Search results for: axillary lymph nodes
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 701

Search results for: axillary lymph nodes

611 A Survey of Novel Opportunistic Routing Protocols in Mobile Ad Hoc Networks

Authors: R. Poonkuzhali, M. Y. Sanavullah, M. R. Gurupriya

Abstract:

Opportunistic routing is used, where the network has the features like dynamic topology changes and intermittent network connectivity. In Delay Tolerant network or Disruption tolerant network opportunistic forwarding technique is widely used. The key idea of opportunistic routing is selecting forwarding nodes to forward data and coordination among these nodes to avoid duplicate transmissions. This paper gives the analysis of pros and cons of various opportunistic routing techniques used in MANET.

Keywords: ETX, opportunistic routing, PSR, throughput

Procedia PDF Downloads 469
610 Genetic Algorithm Based Node Fault Detection and Recovery in Distributed Sensor Networks

Authors: N. Nalini, Lokesh B. Bhajantri

Abstract:

In Distributed Sensor Networks, the sensor nodes are prone to failure due to energy depletion and some other reasons. In this regard, fault tolerance of network is essential in distributed sensor environment. Energy efficiency, network or topology control and fault-tolerance are the most important issues in the development of next-generation Distributed Sensor Networks (DSNs). This paper proposes a node fault detection and recovery using Genetic Algorithm (GA) in DSN when some of the sensor nodes are faulty. The main objective of this work is to provide fault tolerance mechanism which is energy efficient and responsive to network using GA, which is used to detect the faulty nodes in the network based on the energy depletion of node and link failure between nodes. The proposed fault detection model is used to detect faults at node level and network level faults (link failure and packet error). Finally, the performance parameters for the proposed scheme are evaluated.

Keywords: distributed sensor networks, genetic algorithm, fault detection and recovery, information technology

Procedia PDF Downloads 424
609 Postoperative Radiotherapy in Cancers of the Larynx: Experience of the Emir Abdelkader Cancer Center of Oran, about 89 Cases

Authors: Taleb Lotfi, Benarbia Maheidine, Allam Hamza, Boutira Fatima, Boukerche Abdelbaki

Abstract:

Introduction and purpose of the study: This is a retrospective single-center study with an analytical aim to determine the prognostic factors for relapse in patients treated with radiotherapy after total laryngectomy with lymph node dissection for laryngeal cancer at the Emir Abdelkader cancer center in Oran (Algeria). Material and methods: During the study period from January 2014 to December 2018, eighty-nine patients (n=89) with squamous cell carcinoma of the larynx were treated with postoperative radiotherapy. Relapse-free survival was studied in the univariate analysis according to pre-treatment criteria using Kaplan-Meier survival curves. We performed a univariate analysis to identify relapse factors. Statistically significant factors have been studied in the multifactorial analysis according to the Cox model. Results and statistical analysis: The average age was 62.7 years (40-86 years). It was a squamous cell carcinoma in all cases. Postoperatively, the tumor was classified as pT3 and pT4 in 93.3% of patients. Histological lymph node involvement was found in 36 cases (40.4%), with capsule rupture in 39% of cases, while the limits of surgical excision were microscopically infiltrated in 11 patients (12.3%). Chemotherapy concomitant with radiotherapy was used in 67.4% of patients. With a median follow-up of 57 months (23 to 104 months), the probabilities of relapse-free survival and five-year overall survival are 71.2% and 72.4%, respectively. The factors correlated with a high risk of relapse were locally advanced tumor stage pT4 (p=0.001), tumor site in case of subglottic extension (p=0.0003), infiltrated surgical limits R1 (p=0.001), l lymph node involvement (p=0.002), particularly in the event of lymph node capsular rupture (p=0.0003) as well as the time between surgery and adjuvant radiotherapy (p=0.001). However, in the subgroup analysis, the major prognostic factors for disease-free survival were subglottic tumor extension (p=0.001) and time from surgery to adjuvant radiotherapy (p=0.005). Conclusion: Combined surgery and postoperative radiation therapy are effective treatment modalities in the management of laryngeal cancer. Close cooperation of the entire cervicofacial oncology team is essential, expressed during a multidisciplinary consultation meeting, with the need to respect the time between surgery and radiotherapy.

Keywords: laryngeal cancer, laryngectomy, postoperative radiotherapy, survival

Procedia PDF Downloads 77
608 Load-Enabled Deployment and Sensing Range Optimization for Lifetime Enhancement of WSNs

Authors: Krishan P. Sharma, T. P. Sharma

Abstract:

Wireless sensor nodes are resource constrained battery powered devices usually deployed in hostile and ill-disposed areas to cooperatively monitor physical or environmental conditions. Due to their limited power supply, the major challenge for researchers is to utilize their battery power for enhancing the lifetime of whole network. Communication and sensing are two major sources of energy consumption in sensor networks. In this paper, we propose a deployment strategy for enhancing the average lifetime of a sensor network by effectively utilizing communication and sensing energy to provide full coverage. The proposed scheme is based on the fact that due to heavy relaying load, sensor nodes near to the sink drain energy at much faster rate than other nodes in the network and consequently die much earlier. To cover this imbalance, proposed scheme finds optimal communication and sensing ranges according to effective load at each node and uses a non-uniform deployment strategy where there is a comparatively high density of nodes near to the sink. Probable relaying load factor at particular node is calculated and accordingly optimal communication distance and sensing range for each sensor node is adjusted. Thus, sensor nodes are placed at locations that optimize energy during network operation. Formal mathematical analysis for calculating optimized locations is reported in present work.

