• Title/Summary/Keyword: Node-Threshold

Search Result 162, Processing Time 0.026 seconds

Analysis of transient Characteristics of Load Sharing Algorithms In Distributed Systems (분산시스템에서 부하공유 알고리즘의 천이특성 해석)

  • 박세명
    • Journal of the Korea Society for Simulation
    • /
    • v.2 no.1
    • /
    • pp.91-106
    • /
    • 1993
  • Load sharing in distributed systems improves systems performance. Research in the field has been focused on steady state performance for load sharing algorithms. However, transient characteristics of such algorithms may be important in a distributed system in which workload for some node is changing. Simulation is the only means to analyze such characteristics. This paper presents a simulation-based analysis of the transient characteristics of four load sharing algorithms ; forward probing, reverse probing, symmetric probing, and multi-threshold symmetric probing algorithms. Discrete event system models for execution of the algorithms in a distributed system has been developed in a SIMSCRIOT II.5 environment. Simulation results indicate that the MSYM algorithm shows the shortest response time in the transient period.

  • PDF

Diagnostic value of Thyroglobulin Measurement with Fine-needle Aspiration Biopsy for Lymph Node Metastases in Patients with a History of Differentiated Thyroid Cancer

  • Zhang, Hai-Shan;Wang, Ren-Jie;Fu, Qing-Feng;Gao, Shi;Sun, Bu-Tong;Sun, Hui;Ma, Qing-Jie
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.24
    • /
    • pp.10905-10909
    • /
    • 2015
  • Purpose: The aim of this study was to evaluate the diagnostic value of FNA-Tg for detecting lymph node metastases in patients with a history of differentiated thyroid cancer (DTC). Materials and Methods: A total of 58 patients with DTC diagnosis and evidence of single or multiple suspicious cervical lymph nodes were assessed. All underwent total or near-total thyroidectomy with (35 cases) or without (23 cases) radioiodine (RAI) ablation, followed by thyroid stimulating hormone (TSH) suppression therapy. A total of 68 lymph nodes were examined by ultrasound-guided fine needle aspiration (US-FNA) for both cytological examination and FNA-Tg measurement. Serum Tg and anti-thyroglobulin antibody (TgAb) levels were also measured. Diagnostic performance including sensitivity, specificity, accuracy, positive (PPV) and negative predictive value (NPV) of FNAC and FNA-Tg were calculated and compared. The Spearman's rank correlation coefficient was used to estimate the relationship between FNA-Tg and serum TgAb. Results: The FNA-Tg levels were significantly higher with DTC metastatic lymph nodes (median 927.7 ng/mL, interquartile range 602.9 ng/mL) than non-metastatic lymph nodes (median 0.1 ng/mL, interquartile range 0.4 ng/mL) (p<0.01). Considering 1.0 ng/mL as a threshold value for FNA-Tg, the sensitivity, specificity, accuracy, PPV and NPV of FNA-Tg were 95.7%, 95.5%, 95.6%, 97.8% and 91.3%, respectively. The sensitivity and accuracy of the combination of FNAC and FNA-Tg were significantly higher than that of FNAC alone (p<0.05). The diagnostic performance of FNA-Tg was not significantly different between cases with or without RAI ablation, and the serum TgAb levels did not interfere with FNA-Tg measurements. Conclusions: Measurement of FNA-Tg is useful. The combination of FNAC and FNA-Tg is more sensitive and accurate for detecting lymph node metastases in patients with a history of DTC than FNAC alone. Serum TgAbs appear to be irrelevant for measurement of FNA-Tg.

A Study on Survivability of Node using Response Mechanism in Active Network Environment (액티브 네트워크 환경에서 대응 메커니즘을 이용한 노드 생존성에 관한 연구)

  • Yang, Jin-Seok;Lee, Ho-Jae;Chang, Beom-Hwan;Kim, Hyoun-Ku;Han, Young-Ju;Chung, Tai-Myoung
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.799-808
    • /
    • 2003
  • Existing security solutions such as Firewell and IDS (Intrusion Detection System) have a trouble in getting accurate detection rate about new attack and can not block interior attack. That is, existing securuty solutions have various shortcomings. Shortcomings of these security solutions can be supplemented with mechanism which guarantees an availability of systems. The mechanism which guarantees the survivability of node is various, we approachintrusion telerance using real time response mechanism. The monitoring code monitors related resources of system for survivability of vulnerable systm continuously. When realted resources exceed threshold, monitoring and response code is deployed to run. These mechanism guarantees the availability of system. We propose control mathod about resource monitoring. The monitoring code operates with this method. The response code may be resident in active node for availability or execute a job when a request is occurred. We suggest the node survivability mechanism that integrates the intrusion tolerance mechanism that complements the problems of existing security solutions. The mechanism takes asvantage of the automated service distribution supported by Active Network infrastructure instead of passive solutions. The mechanism takes advantage of the automated service distribution supported by Active Network infrastructure instead of passive system reconfiguration and patch.

