• Title/Summary/Keyword: nodes

Search Result 8,402, Processing Time 0.028 seconds

Surface Morphologies and Internal Fine Structures of Bast Fibers

  • Wang H. M.;Wang X.
    • Fibers and Polymers
    • /
    • v.6 no.1
    • /
    • pp.6-12
    • /
    • 2005
  • Fiber surface morphologies and associated internal structures are closely related to its properties. Unlike other fibers including cotton, bast fibers possess transverse nodes and fissures in cross-sectional and longitudinal directions. Their morphologies and associated internal structures were anatomically examined under the scanning electron microscope. The results showed that the morphologies of the nodes and the fissures of bast fibers varied depending on the construction of the inner fibril cellular layers. The transverse nodes and fissures were formed by the folding and spiralling of the cellular layers during plant growth. The dimensions of nodes and fissures were determined by the dislocations of the cellular layers. There were also many longitudinal fissures in bast fibers. Some deep longitudinal fissures even opened the fiber lumen for a short way along the fiber. In addition, the lumen channel of the bast fibers could be disturbed or disrupted by the nodes and the spi­rals of the internal cellular layers. The existence of the transverse nodes and fissures in the bast fibers could degrade the fiber mechanical properties, whereas the longitudinal fissures may contribute to the very rapid moisture absorption and desorption.

Packet Loss Patterns Adaptive Feedback Scheduling for Reliable Multicast

  • Baek, Jin-Suk;Kim, Cheon-Shik;Hong, You-Sik
    • Journal of Ubiquitous Convergence Technology
    • /
    • v.1 no.1
    • /
    • pp.28-34
    • /
    • 2007
  • Tree-based reliable multicast protocols provide scalability by distributing error-recovery tasks among several repair nodes. These repair nodes perform local error recovery for their receiver nodes using the data stored in their buffers. We propose a packet loss patterns adaptive feedback scheduling scheme to manage these buffers in an efficient manner. Under our scheme, receiver nodes send NAKs to repair nodes to request packet retransmissions only when the packet losses are independent events from other nodes. At dynamic and infrequent intervals, they also send ACKs to indicate which packets can be safely discarded from the repair node's buffer. Our scheme reduces delay in error recovery because the requested packets are almost always available in the repair node's buffers. It also reduces the repair node's workload because (a) each receiver node sends infrequent ACKs with non-fixed intervals and (b) their sending times are fairly distributed among all the receiver nodes.

  • PDF

New conter location algorithms for shared multicast trees (공유된 멀티캐스트 트리에서 센터 위치 결정을 위한 새 알고리즘)

  • 강신규;심영철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.3B
    • /
    • pp.493-503
    • /
    • 2000
  • Multicast routing algorithms such PIM, CBT, BGMP use shared multicast routing trees and the location of the multicast tree has great impact on the packet delay. In this pater we propose three new center location algorithms and analyze their performance through simulation studies. these three algorithms consider as candidates for the center not only multicast group members but also a few non-members nodes. To select these non-member nodes, we first find all the shortest paths among every couple of members and consider either nodes which are most frequently visited during the process of finding shortest paths or nodes which lie at the center of a shortest path and are most frequently visited during the same process. There the proposed algorithms are able to find the better center than not only algorithms which consider only member nodes but also other algorithms which consider selected non-member nodes in addition ot member nodes. The proposed algorithms either incur too much overhead nor depend upon unicasting algorithms.

  • PDF

Ectopic Schistosomiasis Involving Axillary Lymph Nodes

  • Xia Chen;Nian'an He
    • Parasites, Hosts and Diseases
    • /
    • v.60 no.6
    • /
    • pp.409-411
    • /
    • 2022
  • Axillary lymph node schistosomiasis is a form of ectopic schistosomiasis, in which the Schistosoma adult worms or eggs are infected in the axillary lymph nodes. A 53-year-old woman visited our hospital with a small mass in the right armpit, which had been present for over 1 month. Histological examination of biopsy samples from the right axillary lymph nodes revealed granulomas containing calcified Schistosoma eggs. This is the first authentic case of ectopic schistosomiasis identified in the axillary lymph nodes.

An Estimation Method of Node Position in Wireless Sensor Network (무선 센서 네트워크에서의 노드 위치 추정)

  • Rhim, Chul-Woo;Kim, Young-Rag;Kang, Byung-Wook
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.3
    • /
    • pp.123-129
    • /
    • 2009
  • It is important to locate nodes in the research of wireless sensor network. In this paper, we propose a method that estimates the positions of nodes by using adjacent node information and signal strength in wireless sensor network. With this method, we can find positions of nodes easily because we use Information that nodes have. And we can make a map for all the nodes because we can measure a relative position for an node whose position is not known based on anchor nodes whose positions are already known. In addition, we can confirm whether nodes are placed appropriately. We confirmed that we can locate positions of unknown nodes with small error through verifying the proposed method.

Evaluation of the Effects of a Grouping Algorithm on IEEE 802.15.4 Networks with Hidden Nodes

  • Um, Jin-Yeong;Ahn, Jong-Suk;Lee, Kang-Woo
    • Journal of Communications and Networks
    • /
    • v.16 no.1
    • /
    • pp.81-91
    • /
    • 2014
  • This paper proposes hidden-node aware grouping (HAG) algorithm to enhance the performance of institute of electrical and electronics engineers (IEEE) 802.15.4 networks when they undergo either severe collisions or frequent interferences by hidden nodes. According to the degree of measured collisions and interferences, HAG algorithm dynamically transforms IEEE 802.15.4 protocol between a contention algorithm and a contention-limited one. As a way to reduce the degree of contentions, it organizes nodes into some number of groups and assigns each group an exclusive per-group time slot during which only its member nodes compete to grab the channel. To eliminate harmful disruptions by hidden nodes, especially, it identifies hidden nodes by analyzing the received signal powers that each node reports and then places them into distinct groups. For load balancing, finally it flexibly adapts each per-group time according to the periodic average collision rate of each group. This paper also extends a conventional Markov chain model of IEEE 802.15.4 by including the deferment technique and a traffic source to more accurately evaluate the throughput of HAG algorithm under both saturated and unsaturated environments. This mathematical model and corresponding simulations predict with 6%discrepancy that HAG algorithm can improve the performance of the legacy IEEE 802.15.4 protocol, for example, even by 95% in a network that contains two hidden nodes, resulting in creation of three groups.