Keywords: load factor, network lifetime, non-uniform deployment, sensing range

Procedia PDF Downloads 352
607 Radix Saposhnikoviae Suppresses Allergic Contact Dermatitis in Mice by Regulating DCs Activated Th1-Type Cells

Authors: Hailiang Liu, Yan Ni, Jie Zheng, Xiaoyan Jiang, Min Hong

Abstract:

Allergic contact dermatitis (ACD) is a commonly clinical type IV allergic skin disease, with the pathological features of infiltration by mononuclear cells and tissue necrosis. Traditional Chinese medicine Radix Saposhnikoviae (RS) is traditionally employed to treat exogenous evils, rubella, itching, rheumatism and tetanus. Meanwhile, it is an important component of the commonly used anti-allergy compound. It’s now widely used as an immuno-modulating agent in mixed herbal decoctions to treat inflammation. However, its mechanism of anti-allergy remains unknown. RS was found to reduce ear thickness, as well as the infiltration of eosinophils. The proliferation of T lymphocytes was inhibited significantly by RS, markedly decreased IFN-γ levels in the supernatant of cells cultured and serum were detected with the treatment of RS. RS significantly decreased the amount of DCs in the mouse lymph nodes, and inhibited the expression of CD4 0 and CD86. Meanwhile, T-bet mRNA expression was down remarkably regulated by RS. These results indicate that RS cures Th1-induced allergic skin inflammation by regulating Th1/Th2 balance with decreasing Th1 differentiation, which might be associated with DCs.

Keywords: allergic contact dermatitis, Radix saposhnikoviae, dendritic cells, T-bet, GATA-3, CD4+ CD25+ Foxp3+ treg cells

Procedia PDF Downloads 352
606 Modeling the Saltatory Conduction in Myelinated Axons by Order Reduction

Authors: Ruxandra Barbulescu, Daniel Ioan, Gabriela Ciuprina

Abstract:

The saltatory conduction is the way the action potential is transmitted along a myelinated axon. The potential diffuses along the myelinated compartments and it is regenerated in the Ranvier nodes due to the ion channels allowing the flow across the membrane. For an efficient simulation of populations of neurons, it is important to use reduced order models both for myelinated compartments and for Ranvier nodes and to have control over their accuracy and inner parameters. The paper presents a reduced order model of this neural system which allows an efficient simulation method for the saltatory conduction in myelinated axons. This model is obtained by concatenating reduced order linear models of 1D myelinated compartments and nonlinear 0D models of Ranvier nodes. The models for the myelinated compartments are selected from a series of spatially distributed models developed and hierarchized according to their modeling errors. The extracted model described by a nonlinear PDE of hyperbolic type is able to reproduce the saltatory conduction with acceptable accuracy and takes into account the finite propagation speed of potential. Finally, this model is again reduced in order to make it suitable for the inclusion in large-scale neural circuits.

Keywords: action potential, myelinated segments, nonlinear models, Ranvier nodes, reduced order models, saltatory conduction

Procedia PDF Downloads 133
605 Tuberculosis in Patients with HIV-Infection in Russia: Cohort Study over the Period of 2015-2016 Years

Authors: Marina Nosik, Irina Rymanova, Konstantin Ryzhov, Joan Yarovaya, Alexander Sobkin

Abstract:

Tuberculosis (TB) associated with HIV is one of the top causes of death worldwide. However, early detection and treatment of TB in HIV-infected individuals significantly reduces the risk of developing severe forms of TB and mortality. The goal of the study was to analyze the peculiarities of TB associated with HIV infection. Over the period of 2015-2016 a retrospective cohort study was conducted among 377 patients with TB/HIV co-infection who attended the Moscow Tuberculosis Clinic. The majority of the patients was male (64,5%). The median age was: men 37,9 (24÷62) and women 35,4 (22÷72) years. The most prevalent age group was 30-39 years both for men and women (73,3% and 54,7%, respectively). The ratio of patients in age group 50-59 and senior was 3,9%. Socioeconomic status of patients was rather low: only 2.3% of patients had a university degree; 76,1% was unemployed (of whom 21,7% were disabled). Most patients had disseminated pulmonary tuberculosis in the phase of infiltration/ decay (41,5%). The infiltrative TB was detected in 18,9% of patients; 20,1% patients had tuberculosis of intrathoracic lymph nodes. The occurrence of MDR-TB was 16,8% and XDR-TB – 17,9%. The number of HIV-positive patients with newly diagnosed TB was n=261(69,2%). The active TB-form (MbT+) among new TB/HIV cases was 44,7 %. The severe clinical forms of TB and a high TB incidence rate among HIV-infected individuals alongside with a large number of cases of newly diagnosed tuberculosis, indicate the need for more intense interaction with TB services for timely diagnosis of TB which will optimize treatment outcomes.