EC-RPL to Enhance Node Connectivity in Low-Power and Lossy Networks (저전력 손실 네트워크에서 노드 연결성 향상을 위한 EC-RPL)

  • Jeadam, Jung;Seokwon, Hong;Youngsoo, Kim;Seong-eun, Yoo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.6
    • /
    • pp.41-49
    • /
    • 2022
  • The Internet Engineering Task Force (IETF) has standardized RPL (IPv6 Routing Protocol for Low-power Lossy Network) as a routing protocol for Low Power and Lossy Networks (LLNs), a low power loss network environment. RPL creates a route through an Objective Function (OF) suitable for the service required by LLNs and builds a Destination Oriented Directed Acyclic Graph (DODAG). Existing studies check the residual energy of each node and select a parent with the highest residual energy to build a DODAG, but the energy exhaustion of the parent can not avoid the network disconnection of the children nodes. Therefore, this paper proposes EC-RPL (Enhanced Connectivity-RPL), in which ta node leaves DODAG in advance when the remaining energy of the node falls below the specified energy threshold. The proposed protocol is implemented in Contiki, an open-source IoT operating system, and its performance is evaluated in Cooja simulator, and the number of control messages is compared using Foren6. Experimental results show that EC-RPL has 6.9% lower latency and 5.8% fewer control messages than the existing RPL, and the packet delivery rate is 1.7% higher.

A Node Mobility-based Adaptive Route Optimization Scheme for Hierarchical Mobile IPv6 Networks (노드 이동성을 고려한 계층적 이동 IPv6 네트워크에서의 적응적 경로 최적화 방안)

  • 황승희;이보경;황종선;한연희
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.4
    • /
    • pp.474-483
    • /
    • 2003
  • The secret sharing is the basic concept of the threshold cryptosystem and has an important position in the modern cryptography. At 1995, Jarecki proposed the proactive secret sharing to be a solution of existing the mobile adversary and also proposed the share renewal scheme for (k, n) threshold scheme. For n participants in the protocol, his method needs O($n^2$) modular exponentiation per one participant. It is very high computational cost and is not fit for the scalable cryptosystem. In this paper, we propose the efficient share renewal scheme that need only O(n) modular exponentiation per participant. And we prove our scheme is secure if less that ${\frac}\frac{1}{2}n-1$ adversaries exist and they static adversary.

SVM-Based Incremental Learning Algorithm for Large-Scale Data Stream in Cloud Computing

  • Wang, Ning;Yang, Yang;Feng, Liyuan;Mi, Zhenqiang;Meng, Kun;Ji, Qing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.10
    • /
    • pp.3378-3393
    • /
    • 2014
  • We have witnessed the rapid development of information technology in recent years. One of the key phenomena is the fast, near-exponential increase of data. Consequently, most of the traditional data classification methods fail to meet the dynamic and real-time demands of today's data processing and analyzing needs--especially for continuous data streams. This paper proposes an improved incremental learning algorithm for a large-scale data stream, which is based on SVM (Support Vector Machine) and is named DS-IILS. The DS-IILS takes the load condition of the entire system and the node performance into consideration to improve efficiency. The threshold of the distance to the optimal separating hyperplane is given in the DS-IILS algorithm. The samples of the history sample set and the incremental sample set that are within the scope of the threshold are all reserved. These reserved samples are treated as the training sample set. To design a more accurate classifier, the effects of the data volumes of the history sample set and the incremental sample set are handled by weighted processing. Finally, the algorithm is implemented in a cloud computing system and is applied to study user behaviors. The results of the experiment are provided and compared with other incremental learning algorithms. The results show that the DS-IILS can improve training efficiency and guarantee relatively high classification accuracy at the same time, which is consistent with the theoretical analysis.

