Academic literature on the topic 'Failed nodes'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Failed nodes.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Failed nodes"

1

Kim, Kwangsoo, Jae-Yeon Jin, and Seong-il Jin. "Classification between Failed Nodes and Left Nodes in Mobile Asset Tracking Systems †." Sensors 16, no. 2 (February 18, 2016): 240. http://dx.doi.org/10.3390/s16020240.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Shudong, Yanshan Chen, Xiaobo Wu, Xiaochun Cheng, and Zhihong Tian. "Power Grid-Oriented Cascading Failure Vulnerability Identifying Method Based on Wireless Sensors." Journal of Sensors 2021 (June 26, 2021): 1–12. http://dx.doi.org/10.1155/2021/8820413.

Full text
Abstract:
In our paper, we study the vulnerability in cascading failures of the real-world network (power grid) under intentional attacks. Here, we use three indexes ( B , K , k -shell) to measure the importance of nodes; that is, we define three attacks, respectively. Under these attacks, we measure the process of cascade effect in network by the number of avalanche nodes, the time steps, and the speed of the cascade propagation. Also, we define the node’s bearing capacity as a tolerant parameter to study the robustness of the network under three attacks. Taking the power grid as an example, we have obtained a good regularity of the collapse of the network when the node’s affordability is low. In terms of time and speed, under the betweenness-based attacks, the network collapses faster, but for the number of avalanche nodes, under the degree-based attack, the number of the failed nodes is highest. When the nodes’ bearing capacity becomes large, the regularity of the network’s performances is not obvious. The findings can be applied to identify the vulnerable nodes in real networks such as wireless sensor networks and improve their robustness against different attacks.
APA, Harvard, Vancouver, ISO, and other styles
3

Panda, Sanjaya Kumar, and Saswati Naik. "An Efficient Data Replication Algorithm for Distributed Systems." International Journal of Cloud Applications and Computing 8, no. 3 (July 2018): 60–77. http://dx.doi.org/10.4018/ijcac.2018070105.

Full text
Abstract:
This article describes how data replication plays an important role in distributed systems. It primarily focuses on the redundancy of data at two or more nodes, to achieve both fault tolerance and improved performance. Therefore, many researchers have proposed various data replication algorithms to manage the redundancy of data. However, they have not considered the faults that are associated with the nodes, such as permanent, transient and intermittent. Moreover, they have not incorporated any recovery approach to rejoin the failed nodes. Therefore, the authors propose a data replication algorithm, called dynamic vote-based data replication (DVDR). The main contribution of DVDR is to consider all types of faults and rejoin the failed nodes. DVDR is based on dynamic vote assignment among the connected nodes, and referred as passive and non-hierarchical one. The authors perform rigorous analysis of DVDR and compare with an existing dynamic vote assignment algorithm. The result shows the efficacy of the proposed algorithm.
APA, Harvard, Vancouver, ISO, and other styles
4

Yu, Seog Kun, and Eon Kyeong Joo. "LDPC Decoding by Failed Check Nodes for Serial Concatenated Code." ETRI Journal 37, no. 1 (February 1, 2015): 54–60. http://dx.doi.org/10.4218/etrij.15.0114.0107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zou, Yi, and Krishnendu Chakrabarty. "Redundancy Analysis and a Distributed Self-Organization Protocol for Fault-Tolerant Wireless Sensor Networks." International Journal of Distributed Sensor Networks 3, no. 3 (July 2007): 243–72. http://dx.doi.org/10.1080/15501320600781078.

Full text
Abstract:
Sensor nodes in a distributed sensor network can fail due to a variety of reasons, e.g., harsh environmental conditions, sabotage, battery failure, and component wear-out. Since many wireless sensor networks are intended to operate in an unattended manner after deployment, failing nodes cannot be replaced or repaired during field operation. Therefore, by designing the network to be fault-tolerant, we can ensure that a wireless sensor network can perform its surveillance and tracking tasks even when some nodes in the network fail. In this paper, we describe a fault-tolerant self-organization scheme that designates a set of backup nodes to replace failed nodes and maintain a backbone for coverage and communication. The proposed scheme does not require a centralized server for monitoring node failures and for designating backup nodes to replace failed nodes. It operates in a fully distributed manner and it requires only localized communication. This scheme has been implemented on top of an energy-efficient self-organization technique for sensor networks. The proposed fault-tolerance-node selection procedure can tolerate a large number of node failures using only localized communication, without losing either sensing coverage or communication connectivity.
APA, Harvard, Vancouver, ISO, and other styles
6

WU, J. J., H. J. SUN, and Z. Y. GAO. "CAPACITY ASSIGNMENT MODEL TO DEFENSE CASCADING FAILURES." International Journal of Modern Physics C 20, no. 07 (July 2009): 991–99. http://dx.doi.org/10.1142/s0129183109014126.

