• Title/Summary/Keyword: Monitored node

Search Result 47, Processing Time 0.022 seconds

Sinus Node Dysfunction after Orthotopic Dog Heart Transplantation (잡종견의 심장 이식후 발생한 부정맥의 관찰)

  • 박국양
    • Journal of Chest Surgery
    • /
    • v.27 no.5
    • /
    • pp.339-344
    • /
    • 1994
  • Sinus node dysfunction is common after orthotopic heart transplantation.Electrophysiologic studies have documented a high incidence [46% to 50%] of impaired sinus node automaticity and sinoatrial conduction in the early posttransplantation period. Sinus node dysfunction persists in over 20 % of patients and leads to prolonged bradyarrythmias, including sinus or nodal bradycardia and sinus arrest.The purpose of this paper was to observe sinus node dysfunction after orthotopic heart transplantation. Ten cardiac recipient dogs were monitored continuously after orthotopic transplantations between unrelated adult mongrel dogs. Crystalloid cardioplegic solution [Choongwoi Cardioplegia

  • PDF

Internet of Things based Smart Energy Management for Smart Home

  • TASTAN, Mehmet
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.2781-2798
    • /
    • 2019
  • Thanks to internet, as one of indispensable parts of our lives, many devices that we use in our daily lives like TV, air conditioner, refrigerator, washing machine, can be monitored and controlled remotely by becoming more intelligent via Internet of Things (IoT) technology. Smart Home applications as one of the elements of smart cities, are individually the most demanded application without question. In this study, Smart Energy Management (SEM) system, based on NodeMCU and Android, has been designed for SEM, which is a part of the smart home application. With this system, household energy consumption can be monitored in real time, as well as having the ability to record the data comprising of operation times and energy consumption information for each device. Additionally, it is ensured to meet the energy needs on a maximized level possible, during the hours when the energy costs are lower owing to the SEM system. The Android interface provides the users with the opportunity to monitor and change their electricity consumption habits in order to optimize the energy efficiency, along with the opportunity to draw up of a daily and weekly schedule.

Highly Power-Efficient Rack-Level DC Power Architecture Combined with Node-Level DC UPS

  • Kwon, Won-Ok;Seo, Hae-Moon;Choi, Pyung
    • ETRI Journal
    • /
    • v.33 no.4
    • /
    • pp.648-651
    • /
    • 2011
  • This letter presents a highly efficient rack-level DC power architecture combined with a node-level DC uninterruptible power supply (UPS). The proposed system can provide almost the equivalent power efficiency of a high-voltage DC data center without any change in the existing power infrastructure. The node-level DC UPS combined with a power distribution board provides high power efficiency as well as lower UPS installation costs. Implemented on a rack, the entire power system can be monitored through a network.

Growth Properties of Central and Peripheral Ramets in a Zoysia sinica's Clone

  • Min, Byeong-Mee
    • Journal of Ecology and Environment
    • /
    • v.29 no.2
    • /
    • pp.105-111
    • /
    • 2006
  • A natural, tidal-flat clone of Zoysia sinica was studied to compare ramet growth properties in central area with in peripheral area. In new stolon and rhizome, internode length, weight, shoot height and weight, and spike production were monitored on July 25, 2004. The weight/height rate of shoot between stolon and rhizome, the shoot/stolon (or rhizome) rate in weight between central and peripheral area were not different. However, other properties differed in stolon from rhizome or between central and peripheral area significantly differed: 1. The rhizome in central area had a larger node number, shorter internode length, higher shoot height, larger shoot biomass, and higher rate of non-shoot nodes than that in peripheral area. 2. The stolon in central area had a smaller node number, shorter internode length, and smaller biomass than that in peripheral area. 3. In the same area, the rhizome had a larger node number (except for central area), shorter internode, higher shoot height, larger shoot biomass, higher rate of non-shoot node, and higher rate of node having over two shoots than the stolon. No relationship could be found between shoot size and spike production in shoot on vertical rhizome (lower node of old shoot).

A Study on the Election of Cluster Alternative node for Energy-Efficient in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율적인 클러스터의 대체노드 선출 방법에 관한 연구)

  • Oh, Young-Jun;Lee, Knag-Whan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.1
    • /
    • pp.233-241
    • /
    • 2013
  • One fundamental issue in ad hoc networks is the alternative node election problem, which reflects how well a sensor network is monitored or tracked by sensors. In this paper, we proposed EEAP(Energy-Efficient Alternative Paths). This is a method of selecting an alternative node for path routing management. When some node disconnection on the path routing, using pre-selected backup node provides immediately recover the path recovery. When selecting an alternative node of Step-Parents head node on the path management, the node's energy level and distance information are cared in context-awareness. This is not only increased the system's capacity cost effectively, but also reduce transmission power entire nodes consume energy. As a result, each node could efficiently management and improves the life time for mobile host and extends system coverage.

