• Title/Summary/Keyword: Network Life Time

Search Result 601, Processing Time 0.028 seconds

Paradigm of Time-sequence Development of the Intestine of Suckling Piglets with Microarray

  • Sun, Yunzi;Yu, Bing;Zhang, Keying;Chen, Xijian;Chen, Daiwen
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.25 no.10
    • /
    • pp.1481-1492
    • /
    • 2012
  • The interaction of the genes involved in intestinal development is the molecular basis of the regulatory mechanisms of intestinal development. The objective of this study was to identify the significant pathways and key genes that regulate intestinal development in Landrace piglets, and elucidate their rules of operation. The differential expression of genes related to intestinal development during suckling time was investigated using a porcine genome array. Time sequence profiles were analyzed for the differentially expressed genes to obtain significant expression profiles. Subsequently, the most significant profiles were assayed using Gene Ontology categories, pathway analysis, network analysis, and analysis of gene co-expression to unveil the main biological processes, the significant pathways, and the effective genes, respectively. In addition, quantitative real-time PCR was carried out to verify the reliability of the results of the analysis of the array. The results showed that more than 8000 differential expression transcripts were identified using microarray technology. Among the 30 significant obtained model profiles, profiles 66 and 13 were the most significant. Analysis of profiles 66 and 13 indicated that they were mainly involved in immunity, metabolism, and cell division or proliferation. Among the most effective genes in these two profiles, CN161469, which is similar to methylcrotonoyl-Coenzyme A carboxylase 2 (beta), and U89949.1, which encodes a folate binding protein, had a crucial influence on the co-expression network.

A Study on Implementation of NMEA 2000 based Integrated Gateway using FPGA (FPGA를 이용한 NMEA 2000 기반 통합게이트웨이 구현에 관한 연구)

  • Park, Dong-Hyun;Hong, Ji-Tae;Kim, Kyung-Yup;Kim, Jong-Hyu;Yu, Yung-Ho
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.35 no.2
    • /
    • pp.278-287
    • /
    • 2011
  • NMEA 2000 protocol known as IEC 61162-3 of Multi-talker, Multi-listener and Plug and Play network communication has been adopted as standard network for SOLAS(Safety of Life at Sea) ship by IMO. This paper focuses on the implementation of FPGA and MicroBlaze for NMEA 2000 based gateway, which is able to convert NMEA 2000 protocol into various types of network protocol such as Ethernet, UART and USB using Vertex4-based ML401 board. Each communication module and the stack of NMEA 2000 are mounted on FPGA. To be able to receive each communication data, ML401 board is configured to handle required communication speed. PC based NMEA 2000 monitoring program is developed to verify that data on different networks are correctly converted each other in real time.

Memory Information Extension Model Using Adaptive Resonance Theory

  • Kim, Jong-Soo;Kim, Joo-Hoon;Kim, Seong-Joo;Jeon, Hong-Tae
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.652-655
    • /
    • 2003
  • The human being receives a new information from outside and the information shows gradual oblivion with time. But it remains in memory and isn't forgotten for a long time if the information is read several times over. For example, we assume that we memorize a telephone number when we listen and never remind we may forget it soon, but we commit to memory long time by repeating. If the human being received new information with strong stimulus, it could remain in memory without recalling repeatedly. The moments of almost losing one's life in on accident or getting a stroke of luck are rarely forgiven. The human being can keep memory for a long time in spite of the limit of memory for the mechanism mentioned above. In this paper, we will make a model explaining that mechanism using a neural network Adaptive Resonance Theory.

  • PDF

HDRE: Coverage Hole Detection with Residual Energy in Wireless Sensor Networks

  • Zhang, Yunzhou;Zhang, Xiaohua;Fu, Wenyan;Wang, Zeyu;Liu, Honglei
    • Journal of Communications and Networks
    • /
    • v.16 no.5
    • /
    • pp.493-501
    • /
    • 2014
  • Coverage completeness is an important indicator for quality of service in wireless sensor networks (WSN). Due to limited energy and diverse working conditions, the sensor nodes have different lifetimes which often cause network holes. Most of the existing methods expose large limitation and one-sidedness because they generally consider only one aspect, either coverage rate or energy issue. This paper presents a novel method for coverage hole detection with residual energy in randomly deployed wireless sensor networks. By calculating the life expectancy of working nodes through residual energy, we make a trade-off between network repair cost and energy waste. The working nodes with short lifetime are screened out according to a proper ratio. After that, the locations of coverage holes can be determined by calculating the joint coverage probability and the evaluation criteria. Simulation result shows that compared to those traditional algorithms without consideration of energy problem, our method can effectively maintain the coverage quality of repaired WSN while enhancing the life span of WSN at the same time.

Distributed System Cryptocurrency and Data Transfer

  • Alotaibi, Leena;Alnfiai, Mrim;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.77-83
    • /
    • 2021
  • The dependency on technology has increased with the increase in population. Technology plays a crucial role in facilitating, organizing and securing people's life nowadays. The Internet has penetrated every face of present-day lifestyles. Yet another ubiquitous use of digital technology today is evident in transferring money and speeding cross border payments that are done through digital transactions. This paper investigates transferring money and data through banks and companies by using the Blockchain concept through decentralized distributed system. The present research also peruses several contexts in which this technology has already been implemented successfully and demonstrates the advantages of replacing the paper money with digital money. Using cryptocurrency will facilitate people's life by reducing time, securing the process of money transfer, and increasing data integrity. The primary benefit of this content analysis is that it addresses an innovative subject, in a new light and using timely recent research references drawn from 2018-2020. Thus, our study is a contemporary and conclusive source for all present and future endeavours being undertaken in the domain of using blockchain for e-transactions.