Full text
Abstract:
How to alleviate the damages of cascading failures triggered by the overload of edges/nodes is common in complex networks. To describe the whole cascading failures process from edges overloading to nodes malfunctioning and the dynamic spanning clustering with the evolvement of traffic flow, we propose a capacity assignment model by introducing an equilibrium assignment rule of flow in artificially created scale-free traffic networks. Additionally, the capacity update rule of node is given in this paper. We show that a single failed edge may undergo the cascading failures of nodes, and a small failure has the potential to trigger a global cascade. It is suggested that enhancing the capacity of node is particularly important for the design of any complex network to defense the cascading failures. Meanwhile, it has very important theoretical significance and practical application worthiness in the development of effective methods to alleviate the damage of one or some failed edges/nodes.
APA, Harvard, Vancouver, ISO, and other styles
7

Jaenigen, Bernd, Gian Kayser, Berthold Steinke, and Oliver Thomusch. "Five-Year Long-Term Followup of a Primary Lymph node Gastrinoma: Is a Pancreaticoduodenectomy Justified?" Case Reports in Medicine 2009 (2009): 1–4. http://dx.doi.org/10.1155/2009/762791.

Full text
Abstract:
Background. Gastrinoma-positive lymph nodes and failed localization of the primary tumor during surgical exploration are described. Specialists suppose that these lymph nodes are metastases rather than a primary gastrinoma.Methods. Case report with a five-year long-term followup. A 60-year-old patient with an confirmed gastrinoma was treated in our department. All preoperative evaluations including somatostatin-receptor-scintigraphy and F-Dopa PET failed to localize the gastrinoma. Explorative laparotomy revealed a gastrinoma in two peripancreatic lymph nodes. Despite extensive intraoperative exploration, no primary gastrinoma could be detected in typical localization.Results. Over a period of 5 years, the patient's gastrin level stayed in the normal range and the patient seems to be completely cured.Conclusion. A prophylactic partial pancreatoduodenectomy is not indicated to avoid recurrence, since complete biochemical cure by local resection of the lymph node gastrinoma is possible.
APA, Harvard, Vancouver, ISO, and other styles
8

Nautiyal, Nisha, S. B. Singh, and Soni Bisht. "Analysis of reliability and its characteristics of a k-out-of-n network incorporating copula." International Journal of Quality & Reliability Management 37, no. 4 (March 2, 2020): 517–37. http://dx.doi.org/10.1108/ijqrm-08-2018-0224.

Full text
Abstract:
PurposeThe present paper focuses on the evaluation of reliability and its characteristics (Mean time to failure and Sensitivity) of a k-out-of-n network.Design/methodology/approachThe minimal cuts of the network have been evaluated for different nodes in this paper, using an algorithm. With the help of these cuts, reliability and its characteristics are obtained using Gumbel–Hougaard family of the copula.FindingsThe present paper proposes to compute the reliability and its measures of the k-out-of-n network using the minimal cuts and copula methodology. The completely failed nodes of the network have been repaired using Gumbel–Hougaard family of the copula.Originality/valueIn this paper, the reliability of a k-out-of-n network has been evaluated by first calculating k-out-of-n minimal cuts, and the failed nodes have also been repaired using Gumbel–Hougaard family of the copula, unlike as done in the past.
APA, Harvard, Vancouver, ISO, and other styles
9

Chae, Yee Soo, Soo Jung Lee, In Hee Lee, Jin Hyang Jung, Ho Yong Park, Jeeyeon Lee, Won Hwa Kim, and Hye Jung Kim. "Ultrasound-guided dual-localization for axillary nodes before and after neoadjuvant chemotherapy with clip and activated charcoal in breast cancer patients: A feasibility study." Journal of Clinical Oncology 37, no. 15_suppl (May 20, 2019): e12067-e12067. http://dx.doi.org/10.1200/jco.2019.37.15_suppl.e12067.