Keywords: HIV, tuberculosis (TB), TB associated with HIV, multidrug-resistant TB (MDR-TB)

Procedia PDF Downloads 210
604 Comparative Hematological Analysis of Blood Profile in Experimentally Infected with Trichinella spiralis, Trichinella britovi and Trichinella pseudospiralis Mice

Authors: Valeria T. Dilcheva, Svetlozara L. Petkova, Ivelin Vladov

Abstract:

Trichinellosis is a food-borne parasitic disease caused by nematodes of the genus Trichinella which are zoonotic parasites with cosmopolitan distribution and major socio-economic importance. Human infection is acquired through consumption of undercooked meat from domestic or wild animal. Penetration of Trichinella larvae into striated skeletal muscle cells results in ultrastructural and metabolic changes. Migration of larvae causes the typical symptoms and signs of the disease. The severity of the symptoms depends on the number of ingested Trichinella larvae and the immune response of the host. Eosinophilia is present, with few exceptions, in most cases of human trichinellosis, inasmuch as it is the earliest and most important host response. Even in human asymptomatic cases, increases in eosinophilia of up to 15% have been observed. Eosinophilia appears at an early stage of infection between the second and fifth weeks of infection. By 2005 it was considered that only two species of Trichinella genus were found in the country. After routine trichinelloscopy procedure disseminated single muscle larvae in samples of wild boars and badger were PCR-identified as T. pseudospiralis. The study aimed to observed hematological changes occurring during experimentally induced infection with Trichinella spiralis, T. britovi and T. pseudospiralis in mice. We performed hematological blood profile, tracking 15 blood indicators. In statistical analysis made by Two-way ANOVA, there were significant differences of HGB, MCHC, PLT, Lymph%, Gran% in all three types of trichinellosis compared to control animals. Capsule-forming T. spiralis showed statistically significant differences in HGB, MCHC, Lymph% and PLT compared to the other two species. Non capsule-forming T. pseudospiralis showed statistically significant differences in Lymph%, Gran% relative to the control and in Gran% relative to T. spiralis. It appears rather substantial the process of capsule formation for prolonged immune response and retention of high content of percentage of lymphocytes(Lymph%) and low of granulocyte(Gran%) in T. pseudospiralis, which is contrary to studies for T. spiralis and eosinophilia. Studies and analyzes of some specific blood profile parameters can provide additional data in favor of early diagnosis and adequate treatment as well as provide a better understanding of acute and chronic trichinosis.

Keywords: hematological test, T. britovi, T. spiralis, T. pseudospiralis

Procedia PDF Downloads 137
603 Investigation of Clustering Algorithms Used in Wireless Sensor Networks

Authors: Naim Karasekreter, Ugur Fidan, Fatih Basciftci

Abstract:

Wireless sensor networks are networks in which more than one sensor node is organized among themselves. The working principle is based on the transfer of the sensed data over the other nodes in the network to the central station. Wireless sensor networks concentrate on routing algorithms, energy efficiency and clustering algorithms. In the clustering method, the nodes in the network are divided into clusters using different parameters and the most suitable cluster head is selected from among them. The data to be sent to the center is sent per cluster, and the cluster head is transmitted to the center. With this method, the network traffic is reduced and the energy efficiency of the nodes is increased. In this study, clustering algorithms were examined in terms of clustering performances and cluster head selection characteristics to try to identify weak and strong sides. This work is supported by the Project 17.Kariyer.123 of Afyon Kocatepe University BAP Commission.

Keywords: wireless sensor networks (WSN), clustering algorithm, cluster head, clustering

Procedia PDF Downloads 475
602 Security in Resource Constraints Network Light Weight Encryption for Z-MAC

Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy

Abstract:

Wireless sensor network was formed by a combination of nodes, systematically it transmitting the data to their base stations, this transmission data can be easily compromised if the limited processing power and the data consistency from these nodes are kept in mind; there is always a discussion to address the secure data transfer or transmission in actual time. This will present a mechanism to securely transmit the data over a chain of sensor nodes without compromising the throughput of the network by utilizing available battery resources available in the sensor node. Our methodology takes many different advantages of Z-MAC protocol for its efficiency, and it provides a unique key by sharing the mechanism using neighbor node MAC address. We present a light weighted data integrity layer which is embedded in the Z-MAC protocol to prove that our protocol performs well than Z-MAC when we introduce the different attack scenarios.

Keywords: hybrid MAC protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node dataprocessing, Z-MAC

Procedia PDF Downloads 120
601 Comparison of the Curvizigzag Incision with Transverse Stewart Incision in Women Undergoing Modified Radical Mastectomy for Carcinoma Breast

Authors: John Joseph S. Martis, Rohanchandra R. Gatty, Aaron Jose Fernandes, Rahul P. Nambiar

Abstract:

Introduction: Surgery for breast cancer is either mastectomy or breast conservation surgery. The most commonly used incision for modified radical mastectomy is the transverse Stewart incision. But this incision may have the disadvantage of causing disparity between the closure lines of superior and inferior skin flaps in mastectomy and can cause overhanging of soft tissue below and behind the axilla. The curvizigzag incision, on principle, may help in this regard and can prevent scar migration beyond the anterior axillary line. This study aims to compare the two incisions in this regard. Methods: 100 patients with cancer of breast were included in the study after satisfying inclusion and exclusion criteria. They underwent surgery at Father Muller Medical College, Mangalore, India, between November 2019 to September 2021. The patients were divided into two groups. Group A patients were subjected to modified radical mastectomy with curvizigzag incision and group B patients with transverse Stewart incision. Results: Seroma on postoperative day1, day 2 was 0% in both the groups. Seroma on postoperative day 30 was present in 14% of patients in group B. 60% of patients in group B had sag of soft tissue below and behind the axilla, and none of the patients in group A had this problem. In 64% of the patients in group B, the incision crossed the anterior axillary fold, 64% of the patients in group B had tension in the incision site while approximation of the skin flaps. Conclusion: Curvizigzag incision is statistically better with lesser complications when compared to the transverse Stewart incision for modified radical mastectomy for carcinoma breast.

