• Title/Summary/Keyword: variable-node

Search Result 255, Processing Time 0.026 seconds

Minimum Bandwidth Regenerating Codes Based on Cyclic VFR Codes

  • Wang, Jing;Wang, Shuxia;Wang, Tiantian;Zhang, Xuefei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3583-3598
    • /
    • 2019
  • In order to improve the reliability and repair efficiency of distributed storage systems, minimum bandwidth regenerating (MBR) codes based on cyclic variable fractional repetition (VFR) codes are constructed in this thesis, which can repair failed nodes accurately. Specifically, in order to consider the imbalance of data accessed by the users, cyclic VFR codes are constructed according to that data with different heat degrees are copied in different repetition degrees. Moreover, we divide the storage nodes into groups, and construct MBR codes based on cyclic VFR codes to improve the file download speed. Performance analysis and simulation results show that, the repair locality of a single node failure is always 2 when MBR codes based on cyclic VFR codes are adopted in distributed storage systems, which is obviously superior to the traditional MBR codes. Compared with RS codes and simple regenerating codes, the proposed MBR codes based on cyclic VFR codes have lower repair locality, repair complexity and bandwidth overhead, as well as higher repair efficiency. Moreover, relative to FR codes, the MBR codes based on cyclic VFR codes can be applicable to more storage systems.

MRI-Based Stepwise Approach to Anterior Mediastinal Cystic Lesions for Diagnosis and Further Management

  • Jong Hee Kim;Jooae Choe;Hong Kwan Kim;Ho Yun Lee
    • Korean Journal of Radiology
    • /
    • v.24 no.1
    • /
    • pp.62-78
    • /
    • 2023
  • As the majority of incidentally detected lesions in the anterior mediastinum is small nodules with soft tissue appearance, the differential diagnosis has typically included thymic neoplasm and prevascular lymph node, with benign cyst. Overestimation or misinterpretation of these lesions can lead to unnecessary surgery for ultimately benign conditions. Diagnosing mediastinal cysts using MRI serves as a problem-solving modality in distinguishing between surgical and nonsurgical anterior mediastinal lesions. The pitfalls of MRI evaluation for anterior mediastinal cystic lesions are as follows: first, we acknowledge the limitation of T2-weighted images for evaluating benign cystic lesions. Due to variable contents within benign cystic lesions, such as hemorrhage, T2 signal intensity may be variable. Second, owing to extensive necrosis and cystic changes, the T2 shine-through effect may be seen on diffusion-weighted images (DWI), and small solid portions might be missed on enhanced images. Therefore, both enhancement and DWI with apparent diffusion coefficient values should be considered. An algorithm will be suggested for the diagnostic evaluation of anterior mediastinal cystic lesions, and finally, a management strategy based on MRI features will be suggested.

A Robust Biometric-based User Authentication Protocol in Wireless Sensor Network Environment (무선센서네트워크 환경에서 생체기반의 개선된 사용자 인증 프로토콜)

  • Shin, Kwang-Cheul
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.3
    • /
    • pp.107-123
    • /
    • 2013
  • In a wireless sensor network environment, it is required to ensure anonymity by keeping sensor nodes' identifiers not being revealed and to support real-time authentication, lightweight authentication and synchronization. In particular, there exist possibilities of location information leakage by others, privacy interference and security vulnerability when it comes to wireless telecommunications. Anonymity has been an importance issue in wired and wireless network environment, so that it has been studied in wide range. The sensor nodes are interconnected among them based on wireless network. In terms of the sensor node, the researchers have been emphasizing on its calculating performance limit, storage device limit, and smaller power source. To improve of biometric-based D. He scheme, this study proposes a real-time authentication protocol using Unique Random Sequence Code(URSC) and variable identifier for enhancing network performance and retaining anonymity provision.