Full text
Abstract:
e12067 Background: We report on our experience of ultrasound (US)-guided dual-localization for axillary nodes before and after neoadjuvant chemotherapy (NAC) with clip and activated charcoal to guide axillary surgery in breast cancer patients. Methods: Between November 2017 and May 2018, a dual-localization procedure was performed under US guidance for the most suspicious axillary nodes noted at initial staging (before NAC, with clip) and restaging (after NAC, with activated charcoal) in 28 cytologically proven node-positive breast cancer patients. Patients underwent axillary sampling or dissection, which involved removing not only the sentinel nodes (SNs), but also clipped nodes (CNs) and tattooed nodes (TNs). Success (or failure) rates of biopsies of SNs, CNs, and TNs and inter-nodal concordance rates were determined. Sensitivities for the individual and combined biopsies were calculated. Results: SN biopsy failed in four patients (14%), whereas the CN biopsy failed in one patient (4%). All TNs were identified in the surgical field. Concordance rates were 79% for CNs–TNs, 63% for CNs–SNs, and 58% for TNs–SNs. Sensitivity for SN, CN, and TN biopsy was 73%, 67%, and 67%, respectively. Sensitivity was 80% for any combination of biopsies (SN plus CN, SN plus TN, SN plus CN plus TN). Conclusions: US-guided dual-localization of axillary nodes before and after NAC with clip and activated charcoal was a feasible approach that might facilitate more reliable nodal staging with less-invasive strategies in node-positive breast cancer patients.
APA, Harvard, Vancouver, ISO, and other styles
10

Khan, Muhammad Amir, Halabi Hasbullah, Babar Nazir, and Imran Ali Khan. "An Energy Efficient Simultaneous-Node Repositioning Algorithm for Mobile Sensor Networks." Scientific World Journal 2014 (2014): 1–14. http://dx.doi.org/10.1155/2014/785305.

Full text
Abstract:
Recently, wireless sensor network (WSN) applications have seen an increase in interest. In search and rescue, battlefield reconnaissance, and some other such applications, so that a survey of the area of interest can be made collectively, a set of mobile nodes is deployed. Keeping the network nodes connected is vital for WSNs to be effective. The provision of connectivity can be made at the time of startup and can be maintained by carefully coordinating the nodes when they move. However, if a node suddenly fails, the network could be partitioned to cause communication problems. Recently, several methods that use the relocation of nodes for connectivity restoration have been proposed. However, these methods have the tendency to not consider the potential coverage loss in some locations. This paper addresses the concerns of both connectivity and coverage in an integrated way so that this gap can be filled. A novel algorithm for simultaneous-node repositioning is introduced. In this approach, each neighbour of the failed node, one by one, moves in for a certain amount of time to take the place of the failed node, after which it returns to its original location in the network. The effectiveness of this algorithm has been verified by the simulation results.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Failed nodes"

1

Sakib, Kazi Muheymin-Us, and s3091580@rmit edu au. "Energy Balanced Sensor Node Organisation For Maximising Network Lifetime." RMIT University. Computer Science and Information Technology, 2008. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20080805.135709.

Full text
Abstract:
Recent advances in Micro-Electro-Mechanical Systems (MEMS) and low-power short-range radios have enabled rapid development of wireless sensor networks. Future sensor networks are anticipated to include hundreds or thousands of these devices in many applications, such as capturing multimedia content for surveillance, structural health monitoring, tracking of accidental chemical leaks, machine failures, earthquakes and intrusion detection. With the increase of sensor applications, a number of challenging problems related to the network protocol design has emerged - the most important ones relating to energy efficiency and lifetime maximisation. Techniques devised for sensor networks should deal with a large number of sensors distributed in the field. Wireless sensor nodes are deployed with limited energy reserves, so the networks should operate with minimum energy overhead. In fact, the network should take into account not only individual node's energy efficiency but also consider the global picture, because surviving nodes' energy reserves in a failed network are wasted energy. This thesis examines a node organisation technique to deal with the above challenges. The focus is on improving network lifetime via organising the nodes in a distributed and energy efficient manner. The main goal is lowering wasted energy via energy balancing and exploiting node redundancy in case of node failure. In particular, this thesis proposes Energy Balanced Clustering (EBC) method for node self-organisation where network tasks (such as data aggregation and data forwarding) are shifted to high-energy neighbours to reduce the energy consumption of low energy nodes. After showing how to extend network lifetime by energy balanced node organisation, the effect of redundant node deployments on network lifetime is addressed. Redundant nodes consume energy by performing unnecessary tasks so a method called Self-Calculated Redundancy Check (SCRC) is proposed to deactivate redundant nodes. A deactivated redundant node can be used as a replacement for a failed node. The Asynchronous Failed Sensor node Detection (AFSD) proposed in this thesis uses the data packets exchanged between neighbours to identify failed neighbours. To restore coverage for network holes caused by failed nodes, policies are given for re-activating redundant nodes. Detailed analytical analysis and simulation of the proposed methods demonstrate that by taking into account energy balancing, eliminating redundant tasks and replacing failed nodes sensor network lifetime can significantly be improved.
APA, Harvard, Vancouver, ISO, and other styles
2

