliant mechanism design problems. Also, the present approach does not encounter the problem of one-point hinges.

  • PDF

A Method to Improve Energy Efficiency Using a Function that Evaluate the Probability of Attempts to Verify a Report at Intermediate Node in USN (USN에서 중간 노드에서의 보고서 검증 시도 확률 평가 함수를 이용한 에너지 효율 향상 기법)

  • Lee, Hyun-Woo;Moon, Soo-Young;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.4
    • /
    • pp.21-29
    • /
    • 2011
  • Wireless sensor nodes operate in open environments. The deployed sensor nodes are very vulnerable to physical attacks from outside. Attackers compromise some sensor nodes. The compromised nodes by attackers can lead to false data injection into sensor networks. These attacks deplete the limited energy of sensor nodes. Ye et al. proposed the Statistical En-Route Filtering (SEF) as a countermeasure of the attacks. The sensor node in SEF examines the event reports based on certain uniform probability. Thus, the same energies are consumed in both legitimate reports and false reports. In this paper, we propose a method that each node controls the probability of attempts to verify a report to reduce energy consumption of sensor nodes. The probability is determined in consideration of the remaining energy of the node, the number of hops from the node to SINK node, the ratio of false reports. the proposed method can have security which is similar with SEF and consumes lower energy than SEF.

Reinforcement Learning for Node-disjoint Path Problem in Wireless Ad-hoc Networks (무선 애드혹 네트워크에서 노드분리 경로문제를 위한 강화학습)

  • Jang, Kil-woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.8
    • /
    • pp.1011-1017
    • /
    • 2019
  • This paper proposes reinforcement learning to solve the node-disjoint path problem which establishes multipath for reliable data transmission in wireless ad-hoc networks. The node-disjoint path problem is a problem of determining a plurality of paths so that the intermediate nodes do not overlap between the source and the destination. In this paper, we propose an optimization method considering transmission distance in a large-scale wireless ad-hoc network using Q-learning in reinforcement learning, one of machine learning. Especially, in order to solve the node-disjoint path problem in a large-scale wireless ad-hoc network, a large amount of computation is required, but the proposed reinforcement learning efficiently obtains appropriate results by learning the path. The performance of the proposed reinforcement learning is evaluated from the viewpoint of transmission distance to establish two node-disjoint paths. From the evaluation results, it showed better performance in the transmission distance compared with the conventional simulated annealing.

On Development of Vibration Analysis Algorithm of Beam with Multi-Joints (다관절 보의 진동해석 알고리즘의 개발에 관한 연구)

  • 문덕홍;여동준;최명수
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.18 no.5
    • /
    • pp.68-77
    • /
    • 1994
  • The authors apply the transfer influence coefficient method to the 3-dimensional vibration analysis of beam with multi-joints and formulate a general algorithm to analysis the longitudinal, flexural and torsional coupled free vibration. In this paper, the structure, which is mainly founded in the robot arms, cranes and so on, has some crooked parts, subsystems and joints but has no closed loop in this system. It is modeled as the beam of a distributed mass system with massless translational, rotational and torsional springs in each node, and joint elements of release or roll at which node the displacement vector is discontinuous. The superiorty of the present method to the transfer matrix method in the computation accuracy was confirmed by the numerical computation results. Moreover, we confirmed that boundary and intermediate conditions could ve controlled by varying the values o the spring constants.

  • PDF

On Development of Vibration Analysis Algorithm of Beam with Multi - Joints(II) (다관절 보의 진동해석 알고리즘 개발에 관한 연구 (II))

  • 문덕홍;최명수;홍숭수;강현석
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.21 no.3
    • /
    • pp.256-266
    • /
    • 1997
  • The authors apply the transfer influence coefficient method to the 3. dimensional vibration analysis of beam with multi - joints and formulate a general algorithm to analyse the longitudinal, flexural and torsional coupled forced vibration. In this paper, a structure which is mainly found in the robot arms, cranes and so on, has some crooked parts, subsystems and joints, but has no closed loop in this system. It is modeled as the beam of a distributed mass system with massless translational, rotational and torsional springs in each node, and joint elements of release or roll at node which the displacement vector is discontinuous. The superiority of the present method to the transfer matrix method in the computation accuracy was confirmed from the numerical computation results. Moreover, we confirmed that boundary and intermediate conditions could be controlled by varying the values of the spring constants.

  • PDF

On Development of Vibration Analysis Algorithm of Beam with Multi-Joints(II) (다관절 보의 진동해석 알고리즘 개발에 관한 연구 II)

  • 문덕홍;최명수;홍승수;강현석
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 1996.10a
    • /
    • pp.203-209
    • /
    • 1996
  • The authors apply the transfer influence coefficient method to the 3-dimensional vibration analysis of beam with multi-joints and formulate a general algorithm to analysis the longitudinal, flexural and torsional coupled forced vibration. In this paper, a structure, which is mainly founded in the robot arms, cranes and so on, has some crooked parts, subsystems and joints but has no closed loop in this system. It is modeled as the beam of a distributed mass system with massless translational, rotational and torsional springs in each node, and joint elements of release or roll at which node the displacement vector is discontinuous. The superiority of the present method to the transfer matrix method in the computation accuracy was confirmed from the numerical computation results. Moreover, we confirmed that boundary and intermediate conditions could be controlled by varying the values of the spring constants.

  • PDF