Novel Architecture of Self-organized Mobile Wireless Sensor Networks

  • Rizvi, Syed;Karpinski, Kelsey;Razaque, Abdul
    • Journal of Computing Science and Engineering
    • /
    • v.9 no.4
    • /
    • pp.163-176
    • /
    • 2015
  • Self-organization of distributed wireless sensor nodes is a critical issue in wireless sensor networks (WSNs), since each sensor node has limited energy, bandwidth, and scalability. These issues prevent sensor nodes from actively collaborating with the other types of sensor nodes deployed in a typical heterogeneous and somewhat hostile environment. The automated self-organization of a WSN becomes more challenging as the number of sensor nodes increases in the network. In this paper, we propose a dynamic self-organized architecture that combines tree topology with a drawn-grid algorithm to automate the self-organization process for WSNs. In order to make our proposed architecture scalable, we assume that all participating active sensor nodes are unaware of their primary locations. In particular, this paper presents two algorithms called active-tree and drawn-grid. The proposed active-tree algorithm uses a tree topology to assign node IDs and define different roles to each participating sensor node. On the other hand, the drawn-grid algorithm divides the sensor nodes into cells with respect to the radio coverage area and the specific roles assigned by the active-tree algorithm. Thus, both proposed algorithms collaborate with each other to automate the self-organizing process for WSNs. The numerical and simulation results demonstrate that the proposed dynamic architecture performs much better than a static architecture in terms of the self-organization of wireless sensor nodes and energy consumption.

A Security Model based on Reputation and Collaboration through Route-Request in Mobile Ad Hoc Networks

  • Anand, Anjali;Rani, Rinkle;Aggarwal, Himanshu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4701-4719
    • /
    • 2015
  • A Mobile Ad hoc Network (MANET) consists of mobile nodes which co-operate to forward each other's packets without the presence of any centralized authority. Due to this lack of centralized monitoring authority, MANETs have become vulnerable to various kinds of routing misbehaviour. Sometimes, nodes exhibit non-cooperating behaviour for conserving their own resources and exploiting others' by relaying their traffic. A node may even drop packets of other nodes in the guise of forwarding them. This paper proposes an efficient Reputation and Collaboration technique through route-request for handling such misbehaving nodes. It lays emphasis not only on direct observation but also considers the opinion of other nodes about misbehaving nodes in the network. Unlike existing schemes which generate separate messages for spreading second-hand information in the network, nodes purvey their opinion through route-request packet. Simulation studies reveal that the proposed scheme significantly improves the network performance by efficiently handling the misbehaving nodes in the network.

Energy Efficiency Enhancement of TICK -based Fuzzy Logic for Selecting Forwarding Nodes in WSNs

  • Ashraf, Muhammad;Cho, Tae Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4271-4294
    • /
    • 2018
  • Communication cost is the most important factor in Wireless Sensor Networks (WSNs), as exchanging control keying messages consumes a large amount of energy from the constituent sensor nodes. Time-based Dynamic Keying and En-Route Filtering (TICK) can reduce the communication costs by utilizing local time values of the en-route nodes to generate one-time dynamic keys that are used to encrypt reports in a manner that further avoids the regular keying or re-keying of messages. Although TICK is more energy efficient, it employs no re-encryption operation strategy that cannot determine whether a healthy report might be considered as malicious if the clock drift between the source node and the forwarding node is too large. Secure SOurce-BAsed Loose Synchronization (SOBAS) employs a selective encryption en-route in which fixed nodes are selected to re-encrypt the data. Therefore, the selection of encryption nodes is non-adaptive, and the dynamic network conditions (i.e., The residual energy of en-route nodes, hop count, and false positive rate) are also not focused in SOBAS. We propose an energy efficient selection of re-encryption nodes based on fuzzy logic. Simulation results indicate that the proposed method achieves better energy conservation at the en-route nodes along the path when compared to TICK and SOBAS.

Algorithm based on Byzantine agreement among decentralized agents (BADA)

  • Oh, Jintae;Park, Joonyoung;Kim, Youngchang;Kim, Kiyoung
    • ETRI Journal
    • /
    • v.42 no.6
    • /
    • pp.872-885
    • /
    • 2020
  • Distributed consensus requires the consent of more than half of the congress to produce irreversible results, and the performance of the consensus algorithm deteriorates with the increase in the number of nodes. This problem can be addressed by delegating the agreement to a few selected nodes. Since the selected nodes must comply with the Byzantine node ratio criteria required by the algorithm, the result selected by any decentralized node cannot be trusted. However, some trusted nodes monopolize the consensus node selection process, thereby breaking decentralization and causing a trilemma. Therefore, a consensus node selection algorithm is required that can construct a congress that can withstand Byzantine faults with the decentralized method. In this paper, an algorithm based on the Byzantine agreement among decentralized agents to facilitate agreement between decentralization nodes is proposed. It selects a group of random consensus nodes per block by applying the proposed proof of nonce algorithm. By controlling the percentage of Byzantine included in the selected nodes, it solves the trilemma when an arbitrary node selects the consensus nodes.