Brasileiro, Francisco Vilar. "Constructing fail-controlled nodes for distributed systems : a software approach." Thesis, University of Newcastle Upon Tyne, 1995. http://hdl.handle.net/10443/1971.

Full text
Abstract:
Designing and implementing distributed systems which continue to provide specified services in the presence of processing site and communication failures is a difficult task. To facilitate their development, distributed systems have been built assuming that their underlying hardware components are Jail-controlled, i.e. present a well defined failure mode. However, if conventional hardware cannot provide the assumed failure mode, there is a need to build processing sites or nodes, and communication infra-structure that present the fail-controlled behaviour assumed. Coupling a number of redundant processors within a replicated node is a well known way of constructing fail-controlled nodes. Computation is replicated and executed simultaneously at each processor, and by employing suitable validation techniques to the outputs generated by processors (e.g. majority voting, comparison), outputs from faulty processors can be prevented from appearing at the application level. One way of constructing replicated nodes is by introducing hardwired mechanisms to couple replicated processors with specialised validation hardware circuits. Processors are tightly synchronised at the clock cycle level, and have their outputs validated by a reliable validation hardware. Another approach is to use software mechanisms to perform synchronisation of processors and validation of the outputs. The main advantage of hardware based nodes is the minimum performance overhead incurred. However, the introduction of special circuits may increase the complexity of the design tremendously. Further, every new microprocessor architecture requires considerable redesign overhead. Software based nodes do not present these problems, on the other hand, they introduce much bigger performance overheads to the system. In this thesis we investigate alternative ways of constructing efficient fail-controlled, software based replicated nodes. In particular, we present much more efficient order protocols, which are necessary for the implementation of these nodes. Our protocols, unlike others published to date, do not require processors' physical clocks to be explicitly synchronised. The main contribution of this thesis is the precise definition of the semantics of a software based Jail-silent node, along with its efficient design, implementation and performance evaluation.
APA, Harvard, Vancouver, ISO, and other styles
3

Liendo, sanchez Andreina. "Study of adaptation mechanisms of the wireless sensor nodes to the context for ultra-low power consumption." Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAT095/document.