Keywords: breast cancer, curvizigzag incision, transverse Stewart incision, seroma, modified radical mastectomy

Procedia PDF Downloads 67
600 Performance Evaluation of Clustered Routing Protocols for Heterogeneous Wireless Sensor Networks

Authors: Awatef Chniguir, Tarek Farah, Zouhair Ben Jemaa, Safya Belguith

Abstract:

Optimal routing allows minimizing energy consumption in wireless sensor networks (WSN). Clustering has proven its effectiveness in organizing WSN by reducing channel contention and packet collision and enhancing network throughput under heavy load. Therefore, nowadays, with the emergence of the Internet of Things, heterogeneity is essential. Stable election protocol (SEP) that has increased the network stability period and lifetime is the first clustering protocol for heterogeneous WSN. SEP and its descendants, namely SEP, Threshold Sensitive SEP (TSEP), Enhanced TSEP (ETSSEP) and Current Energy Allotted TSEP (CEATSEP), were studied. These algorithms’ performance was evaluated based on different metrics, especially first node death (FND), to compare their stability. Simulations were conducted on the MATLAB tool considering two scenarios: The first one demonstrates the fraction variation of advanced nodes by setting the number of total nodes. The second considers the interpretation of the number of nodes while keeping the number of advanced nodes permanent. CEATSEP outperforms its antecedents by increasing stability and, at the same time, keeping a low throughput. It also operates very well in a large-scale network. Consequently, CEATSEP has a useful lifespan and energy efficiency compared to the other routing protocol for heterogeneous WSN.

Keywords: clustering, heterogeneous, stability, scalability, IoT, WSN

Procedia PDF Downloads 103
599 An Iberian Study about Location of Parking Areas for Dangerous Goods

Authors: María Dolores Caro, Eugenio M. Fedriani, Ángel F. Tenorio

Abstract:

When lorries transport dangerous goods, there exist some legal stipulations in the European Union for assuring the security of the rest of road users as well as of those goods being transported. At this respect, lorry drivers cannot park in usual parking areas, because they must use parking areas with special conditions, including permanent supervision of security personnel. Moreover, drivers are compelled to satisfy additional regulations about resting and driving times, which involve in the practical possibility of reaching the suitable parking areas under these time parameters. The “European Agreement concerning the International Carriage of Dangerous Goods by Road” (ADR) is the basic regulation on transportation of dangerous goods imposed under the recommendations of the United Nations Economic Commission for Europe. Indeed, nowadays there are no enough parking areas adapted for dangerous goods and no complete study have suggested the best locations to build new areas or to adapt others already existing to provide the areas being necessary so that lorry drivers can follow all the regulations. The goal of this paper is to show how many additional parking areas should be built in the Iberian Peninsula to allow that lorry drivers may park in such areas under their restrictions in resting and driving time. To do so, we have modeled the problem via graph theory and we have applied a new efficient algorithm which determines an optimal solution for the problem of locating new parking areas to complement those already existing in the ADR for the Iberian Peninsula. The solution can be considered minimal since the number of additional parking areas returned by the algorithm is minimal in quantity. Obviously, graph theory is a natural way to model and solve the problem here proposed because we have considered as nodes: the already-existing parking areas, the loading-and-unloading locations and the bifurcations of roads; while each edge between two nodes represents the existence of a road between both nodes (the distance between nodes is the edge's weight). Except for bifurcations, all the nodes correspond to parking areas already existing and, hence, the problem corresponds to determining the additional nodes in the graph such that there are less up to 100 km between two nodes representing parking areas. (maximal distance allowed by the European regulations).

Keywords: dangerous goods, parking areas, Iberian peninsula, graph-based modeling

Procedia PDF Downloads 557
598 Evaluation of Routing Protocols in Mobile Adhoc Networks

Authors: Anu Malhotra

Abstract:

An Ad-hoc network is one that is an autonomous, self configuring network made up of mobile nodes connected via wireless links. Ad-hoc networks often consist of nodes, mobile hosts (MH) or mobile stations (MS, also serving as routers) connected by wireless links. Different routing protocols are used for data transmission in between the nodes in an adhoc network. In this paper two protocols (OLSR and AODV) are analyzed on the basis of two parameters i.e. time delay and throughput with different data rates. On the basis of these analysis, we observed that with same data rate, AODV protocol is having more time delay than the OLSR protocol whereas throughput for the OLSR protocol is less compared to the AODV protocol.