An Effective Authentication in Mobile Ad Hoc Networks (Mobile Ad Hoc Networks에서 효과적인 인증서비스)

  • Kim Yoon-Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.10 no.1
    • /
    • pp.121-134
    • /
    • 2005
  • The MANET has many problems in security despite of its many advantages such as supporting the mobility of nodes, independence of the fixed infrastructure, and quick network establishment. In particular, in establishing security, the traditional certification service has many difficult problems in applying to the MANET because of its safety, expandability, and availability. In this paper, a secure and effective distributed certification service method was proposed using the Secret Sharing scheme and the Threshold Digital Signature scheme in providing certification services in the MANET. In the proposed distributed certification service, certain nodes of relatively high safety among the mobile nodes consisting of the MANET, were set as privileged nodes, from which the process of issuing a certification started. The proposed scheme solved problem that the whole network security would be damaged by the intrusion to one node in the Centralized Architecture and the Hierarchical Architecture. And it decreased the risk of the exposure of the personal keys also in the Fully Distributed Architecture as the number of the nodes containing the partial confidential information of personal keys decreased. By the network simulation, the features and availability of the proposed scheme was evaluated and the relation between the system parameters was analyzed.

  • PDF

A Handover Management Scheme Based on User-Preferences and Network-Centric Approach

  • Khan, Murad;Park, Gisu;Cho, Wooseong;Seong, Gihyuk;Han, Kijun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.344-357
    • /
    • 2015
  • With the increase in a number of access technologies and data rates, a continuous connection among different networks is demand of the future wireless networks. In the last decade, user connectivity among different access networks remained a challenging job. Therefore, in this article, we proposed a user-centric and user-perspective based network selection mechanism for fast handover management in heterogeneous wireless networks. The proposed scheme selects the most appropriate network among available networks on the basis of resources i.e. cost, data rate, and link quality. Initially, we load the Media Independent Information Service (MIIS) with the information of cost and data rate provided by different network operators. Similarly, Mobile Node (MN) is also loaded with the user preferred cost and data rate for different applications. The MN obtains the information of cost and data rate from MIIS server upon a predefined threshold, and make a decision for handover according to its current cost and data rate. Furthermore, we employ an optimal threshold mechanism for initiation of the handover execution phase to minimize false handover indications. The proposed scheme is based on a survey for network selection and its implementation in C programming language to validate its performance and accuracy. The simulation result shows that the proposed scheme performs superior then the schemes present in the current literature.

Reliability Analysis to Contaminant Migration in Saturated Sandy Soils : System Reliability Approach (포화(飽和)된 사질토(砂質土)내로의 오염물(汚染物) 이동에 대한 시스템 신뢰성(信賴性) 모델의 응용(應用))

  • Jang, Yeon Soo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.12 no.2
    • /
    • pp.229-237
    • /
    • 1992
  • Series system reliability analysis of non-reactive contaminant transport is performed in a two dimensional horizontal domain with two different limit state functions: (1) concentration threshold and (2) exposure time threshold. The transient source transport model is combined with the system reliability model to evaluate the probability that a specified maximum concentration at a node of interest would be exceeded or that a moderate concentration would exceed some exposure limit over a given period of time. The results give probabilities of exceedence greater than probability of each component and they tend to be dominanted by the component with larger probability. Transverse dispersivity turns out to be an important parameter in addition to hydraulic conductivity in a two-dimensional contaminant transport model with transient source. System sensitivity is found to reflect the corresponding sensitivity of both components, with the component with larger probability having a greater influence.

  • PDF

Design and Performance Analysis of Energy-Aware Distributed Detection Systems with Two Passive Sonar Sensors (수동 소나 쌍을 이용한 에너지 인식 분산탐지 체계의 설계 및 성능 분석)

  • Do, Joo-Hwan;Kim, Song-Geun;Hong, Sun-Mog
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.46 no.4
    • /
    • pp.139-147
    • /
    • 2009
  • In this paper, optimum design of energy-aware distributed detection is considered for a parallel sensor network system consisting of a fusion center and two passive sonar nodes. AND rule and OR rule are employed as the fusion rules of the sensor network. For the fusion rules, it is shown that a threshold rule of each sensor node has uniformly most powerful properties. Optimum threshold for each sensor is investigated that maximizes the probability of detection under a constraint on energy consumption due to false alarms. It is also investigated through numerical experiments how signal strength, an energy constraint, and the distance between two sensor nodes affect the system detection performances.