A Portable IoT-cloud ECG Monitoring System for Healthcare

  • Qtaish, Amjad;Al-Shrouf, Anwar
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.269-275
    • /
    • 2022
  • Public healthcare has recently become an issue of great importance due to the exponential growth in the human population, the increase in medical expenses, and the COVID-19 pandemic. Speed is one of the crucial factors in saving life, particularly in case of heart attack. Therefore, a healthcare device is needed to continuously monitor and follow up heart health conditions remotely without the need for the patient to attend a medical center. Therefore, this paper proposes a portable electrocardiogram (ECG) monitoring system to improve healthcare for heart attack patients in both home and ambulance settings. The proposed system receives the ECG signals of the patient and sends the ECG values to a MySQL database on the IoT-cloud via Wi-Fi. The signals are displayed as an ECG data chart on a webpage that can be accessed by the patient's doctor based on the HTTP protocol that is employed in the IoT-cloud. The proposed system detects the ECG data of the patient to calculate the total number of heartbeats, number of normal heartbeats, and the number of abnormal heartbeats, which can help the doctor to evaluate the health status of the patient and decide on a suitable medical intervention. This system therefore has the potential to save time and life, but also cost. This paper highlights the five main advantages of the proposed ECG monitoring system and makes some recommendations to develop the system further.

An Adaptive Clustering Algorithm of Wireless Sensor Networks for Energy Efficiency (에너지 효율을 위한 무선센서 네트워크의 적응형 클러스터링 알고리즘)

  • Cho, Young-bok;Lee, Sang-ho;Woo, Sung-Hee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.1
    • /
    • pp.99-106
    • /
    • 2017
  • In the WSN environment, the sensor node is selected as the cluster header and consumes a lot of energy. Therefore, we proposed a method to automatically select a cluster algorithm using the sensor field environment that can improve the reliability of the whole network by applying an energy efficient clustering algorithm based on already deployed sensor field. Experimental results show that FDN is extended about 3 times by using the proposed algorithm. In addition, the network energy is extended by up to 30% compared to the conventional method, thereby improving the reliability of the sensor network.

Security Model for Tree-based Routing in Wireless Sensor Networks: Structure and Evaluation

  • Almomani, Iman;Saadeh, Maha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.4
    • /
    • pp.1223-1247
    • /
    • 2012
  • The need for securing Wireless Sensor Networks (WSNs) is essential especially in mission critical fields such as military and medical applications. Security techniques that are used to secure any network depend on the security requirements that should be achieved to protect the network from different types of attacks. Furthermore, the characteristics of wireless networks should be taken into consideration when applying security techniques to these networks. In this paper, energy efficient Security Model for Tree-based Routing protocols (SMTR) is proposed. In SMTR, different attacks that could face any tree-based routing protocol in WSNs are studied to design a security reference model that achieves authentication and data integrity using either Message Authentication Code (MAC) or Digital Signature (DS) techniques. The SMTR communication and processing costs are mathematically analyzed. Moreover, SMTR evaluation is performed by firstly, evaluating several MAC and DS techniques by applying them to tree-based routing protocol and assess their efficiency in terms of their power requirements. Secondly, the results of this assessment are utilized to evaluate SMTR phases in terms of energy saving, packet delivery success ratio and network life time.

Network Traffic Reduction Method using Compression in Wireless Sensor Networks (무선 센서 네트워크에서 압축을 이용한 네트워크 트래픽 감소 기법)

  • Gim, Dong-Gug;Lee, Joa-Hyoung;Park, Chong-Myung;Kwon, Young-Wan;Jung, In-Bum
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.8
    • /
    • pp.1511-1518
    • /
    • 2008
  • Wireless sensor network is a network that consists of small wireless sensor nodes. Sensor nodes transfer the sensed data about the objects or environment to the sink through wireless channel. The energy dissipation by wireless transmission is the primary factor of energy dissipation in the sensor node. To utilize the limitted resource at the sensor node, it is required to reduce the number of wireless transmission. In the paper, we proposes a new energy efficient method, NRMC, to reduce the energy dissipation by using the compression technique - DPCM, Wavlet, Quantization, RLC. With NTRC, the life time of sensor network could be increased.

Implementation of ML Algorithm for Mung Bean Classification using Smart Phone

  • Almutairi, Mubarak;Mutiullah, Mutiullah;Munir, Kashif;Hashmi, Shadab Alam
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.89-96
    • /
    • 2021
  • This work is an extension of my work presented a robust and economically efficient method for the Discrimination of four Mung-Beans [1] varieties based on quantitative parameters. Due to the advancement of technology, users try to find the solutions to their daily life problems using smartphones but still for computing power and memory. Hence, there is a need to find the best classifier to classify the Mung-Beans using already suggested features in previous work with minimum memory requirements and computational power. To achieve this study's goal, we take the experiments on various supervised classifiers with simple architecture and calculations and give the robust performance on the most relevant 10 suggested features selected by Fisher Co-efficient, Probability of Error, Mutual Information, and wavelet features. After the analysis, we replace the Artificial Neural Network and Deep learning with a classifier that gives approximately the same classification results as the above classifier but is efficient in terms of resources and time complexity. This classifier is easily implemented in the smartphone environment.