Full text
Abstract:
L'Internet des objets (IoT) est annoncé comme la prochaine grande révolution technologique où des milliards d'appareils s'interconnecteront en utilisant les technologies d’Internet et permettront aux utilisateurs d'interagir avec le monde physique, permettant Smart Home, Smart Cities, tout intelligent. Les réseaux de capteurs sans fil (WSN) sont cruciales pour tourner la vision de l'IoT dans une réalité, mais pour que cela devienne réalité, beaucoup de ces dispositifs doivent être autonomes en énergie. Par conséquent, un défi majeur est de fournir une durée de vie de plusieurs années tout en alimentant les nœuds par batteries ou en utilisant l'énergie récoltée. Bluetooth Low Energy (BLE) a montré une efficacité énergétique et une robustesse supérieures à celles d'autres protocoles WSN bien connus, ce qui fait BLE un candidat solide pour la mise en œuvre dans des scénarios IoT. En outre, BLE est présent dans presque tous les smartphones, ce qui en fait une télécommande universelle omniprésente pour les maisons intelligentes, les bâtiments ou les villes. Néanmoins, l'amélioration de la performance BLE pour les cas typiques d'utilisation de l'IoT, où la durée de vie de la batterie de nombreuses années, est toujours nécessaire.Dans ce travail, nous avons évalué les performances de BLE en termes de latence et de consommation d'énergie sur la base de modèles analytiques afin d'optimiser ses performances et d'obtenir son niveau maximal d'efficacité énergétique sans modification de la spécification en premier lieu. À cette fin, nous avons proposé une classification des scénarios ainsi que des modes de fonctionnement pour chaque scénario. L'efficacité énergétique est atteinte pour chaque mode de fonctionnement en optimisant les paramètres qui sont affectés aux nœuds BLE pendant la phase de découverte du voisin. Cette optimisation des paramètres a été réalisée à partir d'un modèle énergétique extrait de l'état de la technique. Le modèle, à son tour, a été optimisé pour obtenir une latence et une consommation d'énergie quel que soit le comportement des nœuds à différents niveaux: application et communication. Puisqu'un nœud peut être le périphérique central à un niveau, alors qu'il peut être le périphérique à l'autre niveau en même temps, ce qui affecte la performance finale des nœuds.En outre, un nouveau modèle d'estimation de la durée de vie de la batterie a été présenté pour montrer l'impact réel de l'optimisation de la consommation énergétique sur la durée de vie des nœuds, de façon rapide (en termes de temps de simulation) et réaliste (en tenant compte des données empiriques). Les résultats de performance ont été obtenus dans notre simulateur Matlab basé sur le paradigme OOP, à travers l'utilisation de plusieurs cas de test IoT. En outre, le modèle de latence utilisé pour notre étude a été validé expérimentalement ainsi que l'optimisation des paramètres proposée, montrant une grande précision.Après avoir obtenu les meilleures performances possibles de BLE sans modification de la spécification, nous avons évalué les performances du protocole en implémentant le concept de Wake-Up radio (WuR), qui est un récepteur d’ultra-faible consommation et qui est en charge de détecter le canal de communication, en attente d'un signal adressé au nœud, puis réveiller la radio principale. Ainsi, la radio principale, qui consomme beaucoup plus d'énergie, peut rester en mode veille pendant de longues périodes et passer en mode actif uniquement pour la réception de paquets, économisant ainsi une quantité d'énergie considérable. Nous avons démontré que la durée de vie de BLE peut être significativement augmentée en implémentant une WuR et nous proposons une modification du protocole afin de rendre ce protocole compatible avec un mode de fonctionnement qui inclut une WuR. Pour cela, nous avons étudié l'état de l'art de la WuR et évalué la durée de vie des périphériques BLE lorsqu'une WuR sélectionnée est implémentée du côté master
The Internet of Things (IoT) is announced as the next big technological revolution where billions of devices will interconnect using Internet technologies and let users interact with the physical world, allowing Smart Home, Smart Cities, smart everything. Wireless Sensor Network (WSN) are crucial for turning the vision of IoT into a reality, but for this to come true, many of these devices need to be autonomous in energy. Hence, one major challenge is to provide multi-year lifetime while powered on batteries or using harvested energy. Bluetooth Low Energy (BLE) has shown higher energy efficiency and robustness than other well known WSN protocols, making it a strong candidate for implementation in IoT scenarios. Additionally, BLE is present in almost every smartphone, turning it into perfect ubiquitous remote control for smart homes, buildings or cities. Nevertheless, BLE performance improvement for typical IoT use cases, where battery lifetime should reach many years, is still necessary.In this work we evaluated BLE performance in terms of latency and energy consumption based on analytical models in order to optimize its performance and obtain its maximum level of energy efficiency without modification of the specification in a first place. For this purpose, we proposed a scenarios classification as well as modes of operation for each scenario. Energy efficiency is achieved for each mode of operation by optimizing the parameters that are assigned to the BLE nodes during the neighbor discovery phase. This optimization of the parameters was made based on an energy model extracted from the state of the art. The model, in turn, has been optimized to obtain latency and energy consumption regardless of the behavior of the nodes at different levels: application and communication. Since a node can be the central device at one level, while it can be the peripheral device at the other level at the same time, which affects the final performance of the nodes.In addition, a novel battery lifetime estimation model was presented to show the actual impact that energy consumption optimization have on nodes lifetime in a fast (in terms of simulation time) and realistic way (by taking into account empirical data). Performance results were obtained in our Matlab based simulator based on OOP paradigm, through the use of several IoT test cases. In addition, the latency model used for our investigation was experimentally validated as well as the proposed parameter optimization, showing a high accuracy.After obtaining the best performance possible of BLE without modification of the specification, we evaluated the protocol performance when implementing the concept of Wake-Up radio, which is an ultra low power receiver in charge on sensing the communication channel, waiting for a signal addressed to the node and then wake the main radio up. Thus, the main radio which consumes higher energy, can remain in sleep mode for long periods of time and switch to an active mode only for packet reception, therefore saving considerable amount of energy. We demonstrated that BLE lifetime can be significantly increased by implementing a Wake-Up radio and we propose a modification of the protocol in order to render this protocol compatible with an operating mode which includes a Wake-Up radio. For this, we studied the Wake-Up radio state of the art and evaluated BLE devices lifetime when a selected Wake-Up radio is implemented at the master side
APA, Harvard, Vancouver, ISO, and other styles
4