Keywords: routing adhoc, mobile hosts, mobile stations, OLSR protocol, AODV protocol

Procedia PDF Downloads 476
597 Clinicopathological Findings of Partuberclosis in Camels: Possible Steps for Control Strategy

Authors: A. M. Almujalli, G. M. Al-Ghamdi

Abstract:

Mycobacterium avium subspecies paratuberculosis causes paratuberculosis, a chronic debilitating granulomatous enteritis, in camels as well as domestic and wild ruminants. The clinical manifestation of the disease in camel is not well characterized, therefore this study was aimed to investigate the clinical and pathological pictures of camels that are suffering from partuberculosis. Twelve young camels that were presented to the Veterinary Teaching Hospital, King Faisal University were investigated. Clinical and pathological examination were performed. The results revealed highly significant increase in creatinine, blood urea nitrogen, magnesium, AST and ALT in diseased camels, while glucose, total protein and albumin were highly significantly decreased in diseased camels when compared to healthy ones. Post-mortem testing indicated thickening, corrugation of the intestinal wall, folded mucosa, enlarged and oedemated ileocaecal and mesenteric lymph nodes. The microscopic findings detected short, blunt and distorted intestinal villi with hyperactive goblet cells of the villi and the crypts of lieberkuhn contained mucin droplets. The lamina propria was heavily infiltrated with mononuclear cells mostly macrophages. This clinical picture of paratuberculosis may be used to initiate control strategy to limit the spread of the disease in camel herds.

Keywords: camel, partuberclosis, control, Saudi Arabia

Procedia PDF Downloads 169
596 Multi-Level Clustering Based Congestion Control Protocol for Cyber Physical Systems

Authors: Manpreet Kaur, Amita Rani, Sanjay Kumar

Abstract:

The Internet of Things (IoT), a cyber-physical paradigm, allows a large number of devices to connect and send the sensory data in the network simultaneously. This tremendous amount of data generated leads to very high network load consequently resulting in network congestion. It further amounts to frequent loss of useful information and depletion of significant amount of nodes’ energy. Therefore, there is a need to control congestion in IoT so as to prolong network lifetime and improve the quality of service (QoS). Hence, we propose a two-level clustering based routing algorithm considering congestion score and packet priority metrics that focus on minimizing the network congestion. In the proposed Priority based Congestion Control (PBCC) protocol the sensor nodes in IoT network form clusters that reduces the amount of traffic and the nodes are prioritized to emphasize important data. Simultaneously, a congestion score determines the occurrence of congestion at a particular node. The proposed protocol outperforms the existing Packet Discard Network Clustering (PDNC) protocol in terms of buffer size, packet transmission range, network region and number of nodes, under various simulation scenarios.

Keywords: internet of things, cyber-physical systems, congestion control, priority, transmission rate

Procedia PDF Downloads 284
595 Examining the Relational Approach Elements in City Development Strategy of Qazvin 2031

Authors: Majid Etaati, Hamid Majedi

Abstract:

Relational planning approach proposed by Patsy Healey goes beyond the physical proximity and emphasizes social proximity. This approach stresses the importance of nodes and flows between nodes. Current plans in European cities have incrementally incorporated this approach, but urban plans in Iran have still stayed very detailed and rigid. In response to the weak evaluation results of the comprehensive planning approach in Qazvin, the local authorities applied the City Development Strategy (CDS) to cope with new urban challenges. The paper begins with an explanation of relational planning and suggests that Healey gives urban planners about spatial strategies and then it surveys relational factors in CDS of Qazvin. This study analyzes the extent which CDS of Qazvin have highlighted nodes, flows, and dynamics. In the end, the study concludes that there is a relational understanding of urban dynamics in the plan, but it is weak.

Keywords: relational, dynamics, city development strategy, urban planning, Qazvin

Procedia PDF Downloads 118
594 Emerging Research Trends in Routing Protocol for Wireless Sensor Network

Authors: Subhra Prosun Paul, Shruti Aggarwal

Abstract:

Now a days Routing Protocol in Wireless Sensor Network has become a promising technique in the different fields of the latest computer technology. Routing in Wireless Sensor Network is a demanding task due to the different design issues of all sensor nodes. Network architecture, no of nodes, traffic of routing, the capacity of each sensor node, network consistency, service value are the important factor for the design and analysis of Routing Protocol in Wireless Sensor Network. Additionally, internal energy, the distance between nodes, the load of sensor nodes play a significant role in the efficient routing protocol. In this paper, our intention is to analyze the research trends in different routing protocols of Wireless Sensor Network in terms of different parameters. In order to explain the research trends on Routing Protocol in Wireless Sensor Network, different data related to this research topic are analyzed with the help of Web of Science and Scopus databases. The data analysis is performed from global perspective-taking different parameters like author, source, document, country, organization, keyword, year, and a number of the publication. Different types of experiments are also performed, which help us to evaluate the recent research tendency in the Routing Protocol of Wireless Sensor Network. In order to do this, we have used Web of Science and Scopus databases separately for data analysis. We have observed that there has been a tremendous development of research on this topic in the last few years as it has become a very popular topic day by day.