Behavior based Routing Misbehavior Detection in Wireless Sensor Networks

  • Terence, Sebastian;Purushothaman, Geethanjali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5354-5369
    • /
    • 2019
  • Sensor networks are deployed in unheeded environment to monitor the situation. In view of the unheeded environment and by the nature of their communication channel sensor nodes are vulnerable to various attacks most commonly malicious packet dropping attacks namely blackhole, grayhole attack and sinkhole attack. In each of these attacks, the attackers capture the sensor nodes to inject fake details, to deceive other sensor nodes and to interrupt the network traffic by packet dropping. In all such attacks, the compromised node advertises itself with fake routing facts to draw its neighbor traffic and to plunge the data packets. False routing advertisement play vital role in deceiving genuine node in network. In this paper, behavior based routing misbehavior detection (BRMD) is designed in wireless sensor networks to detect false advertiser node in the network. Herein the sensor nodes are monitored by its neighbor. The node which attracts more neighbor traffic by fake routing advertisement and involves the malicious activities such as packet dropping, selective packet dropping and tampering data are detected by its various behaviors and isolated from the network. To estimate the effectiveness of the proposed technique, Network Simulator 2.34 is used. In addition packet delivery ratio, throughput and end-to-end delay of BRMD are compared with other existing routing protocols and as a consequence it is shown that BRMD performs better. The outcome also demonstrates that BRMD yields lesser false positive (less than 6%) and false negative (less than 4%) encountered in various attack detection.

A Novel Trust Establishment Method for Wireless Sensor Networks

  • Ishmanov, Farruh;Kim, Sung Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1529-1547
    • /
    • 2015
  • Establishment of trust is important in wireless sensor networks for security enhancement and successful collaboration. Basically, a node establishes trust with other nodes by estimating a trust value based on monitored behavior of the other nodes. Since a malicious/misbehaving node might launch different attack strategies and might demonstrate random misbehavior, a trust estimation method should be robust against such attacks and misbehavior. Otherwise, the operation of trust establishment will be meaningless, and performance of an application that runs on top of trust establishment will degrade. In this paper, we propose a robust and novel trust estimation method. Unlike traditional trust estimation methods, we consider not only the weight of misbehavior but also the frequency of misbehavior. The frequency-of-misbehavior component explicitly demonstrates how frequently a node misbehaves during a certain observed time period, and it tracks the behavior of nodes more efficiently, which is a main factor in deriving an accurate trust value. In addition, the weight of misbehavior is comprehensively measured to mitigate the effect of an on-off attack. Frequency and weight of misbehavior are comprehensively combined to obtain the trust value. Evaluation results show that the proposed method outperforms other trust estimation methods under different attacks and types of misbehavior.

A Tier-Based Duty-Cycling Scheme for Forest Monitoring

  • Zhang, Fuquan;Gao, Deming;Joe, In-Whee
    • Journal of Information Processing Systems
    • /
    • v.13 no.5
    • /
    • pp.1320-1330
    • /
    • 2017
  • Wireless sensor networks for forest monitoring are typically deployed in fields in which manual intervention cannot be easily accessed. An interesting approach to extending the lifetime of sensor nodes is the use of energy harvested from the environment. Design constraints are application-dependent and based on the monitored environment in which the energy harvesting takes place. To reduce energy consumption, we designed a power management scheme that combines dynamic duty cycle scheduling at the network layer to plan node duty time. The dynamic duty cycle scheduling is realized based on a tier structure in which the network is concentrically organized around the sink node. In addition, the multi-paths preserved in the tier structure can be used to deliver residual packets when a path failure occurs. Experimental results show that the proposed method has a better performance.

UPS management system in the HFC network

  • Kim, Young-Wha;Kang, Jun-Woo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2002.10a
    • /
    • pp.121.3-121
    • /
    • 2002
  • The HFC network is one of the most useful network for high-speed data communication. Optical node unit, Trunk branch amplifier, Tap-offs, and Uninterrupted power supplies (UPS) are in this network. Since power failures of the equipments in the network is crucial, UPS should be periodically monitored and controlled by the Host to prevent long power failures. This paper describes a UPS management system which is to monitor and control UPS to supply electric power to ONUs and TBAs in the network.

  • PDF

Asset Localization in Wireless Sensor Networks

  • Jo, Jung-Hee;Kim, Kwang-Soo;Kim, Sun-Joong
    • Korean Journal of Remote Sensing
    • /
    • v.23 no.5
    • /
    • pp.465-471
    • /
    • 2007
  • Many hospitals have been considering new technology such as wireless sensor network(WSN). The technology can be used to track the location of medical devices needed for inspections or repairs, and it can also be used to detect of a theft of an asset. In an asset-tracking system using WSN, acquiring the location of moving sensor nodes inherently introduces uncertainty in location determination. In fact, the sensor nodes attached to an asset are prone to failure from lack of energy or from physical destruction. Therefore, even if the asset is located within the predetermined area, the asset-tracking application could "misunderstand" that an asset has escaped from the area. This paper classifies the causes of such unexpected situations into the following five cases: 1) an asset has actually escaped from a predetermined area; 2) a sensor node was broken; 3) the battery for the sensor node was totally discharged; 4) an asset went into a shadow area; 5) a sensor node was stolen. We implemented and installed our asset-tracking system in a hospital and continuously monitored the status of assets such as ventilators, syringe pumps, wheel chairs and IV poles. Based on this real experience, we suggest how to differentiate each case of location uncertainty and propose possible solutions to prevent them.