Synchronous Reservation Protocol for Variable-sized Messages in a WDM-based Local Network (WDM 망에서 가변 길이의 메시지 전송을 위한 동기 예약 프로토콜)

  • Lee, Jae-Hwoon;Rim, Min-Joong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.38 no.6
    • /
    • pp.1-10
    • /
    • 2001
  • In this paper, we propose a synchronous reservation protocol that is efficient for supporting variable sized messages in a wavelength division multiplexing (WDM) based local network using a passive star topology. A. control channel is used to coordinate transmission on data channels. Time is slotted with fixed-sized slots. The network can accommodate a variable number of nodes, and can operate independently of the change of the number of nodes. So, any 'new' node can join the network anytime without network re-initialization. Moreover, with the protocol, we can avoid data channel and destination conflicts. We analyze the performance by using EPA method according to the variation of the end to end propagation delay with respect to one slot time, and validate the results by simulation.

  • PDF

Variable Geocasting based on Ad Hoc Networks (Ad Hoc 네트워크 기반의 가변 지오캐스팅)

  • Lee Cheol-Seung;Lee Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.8
    • /
    • pp.1401-1406
    • /
    • 2006
  • Mobile Ad-hoc networks have recently attracted a lot of attention in the research community as well as in industry. Although the previous research mainly focused on various of Ad-hoc in routing, we consider, in this paper, how to efficiently support applications such as variable Goocasting basd on Ad-hoc networks. The goal of a geocasting uotocol is deliver data packets to a group of nodes that are located within a specified geocasting region. Previous research that support geocast nice in mobilie computing based on Ad-hoc have the non-optimization problem of data delivery path, overhead by frequent reconstruction of the geocast tree, and service disruption problem. In this paper, we propose the mobility pattern based geocast technique using variable service range according to the nobility of destination node and resource reservation to solve this problem. The experimental results show that our proposed mechanism has improved performance of Connection & Network Overhead than previous research.

A Study on Variable Geocasting in Ad-hoc Environment (Ad-hoc 환경에서의 가변 지오캐스팅에 관한 연구)

  • Lee Cheol-Seung;Kim Kuk-Se;Jung Sung-Ok;Lee Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.510-513
    • /
    • 2006
  • Mobile Ad-hoc networks have recently attracted a lot of attention in the research community as well as in industry. Although the previous research mainly focused on various of Ad-hoc in routing we consider, in this paper, how to efficiently support applications such as variable Geocasting basd on Ad-hoc networks. The goal of a geocasting protocol is deliver data packets to a group of nodes that are located within a specified geocasting region. Previous research that support geocast service in mobilie computing based on Ad-hoc have the non-optimization problem of data delivery path, overhead by frequent reconstruction of the geocast tree, and service disruption problem. In this paper, we propose the mobility pattern based geocast technique using variable service range according to the mobility of destination node and resource reservation to solve this problem. The experimental results show that our proposed mechanism has improved performance than previous research.

  • PDF

Design of Variable Timeslot for Hybrid MAC (하이브리드 MAC을 위한 가변 타임슬롯 설계)

  • Ryu, Jeong-Kyu;Lee, Seong-Real
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.6
    • /
    • pp.613-619
    • /
    • 2020
  • Hybrid media access control (MAC) is used in internet of things (IoT) network, because of communication feature concern with data capacity and communication interval between gateway and sensor nodes and the cost efficiency. Hybrid MAC consists of TDMA and CSMA generally. The distance between gateway and sensor node is openly changed in marine IoT network. Therefore, it is needed to control the period of timeslot of hybrid MAC used in marine IoT network. In this paper, the design rule of TDMA timeslot with the variable period depending on communication distance was proposed. It was confirmed from the analysis that 72 times communication between gateway and sensor nodes is possible in LoRa network by using the proposed TDMA variable timeslot scheme.