Harb, Hassan. "Conception du décodeur NB-LDPC à débit ultra-élevé." Thesis, Lorient, 2018. http://www.theses.fr/2018LORIS504/document.

Full text
Abstract:
Les codes correcteurs d’erreurs Non-Binaires Low Density Parity Check (NB-LDPC) sont connus pour avoir de meilleure performance que les codes LDPC binaires. Toutefois, la complexité de décodage des codes non-binaires est bien supérieure à celle des codes binaires. L’objectif de cette thèse est de proposer de nouveaux algorithmes et de nouvelles architectures matérielles de code NB-LDPC pour le décodage des NBLDPC. La première contribution de cette thèse consiste à réduire la complexité du nœud de parité en triant en amont ses messages d’entrées. Ce tri initial permet de rendre certains états très improbables et le matériel requis pour les traiter peut tout simplement être supprimé. Cette suppression se traduit directement par une réduction de la complexité du décodeur NB-LDPC, et ce, sans affecter significativement les performances de décodage. Un modèle d’architecture, appelée "architecture hybride" qui combine deux algorithmes de l’état de l’art ("l’Extended Min Sum" et le "Syndrome Based") a été proposé afin d’exploiter au maximum le pré-tri. La thèse propose aussi de nouvelles méthodes pour traiter les nœuds de variable dans le contexte d’une architecture pré-tri. Différents exemples d’implémentations sont donnés pour des codes NB-LDPC sur GF(64) et GF(256). En particulier, une architecture très efficace de décodeur pour un code de rendement 5/6 sur GF(64) est présentée. Cette architecture se caractérise par une architecture de check node nœud de parité entièrement parallèle. Enfin, une problématique récurrente dans les architectures NB-LDPC, qui est la recherche des P minimums parmi une liste de taille Ns, est abordée. La thèse propose une architecture originale appelée first-then-second minimum pour une implantation efficace de cette tâche
The Non-Binary Low Density Parity Check (NB-LDPC) codes constitutes an interesting category of error correction codes, and are well known to outperform their binary counterparts. However, their non-binary nature makes their decoding process of higher complexity. This PhD thesis aims at proposing new decoding algorithms for NB-LDPC codes that will be shaping the resultant hardware architectures expected to be of low complexity and high throughput rate. The first contribution of this thesis is to reduce the complexity of the Check Node (CN) by minimizing the number of messages being processed. This is done thanks to a pre-sorting process that sorts the messages intending to enter the CN based on their reliability values, where the less likely messages will be omitted and consequently their dedicated hardware part will be simply removed. This reliability-based sorting enabling the processing of only the highly reliable messages induces a high reduction of the hardware complexity of the NB-LDPC decoder. Clearly, this hardware reduction must come at no significant performance degradation. A new Hybrid architectural CN model (H-CN) combining two state-of-the-art algorithms - Forward-Backward CN (FB-CN) and Syndrome Based CN (SB-CN) - has been proposed. This hybrid model permits to effectively exploit the advantages of pre-sorting. This thesis proposes also new methods to perform the Variable Node (VN) processing in the context of pre-sorting-based architecture. Different examples of implementation of NB-LDPC codes defined over GF(64) and GF(256) are presented. For decoder to run faster, it must become parallel. From this perspective, we have proposed a new efficient parallel decoder architecture for a 5/6 rate NB-LDPC code defined over GF(64). This architecture is characterized by its fully parallel CN architecture receiving all the input messages in only one clock cycle. The proposed new methodology of parallel implementation of NB-LDPC decoders constitutes a new vein in the hardware conception of ultra-high throughput rate decoders. Finally, since the NB-LDPC decoders requires the implementation of a sorting function to extract P minimum values among a list of size Ns, a chapter is dedicated to this problematic where an original architecture called First-Then-Second-Extrema-Selection (FTSES) has been proposed
APA, Harvard, Vancouver, ISO, and other styles
5

Shi, Hong-Ling. "Development of an energy efficient, robust and modular multicore wireless sensor network." Phd thesis, Université Blaise Pascal - Clermont-Ferrand II, 2014. http://tel.archives-ouvertes.fr/tel-00968069.