Keywords: analysis, routing protocol, research trends, wireless sensor network

Procedia PDF Downloads 191
593 Exploring Data Stewardship in Fog Networking Using Blockchain Algorithm

Authors: Ruvaitha Banu, Amaladhithyan Krishnamoorthy

Abstract:

IoT networks today solve various consumer problems, from home automation systems to aiding in driving autonomous vehicles with the exploration of multiple devices. For example, in an autonomous vehicle environment, multiple sensors are available on roads to monitor weather and road conditions and interact with each other to aid the vehicle in reaching its destination safely and timely. IoT systems are predominantly dependent on the cloud environment for data storage, and computing needs that result in latency problems. With the advent of Fog networks, some of this storage and computing is pushed to the edge/fog nodes, saving the network bandwidth and reducing the latency proportionally. Managing the data stored in these fog nodes becomes crucial as it might also store sensitive information required for a certain application. Data management in fog nodes is strenuous because Fog networks are dynamic in terms of their availability and hardware capability. It becomes more challenging when the nodes in the network also live a short span, detaching and joining frequently. When an end-user or Fog Node wants to access, read, or write data stored in another Fog Node, then a new protocol becomes necessary to access/manage the data stored in the fog devices as a conventional static way of managing the data doesn’t work in Fog Networks. The proposed solution discusses a protocol that acts by defining sensitivity levels for the data being written and read. Additionally, a distinct data distribution and replication model among the Fog nodes is established to decentralize the access mechanism. In this paper, the proposed model implements stewardship towards the data stored in the Fog node using the application of Reinforcement Learning so that access to the data is determined dynamically based on the requests.

Keywords: IoT, fog networks, data stewardship, dynamic access policy

Procedia PDF Downloads 31
592 ZigBee Wireless Sensor Nodes with Hybrid Energy Storage System Based on Li-Ion Battery and Solar Energy Supply

Authors: Chia-Chi Chang, Chuan-Bi Lin, Chia-Min Chan

Abstract:

Most ZigBee sensor networks to date make use of nodes with limited processing, communication, and energy capabilities. Energy consumption is of great importance in wireless sensor applications as their nodes are commonly battery-driven. Once ZigBee nodes are deployed outdoors, limited power may make a sensor network useless before its purpose is complete. At present, there are two strategies for long node and network lifetime. The first strategy is saving energy as much as possible. The energy consumption will be minimized through switching the node from active mode to sleep mode and routing protocol with ultra-low energy consumption. The second strategy is to evaluate the energy consumption of sensor applications as accurately as possible. Erroneous energy model may render a ZigBee sensor network useless before changing batteries. In this paper, we present a ZigBee wireless sensor node with four key modules: a processing and radio unit, an energy harvesting unit, an energy storage unit, and a sensor unit. The processing unit uses CC2530 for controlling the sensor, carrying out routing protocol, and performing wireless communication with other nodes. The harvesting unit uses a 2W solar panel to provide lasting energy for the node. The storage unit consists of a rechargeable 1200 mAh Li-ion battery and a battery charger using a constant-current/constant-voltage algorithm. Our solution to extend node lifetime is implemented. Finally, a long-term sensor network test is used to exhibit the functionality of the solar powered system.

Keywords: ZigBee, Li-ion battery, solar panel, CC2530

Procedia PDF Downloads 349
591 An Energy Efficient Clustering Approach for Underwater ‎Wireless Sensor Networks

Authors: Mohammad Reza Taherkhani‎

Abstract:

Wireless sensor networks that are used to monitor a special environment, are formed from a large number of sensor nodes. The role of these sensors is to sense special parameters from ambient and to make a connection. In these networks, the most important challenge is the management of energy usage. Clustering is one of the methods that are broadly used to face this challenge. In this paper, a distributed clustering protocol based on learning automata is proposed for underwater wireless sensor networks. The proposed algorithm that is called LA-Clustering forms clusters in the same energy level, based on the energy level of nodes and the connection radius regardless of size and the structure of sensor network. The proposed approach is simulated and is compared with some other protocols with considering some metrics such as network lifetime, number of alive nodes, and number of transmitted data. The simulation results demonstrate the efficiency of the proposed approach.

Keywords: underwater sensor networks, clustering, learning automata, energy consumption

Procedia PDF Downloads 336
590 Simulation Analysis of Optical Add Drop Multiplexer in a Ring Network

Authors: Surinder Singh, Meenakshi

Abstract:

In this paper MZI-FBG based optical add drop multiplexer is designed and its performance is analyzed in the ring network. In the ring network nodes are composed of optical add drop multiplexer, transmitter and receiver. OADM is used to add or drop any frequency at intermediate nodes without affecting other channels. In this paper the performance of the ring network is carried out by varying various kinds of fiber with or without amplifiers.