Prognostic Factors and Survival Rates of Stage III Gastric Cancer Patients after a Gastrectomy (3기 위암 환자의 술 후 생존율 및 예후 인자 분석)

  • Jang Seok-Won;Kim Chi-Ho;Kim Sang-Woon;Song Sun-Kyo
    • Journal of Gastric Cancer
    • /
    • v.4 no.3
    • /
    • pp.137-142
    • /
    • 2004
  • Purpose: There have been some controversies over the therapeutic principles of advanced gastric cancer, and the results of treatment have been variable, especially for stage III disease. This study was conducted to define the prognostic factors of stage III gastric cancer. Materials and Methods: This retrospective study was based on the medical records of 179 patients with stage III disease who received a gastrectomy from January 1990 to December 1994. The 5-year survival rate was analyzed according to the age, sex, tumor location, tumor size, Borrmann's type, depth of invasion, lymph-node metastasis, ratio of metastatic lymph nodes, type of surgical resection, extent of lymphnode dissection, curability of resection, postoperative chemotherapy, and pathological stage. The statistical analysis was done by using the Kaplan-Meier method, the log-rank test, and the Cox proportional hazards model. Results: The overall 5-year survival rate was $61.6\%$ the 5-year survival rates according to subgroup were $69.7\%$ for stage IIIa ($100\%$ for $T_{2}N_{2}$, $70.0\%$ for $T_{3}N_{1}$, $68.6\%$ for $T_{4}N_{0}$), and $54.1\%$ for stage IIIb ($T_{3}N_{2}$) (P<0.05). Among various clinicopathologic factors of stage III gastric cancer, the age of the patient, the tumor location, the gross type of tumor, the type of gastric resection, the extent of lymph-node dissection, the curability of resection, and the subgroups of stage III were statistically significant in the univariate survival analysis. The multivariate analysis defined the curability of resection, the extent of lymph-node dissection, the type of operation, the stage of disease, and the age of the patient as independent prognostic factors. Conclusion: A curative surgical resection and an extended lymph-node dissection are thought to be most important for improving the survival rate in stage III gastric cancer patients.

  • PDF

Slot-Time Optimization Scheme for Underwater Acoustic Sensor Networks (수중음향 센서네트워크를 위한 슬롯시간 최적화 기법)

  • Lee, Dongwon;Kim, Sunmyeng;Lee, Hae-Yeoun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.4
    • /
    • pp.351-361
    • /
    • 2014
  • Compared to a terrestrial communication, the high BER(Bit Error Ratio) and low channel bandwidth are the major factor of throughput degradation due to characteristics of underwater channel. Therefore, a MAC protocol must be designed to solve this problem in UWASNs(Underwater Acoustic Sensor Networks). MAC protocols for UWASNs can be classified into two major types according to the contention scheme(Contention-free scheme and Contention-based scheme). In large scale of sensor networks, a Contention-based scheme is commonly used due to time-synchronize problem of Contention-free scheme. In the contention-based scheme, Each node contends with neighbor nodes to access network channel by using Back-off algorithm. But a Slot-Time of Back-off algorithm has long delay times which are cause of decrease network throughput. In this paper, we propose a new scheme to solve this problem. The proposed scheme uses variable Slot-Time instead of fixed Slot-Time. Each node measures propagation delay from neighbors which are used by Slot-time. Therefore, Slot-Times of each node are optimized by considering node deployment. Consequently, the wasted-time for Back-off is reduced and network throughput is improved. A new mac protocol performance in throughput and delay is assessed through NS3 and compared with existing MAC protocol(MACA-U). Finally, it was proved that the MAC protocol using the proposed scheme has better performance than existing MAC protocol as a result of comparison.

A direct modification method for strains due to non-conforming modes

  • Choi, Chang-Koon;Chung, Keun-Young;Lee, Tae-Yeol
    • Structural Engineering and Mechanics
    • /
    • v.11 no.3
    • /
    • pp.325-340
    • /
    • 2001
  • This paper addresses an efficient modification method that eliminates the undesirable effects of strains due to various non-conforming modes so that the non-conforming element can pass the patch test unconditionally. The scheme is incorporated in the element formulation to establish new types of non-conforming hexahedral elements designated as NHx and NVHx for the regular element and variable node element, respectively. Non-conforming displacement modes are selectively added to the ordinary (conforming) element displacement assumptions to improve the bending behavior of the distorted solid element. To verify the validation of proposed direct modification method and the improvement of element behavior, several numerical tests are carried out. Test results show that the proposed method is effective and its applications to non-conforming solid elements guarantee for the element to pass the patch test.