• Title/Summary/Keyword: common node

Search Result 477, Processing Time 0.022 seconds

Buckling Analysis of Box-typed Structures using Adaptive Finite Elements (적응적 유한요소를 이용한 박스형 구조물의 좌굴해석)

  • Song, Myung-Kwan;Kim, Sun-Hoon
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 2007.04a
    • /
    • pp.271-274
    • /
    • 2007
  • The finite element linear buckling analysis of folded plate structures using adaptive h-refinement methods is presented in this paper. The variable-node flat shell element used in this study possesses the drilling D.O.F. which, in addition to improvement of the element behavior, permits an easy connection to other elements with six degrees of freedom per node. The Box-typed structures can be analyzed using these developed flat shell elements. By introducing the variable node elements some difficulties associated with connecting the different layer patterns, which are common in the adaptive h-refinement on quadrilateral mesh, can be overcome. To obtain better stress field for the error estimation, the super-convergent patch recovery is used. The convergent buckling modes and the critical loads associated with these modes can be obtained.

  • PDF

Exploration of static and free vibration resistance topologically optimal beam structure shapes using density design variables. (재료밀도 설계변수를 이용한 정적 및 자유진동 저항 위상최적 보의 형상 탐색에 관한 연구)

  • Lee, Dongkyu;Shin, Soo Mi
    • Journal of Korean Association for Spatial Structures
    • /
    • v.24 no.1
    • /
    • pp.57-64
    • /
    • 2024
  • This study numerically compares optimum solutions generated by element- and node-wise topology optimization designs for free vibration structures, where element-and node-wise denote the use of element and nodal densities as design parameters, respectively. For static problems optimal solution comparisons of the two types for topology optimization designs have already been introduced by the author and many other researchers, and the static structural design is very common. In dynamic topology optimization problems the objective is in general related to maximum Eigenfrequency optimization subject to a given material limit since structures with a high fundamental frequency tend to be reasonable stiff for static loads. Numerical applications topologically maximizing the first natural Eigenfrequency verify the difference of solutions between element-and node-wise topology optimum designs.

Design and Evaluation of a Distributed Mutual Exclusion Algorithmfor Hypercube Multicomputers (하이퍼큐브 멀티컴퓨터를 위한 분산 상호배제 알고리즘의 설계 및 평가)

  • Ha, Sook-Jeong;Bae, Ihn-Han
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.9
    • /
    • pp.2221-2234
    • /
    • 1997
  • Distributed mutual exclusion algorithms have employed two approaches to achieve mutual exclusion and can be divided into two broad classes:token-based and permission-based. Token-based algorithms share a unique token among the nodes and a node is allowed to access its common resources if it possesses the token. Permission-based algorithms require one or more successive rounds of message exchanges among the nodes to obtain the permission to access the common resources. A hypercube architecture has earned wide acceptance in multiprocessor systems in the past few years because of its simple, yet rich topology. Accordingly, we study distributed permission-based mutual exclusion algorithms for hypercubes, and design a distributed permission-based mutual exclusion algorithm based on a new information structure adapted to the hypercubes. The new information structure is a request set of T-pattern from a logical mesh that is embedded into a hypercube. If a node wants to access the common resources, it sends request message to all nodes in the request set by Lan's multicast algorithm. Once the node receives a grant message from all nodes in the request set, it accesses the common resource. We evaluate our algorithm with respect to minimum round-trip delay, blocking delay, and the number of messages per access to the common resource.

  • PDF

A Clinical Study of Surgically Treated 194 Cases of the Thyroid Cancer (외과적 절제술로 치험한 갑상선암 194예의 임상적 고찰)