Keywords: OADM, ring network, MZI-FBG, transmitter

Procedia PDF Downloads 545
589 Variations in Breast Aesthetic Reconstruction Rates between Asian and Caucasian Patients Post Mastectomy in a UK Tertiary Breast Referral Centre: A Five-Year Institutional Review

Authors: Wisam Ismail, Chole Wright, Elizabeth Baker, Cathy Tait, Mohamed Salhab, Richard Linforth

Abstract:

Background: Post-mastectomy breast reconstruction is an important treatment option for women with breast cancer with psychosocial, emotional and quality of life benefits. Despite this, Asian patients are one-fifth as likely as Caucasian patients to undergo reconstruction after mastectomy. Aim: This study aimed to assess the difference in breast reconstruction rates between Asian and Caucasian patients treated at Bradford Teaching Hospitals between May 2011 – December 2015.The long-term goal is to equip healthcare professionals to improve breast cancer treatment outcome by increasing breast reconstruction rates in this sub-population. Methods: All patients undergoing mastectomy were identified using a prospectively collected departmental database. Further data was obtained via retrospective electronic case note review. Bradford city population is about 530.000 by the end of 2015, with 67.44% of the city's population was White ethnic groups and 26.83% Asian Ethnic Groups (UK population consensus). The majority of Asian population speaks Urdu, hence an Urdu speaking breast care nurse was appointed to facilitate communications and deliver a better understanding of the reconstruction options and pathways. Statistical analysis was undertaken using the SAS program. Patients were stratified by age, self-reported ethnicity, axillary surgery and reconstruction. Relative odds were calculated using univariate and multivariate logistic regression analyses with adjustment for known confounders. An Urdu speaking breast care nurse was employed throughout this period to facilitate communication and patient decision making. Results: 506 patients underwent Mastectomy over 5 years. 72 (14%) Asian v. 434 (85%) Caucasian. Overall median age is 64 years (SD1.1). Asian median age is 62 (SD0.9), versus Caucasian 65 (SD1.2). Total axillary clearance rate was 30% (42% Asian v.30% Caucasian). Overall reconstruction rate was 126 patients (28.9%).Only 6 of 72 Asian patients (<1%) underwent breast reconstruction versus 121of 434 Caucasian (28%) (p < 0.04), Odds ratio 0.68, (95% confidence interval 0.57-0.79). Conclusions: There is a significant difference in post-mastectomy reconstruction rates between Asian and Caucasian patients. This difference is likely to be multi-factorial. Higher rates of axillary clearance in Asian patients might suggest later disease presentation and/or higher rates of subsequent adjuvant therapy, both of which, can impact on the suitability of breast reconstruction. Strategies aimed at reducing racial disparities in breast reconstruction should include symptom awareness to enable earlier presentation and facilitated communication to ensure informed decision-making.

Keywords: aesthetic, Asian, breast, reconstruction

Procedia PDF Downloads 256
588 The Impact of Intestinal Ischaemia-Reperfusion Injury upon the Biological Function of Mesenteric Lymph

Authors: Beth Taylor, Kojima Mituaki, Atsushi Senda, Koji Morishita, Yasuhiro Otomo

Abstract:

Intestinal ischaemia-reperfusion injury drives systemic inflammation and organ failure following trauma/haemorrhagic shock (T/HS), through the release of pro-inflammatory mediators into the mesenteric lymph (ML). However, changes in the biological function of ML are not fully understood, and therefore, a specific model of intestinal ischaemia-reperfusion injury is required to obtain ML for the study of its biological function upon inflammatory cells. ML obtained from a model of intestinal ischaemia-reperfusion injury was used to assess biological function upon inflammatory cells and investigate changes in the biological function of individual ML components. An additional model was used to determine the effect of vagal nerve stimulation (VNS) upon biological function. Rat ML was obtained by mesenteric lymphatic duct cannulation before and after occlusion of the superior mesenteric artery (SMAO). ML was incubated with human polymorphonuclear neutrophils (PMNs), monocytes and lymphocytes, and the biological function of these cells was assessed. ML was then separated into supernatant, exosome and micro-vesicle components, and biological activity was compared in monocytes. A model with an additional VNS phase was developed, in which the right cervical vagal nerve was exposed and stimulated, and ML collected for comparison of biological function with the conventional model. The biological function of ML was altered by intestinal ischaemia-reperfusion injury, increasing PMN activation, monocyte activation, and lymphocyte apoptosis. Increased monocyte activation was only induced by the exosome component of ML, with no significant changes induced by the supernatant or micro-vesicle components. VNS partially attenuated monocyte activation, but no attenuation of PMN activation was observed. Intestinal ischaemia-reperfusion injury induces changes in the biological function of ML upon both innate and adaptive inflammatory cells, supporting the role of intestinal ischaemia-reperfusion injury in driving systemic inflammation following T/HS. The exosome component of ML appears to be critical to the transport of pro-inflammatory mediators in ML. VNS partially attenuates changes in innate inflammatory cell biological activity observed, presenting possibilities for future novel treatment development in multiple organ failure patients.

Keywords: exosomes, inflammation, intestinal ischaemia, mesenteric lymph, vagal stimulation

Procedia PDF Downloads 106
587 A Memetic Algorithm Approach to Clustering in Mobile Wireless Sensor Networks

Authors: Masood Ahmad, Ataul Aziz Ikram, Ishtiaq Wahid

Abstract:

Wireless sensor network (WSN) is the interconnection of mobile wireless nodes with limited energy and memory. These networks can be deployed formany critical applications like military operations, rescue management, fire detection and so on. In flat routing structure, every node plays an equal role of sensor and router. The topology may change very frequently due to the mobile nature of nodes in WSNs. The topology maintenance may produce more overhead messages. To avoid topology maintenance overhead messages, an optimized cluster based mobile wireless sensor network using memetic algorithm is proposed in this paper. The nodes in this network are first divided into clusters. The cluster leaders then transmit data to that base station. The network is validated through extensive simulation study. The results show that the proposed technique has superior results compared to existing techniques.