  • Lee Suk-Jae;Kim Sung-Bae;Kim Sang-Hyo
    • Korean Journal of Head & Neck Oncology
    • /
    • v.18 no.1
    • /
    • pp.50-55
    • /
    • 2002
  • Objectives: Thyroid cancer is the most common endocrine malignancy with favorable histologic and prognostic characteristics. Total or near total thyroidectomy has been used as a standard surgical procedure. The aims of this study are to determine the extent of resection of thyroid gland and to find the influencing factors of lymph node metastasis. Materials and Methods: The authors reviewed the records of 194 patients of thyroid cancer surgically treated at Department of General Surgery, Inje University Busan Paik Hospital from January, 1996 to December, 2000. Pathologic classifications, surgical procedures, and lymph node metastasis were analyzed. Results: There were 163 women and 31 men. The age ranged from 12 to 79 years old (mean age 43.2 years). The histological classifications of 194 cases revealed papillary cancer in 171 cases (88.1%), follicular cancer in 17 cases (8.8%), undifferentiated cancer in 3 cases (1.6%), medullary cancer in 2 cases (1.0%) and mixed cancer in 1 case (0.5%). Among the 194 patients, lobectomy was perfomed in 31 patients, subtotal thyroidectomy in 30 patients, near total thyroidectomy in 82 patients and total thyroidectomy in 51 patients. In the subgroup of papillary carcinoma 141 cases with lymph node dissection, lymph node metastasis had no statistical significance according to sex, age and primary tumor size. Conclusions: The mainly performed surgical procedures were total thyroidectomy and near total thyroidectomy. In thyroid cancer surgery, the extent of resection was influenced by age, differentiation and primary tumor size. The lymph node dissection should be decided by lymph node metastasis identified by preoperative radiologic evaluation or intraoperative lymph node findings.

Differential microbiota network according to colorectal cancer lymph node metastasis stages

  • Yeuni Yu;Donghyun Han;Hyomin Kim;Yun Hak Kim;Dongjun Lee
    • Journal of Genetic Medicine
    • /
    • v.20 no.2
    • /
    • pp.52-59
    • /
    • 2023
  • Purpose: Colorectal cancer (CRC) is a common malignancy worldwide and the second leading cause of cancer-related deaths. In addition, lymph node metastasis in CRC is considered an important prognostic factor for predicting disease recurrence and patient survival. Recent studies demonstrated that the microbiome makes substantial contributions to tumor progression, however, there is still unknown about the microbiome associated with lymph node metastasis of CRC. Here, we first reported the microbial and tumor-infiltrating immune cell differences in CRC according to the lymph node metastasis status. Materials and Methods: Using Next Generation Sequencing data acquired from 368 individuals diagnosed with CRC (N0, 266; N1, 102), we applied the LEfSe to elucidate microbial differences. Subsequent utilization of the Kaplan-Meier survival analysis enabled the identification of particular genera exerting significant influence on patient survival outcomes. Results: We found 18 genera in the N1 group and 3 genera in the N0 group according to CRC lymph node metastasis stages. In addition, we found that the genera Crenobacter (P=0.046), Maricaulis (P=0.093), and Arsenicicoccus (P=0.035) in the N0 group and Cecembia (P=0.08) and Asanoa (P=0.088) in the N1 group were significantly associated with patient survival according to CRC lymph node metastasis stages. Further, Cecembia is highly correlated to tumor-infiltrating immune cells in lymph node metastasized CRC. Concolusion: Our study highlights that tumor-infiltrating immune cells and intratumoral microbe diversity are associated with CRC. Also, this potential microbiome-based oncology diagnostic tool warrants further exploration.

Research on bearing characteristics of socket-spigot template supporting system

  • Guo, Yan;Hu, Chang-Ming;Lian, Ming
    • Steel and Composite Structures
    • /
    • v.20 no.4
    • /
    • pp.869-887
    • /
    • 2016
  • The socket-spigot template supporting system is widely used in engineering applications in China. As a newer type of support structure, there has been growing research interest in its bearing capacity. In this paper, four vertical bearing capacity tests were carried out on the basic mechanical unit frame of a socket-spigot template supporting system. The first goal was to explore the influence of the node semi-rigid degree and the longitudinal spacing of the upright tube on the vertical bearing capacity. The second objective was to analyze the displacement trend and the failure mode during the loading process. This paper presents numerical analysis of the vertical bearing capacity of the unit frames using the finite element software ANSYS. It revealed the relationship between the node semi-rigid degree and the vertical bearing capacity, that the two-linear reinforcement model of elastic-plastic material can be used to analyze the socket-spigot template supporting system, and, through node entity model analysis, that the load transfer direction greatly influences the node bearing area. Finally, this paper indicates the results of on-site application performance experiments, shows that the supporting system has adequate bearing capacity and stability, and comments on the common work performance of a socket and fastener scaffold.