Keywords: WSN, routing, cluster based, meme, memetic algorithm

Procedia PDF Downloads 449
586 Modular Power Bus for Space Vehicles (MPBus)

Authors: Eduardo Remirez, Luis Moreno

Abstract:

The rapid growth of the private satellite launchers sector is leading the space race. Hence, with the privatization of the sector, all the companies are racing for a more efficient and reliant way to set satellites in orbit. Having detected the current needs for power management in the launcher vehicle industry, the Modular Power Bus is proposed as a technology to revolutionize power management in current and future Launcher Vehicles. The MPBus Project is committed to develop a new power bus architecture combining ejectable batteries with the main bus through intelligent nodes. These nodes are able to communicate between them and a battery controller using an improved, data over DC line technology, expected to reduce the total weight in two main areas: improving the use of the batteries and reducing the total weight due to harness. This would result in less weight for each launch stage increasing the operational satellite payload and reducing cost. These features make the system suitable for a number of launchers.

Keywords: modular power bus, Launcher vehicles, ejectable batteries, intelligent nodes

Procedia PDF Downloads 448
585 A Learning Automata Based Clustering Approach for Underwater ‎Sensor Networks to Reduce Energy Consumption

Authors: Motahareh Fadaei

Abstract:

Wireless sensor networks that are used to monitor a special environment, are formed from a large number of sensor nodes. The role of these sensors is to sense special parameters from ambient and to make connection. In these networks, the most important challenge is the management of energy usage. Clustering is one of the methods that are broadly used to face this challenge. In this paper, a distributed clustering protocol based on learning automata is proposed for underwater wireless sensor networks. The proposed algorithm that is called LA-Clustering forms clusters in the same energy level, based on the energy level of nodes and the connection radius regardless of size and the structure of sensor network. The proposed approach is simulated and is compared with some other protocols with considering some metrics such as network lifetime, number of alive nodes, and number of transmitted data. The simulation results demonstrate the efficiency of the proposed approach.

Keywords: clustering, energy consumption‎, learning automata, underwater sensor networks

Procedia PDF Downloads 294
584 A Deletion-Cost Based Fast Compression Algorithm for Linear Vector Data

Authors: Qiuxiao Chen, Yan Hou, Ning Wu

Abstract:

As there are deficiencies of the classic Douglas-Peucker Algorithm (DPA), such as high risks of deleting key nodes by mistake, high complexity, time consumption and relatively slow execution speed, a new Deletion-Cost Based Compression Algorithm (DCA) for linear vector data was proposed. For each curve — the basic element of linear vector data, all the deletion costs of its middle nodes were calculated, and the minimum deletion cost was compared with the pre-defined threshold. If the former was greater than or equal to the latter, all remaining nodes were reserved and the curve’s compression process was finished. Otherwise, the node with the minimal deletion cost was deleted, its two neighbors' deletion costs were updated, and the same loop on the compressed curve was repeated till the termination. By several comparative experiments using different types of linear vector data, the comparison between DPA and DCA was performed from the aspects of compression quality and computing efficiency. Experiment results showed that DCA outperformed DPA in compression accuracy and execution efficiency as well.

Keywords: Douglas-Peucker algorithm, linear vector data, compression, deletion cost

Procedia PDF Downloads 215
583 Synchronization of Semiconductor Laser Networks

Authors: R. M. López-Gutiérrez, L. Cardoza-Avendaño, H. Cervantes-de Ávila, J. A. Michel-Macarty, C. Cruz-Hernández, A. Arellano-Delgado, R. Carmona-Rodríguez

Abstract:

In this paper, synchronization of multiple chaotic semiconductor lasers is achieved by appealing to complex system theory. In particular, we consider dynamical networks composed by semiconductor laser, as interconnected nodes, where the interaction in the networks are defined by coupling the first state of each node. An interesting case is synchronized with master-slave configuration in star topology. Nodes of these networks are modeled for the laser and simulated by Matlab. These results are applicable to private communication.

Keywords: chaotic laser, network, star topology, synchronization

Procedia PDF Downloads 536
582 Detecting and Secluding Route Modifiers by Neural Network Approach in Wireless Sensor Networks

Authors: C. N. Vanitha, M. Usha

Abstract:

In a real world scenario, the viability of the sensor networks has been proved by standardizing the technologies. Wireless sensor networks are vulnerable to both electronic and physical security breaches because of their deployment in remote, distributed, and inaccessible locations. The compromised sensor nodes send malicious data to the base station, and thus, the total network effectiveness will possibly be compromised. To detect and seclude the Route modifiers, a neural network based Pattern Learning predictor (PLP) is presented. This algorithm senses data at any node on present and previous patterns obtained from the en-route nodes. The eminence of any node is upgraded by their predicted and reported patterns. This paper propounds a solution not only to detect the route modifiers, but also to seclude the malevolent nodes from the network. The simulation result proves the effective performance of the network by the presented methodology in terms of energy level, routing and various network conditions.

Keywords: neural networks, pattern learning, security, wireless sensor networks

Procedia PDF Downloads 381