A Case of Cystic Lymph Node Metastasis of Tonsil Cancer Mimicking 2nd Branchial Cleft Cyst (제2열 새열 낭종으로 오인되었던 편도암의 낭성 경부 임파절 전이 1예)

  • Park, Seung Bum;Noh, Minh Ho;Ban, Won Woo;Ban, Myung Jin;Park, Jae Hong
    • Korean Journal of Head & Neck Oncology
    • /
    • v.31 no.2
    • /
    • pp.86-90
    • /
    • 2015
  • Cystic lymph node metastasis of head and neck squamous cell carcinoma(HNSCC) which presumed to be mainly originated from oropharynx including Waldeyer's ring may present as a benign cystic mass on lateral neck such as branchial cleft cyst. Branchial cleft cyst is one of the most common lateral neck cystic mass which may result in regional infection or lymph adenopathy. Many of previously reported literatures showed the incidence of cystic lymph node metastasis from oropharynx including Waldeyer's ring. Preoperative imaging studies and fine needle aspiration cytology cannot provide the accurate results until excision of cystic mass for the diagnostic or therapeutic purpose. Recently, we experienced the rare case of cystic lymph node metastasis from ipsilateral tonsil, which mimicked infected 2nd branchial cleft cyst. Thus, we reported our experience with presentation of case and review of literatures.

  • PDF

Conceptual Design on the ISDN Service Node for Multiparty Connection Services - Part I. Considerations on the Features and Functions of a Service Node - (ISDN에서의 다자간 접속 서비스 제공을 위한 서비스노드의 개념적 설계 - 제1부 : 서비스노드의 기능 고찰 -)

  • 옥승수;김근배;조규섭;박병철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.2
    • /
    • pp.231-241
    • /
    • 1994
  • To overcome the limit of a point-point connection type service which is common to the ISDN bearer services, a new concept of network element, Service Node, which can provide multiparty connections and control the teleservices on those connections is proposed. This will support conference type multiparty multimedia services among normal ISDN subscribers. In this paper, as a primary study on this concept, we deduce some attributes of the general conference type services and examine the methods and procedures to provide that kind of services through the ISDN. Based on this study, we also define the general requirements and basic structure for the Service Node realization, thus give shape to the concept of it.

  • PDF

An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks

  • Haque, Md. Mokammel;Pathan, Al-Sakib Khan;Hong, Choong-Seon;Huh, Eui-Nam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.5
    • /
    • pp.265-277
    • /
    • 2008
  • In spite of previous common assumptions about the incompatibility of public key cryptography (PKC) schemes with wireless sensor networks (WSNs), recent works have shown that they can be utilized for such networks in some manner. The major challenge of employing a PKC-based scheme in a wireless sensor network is posed by the resource limitations of the tiny sensors. Considering this sensor feature, in this paper we propose an efficient PKC-based security architecture with relatively lower resource requirements than those of previously proposed PKC schemes for WSN. In addition, our scheme aims to provide robust security in the network. Our security architecture comprises two basic components; a key handshaking scheme based on simple, linear operations and the derivation of a decryption key by a receiver node. Our architecture enables node-to-base-station and node-to-node secure communications. Analysis and simulation results show that our proposed architecture ensures a good level of security for network communications, and can be effectively implemented with the limited computational, memory, and energy budgets of current-generation sensor nodes.

Bit-level Array Structure Representation of Weight and Optimization Method to Design Pre-Trained Neural Network (학습된 신경망 설계를 위한 가중치의 비트-레벨 어레이 구조 표현과 최적화 방법)

  • Lim, Guk-Chan;Kwak, Woo-Young;Lee, Hyun-Soo
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.39 no.9
    • /
    • pp.37-44
    • /
    • 2002
  • This paper proposes efficient digital hardware design method by using fixed weight of pre-trained neural network. For this, arithmetic operations of PEs(Processing Elements) are represented with matrix-vector multiplication. The relationship of fixed weight and input data present bit-level array structure architecture which is consisted operation node. To minimize the operation node, this paper proposes node elimination method and setting common node depend on bit pattern of weight. The result of FPGA simulation shows the efficiency on hardware cost and operation speed with full precision. And proposed design method makes possibility that many PEs are implemented to on-chip.