Full text
Abstract:
The wireless sensor network is a key technology in the 21st century because it has multitude applications and it becomes the new way of interaction between physical environment and computer system. Moreover, the wireless sensor network is a high resource constraint system. Consequently, the techniques used for the development of traditional embedded systems cannot be directly applied. Today wireless sensor nodes were implemented by using only one single processor architecture. This approach does not achieve a robust and efficient energy wireless sensor network for applications such as precision agriculture (outdoor) and telemedicine. The aim of this thesis is to develop a new approach for the realization of a wireless sensor network node using multicore architecture to enable to increase both its robustness and lifetime (reduce energy consumption).
APA, Harvard, Vancouver, ISO, and other styles
6

Chiu, Chun-Chieh, and 邱俊傑. "Partial Replacement versus Full Replacement : A Fail-Over Replacement Mechanism for Extending the Lifetime of Wireless Sensor Nodes." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/evn94x.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Failed nodes"

1

Rogozin, I︠U︡riĭ. Nesostoi︠a︡vshiesi︠a︡ dumy: Stikhi, gipotezy i politzametki s gazetnymi vstavkami = Failed thoughts : poetry, hypotheses and political notes with newspaper inserts. Moskva: [s.n.], 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Thiessen, Gordon G. Flexible exchange rates in a world of low inflation : notes for remarks =: Le régime de changes flottants en contexte de faible inflation : allocution. Ottawa, Ont: Bank of Canada = Banque du Canada, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

D, Nathan. The Nephew Letters: Notes of a Failed Sobriety. CreateSpace Independent Publishing Platform, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Assimilate or Go Home: Notes from a Failed Missionary on Rediscovering Faith. HarperOne, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Orzoff, Andrea. Interwar Democracy and the League of Nations. Edited by Nicholas Doumanis. Oxford University Press, 2016. http://dx.doi.org/10.1093/oxfordhb/9780199695669.013.16.

Full text
Abstract:
Historians and contemporaries saw interwar democracy as incomplete, illegitimate, and inept. The League of Nations has been similarly characterized. Yet democracy endured across the Continent, threatened far more by Nazism than by internal actors. The League’s democratic internationalism failed to prevent a second world war, sanctioned Great Power imperialism, and neglected minority problems especially in Eastern Europe. But the League’s Secretariat shaped international discourse on humanitarian norms for the rest of the century, working with institutions and non-governmental organizations to bring about real good. This essay offers a tour d’horizon of interwar European democracy and democratic internationalism. While not minimizing the destructive influence of the radical right, it notes that in many cases seemingly undemocratic groups, institutions, and practices ended up stabilizing democracy.
APA, Harvard, Vancouver, ISO, and other styles
6

Ruffing, Kai. Gifts for Cyrus, Tribute for Darius. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198803614.003.0007.

Full text
Abstract:
In the introduction to the famous list of nomes Herodotus offers a rather idiosyncratic characterization of Darius I by means of calling him a huckster. Furthermore, he maintains that Cyrus II received gifts, whereas since the time of Darius the people of the Persian Empire had to pay tribute (phoros). Both issues are discussed against the background of Athenian history and political life in the fifth century BC. It is argued that Herodotus here as elsewhere in the Histories used the Persian Empire and its Kings as a mirror for the developments of his own times. In doing so he offers his opinions as to why the Persians failed in waging war against the Greeks, and consequently, the Athenians’ defeat in the war against the Spartans as well.
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, Chang-Yeon, Charles Chang, Raysa Cabrejo, and James Yue. Lumbosacral Pain. Oxford University Press, 2018. http://dx.doi.org/10.1093/med/9780190626761.003.0009.

Full text
Abstract:
This chapter examines the options for managing pain after orthopedic spinal surgery in the lumbosacral spine. It reviews the pain syndromes associated with different approaches to the lumbar spine. The chapter explores specific pain syndromes such as failed back syndrome while noting that the majority of pain after spinal surgery results from dissection of soft tissue and muscles. The chapter then discusses oral and parenteral methods for analgesia, as well as spinal and regional nerve blockade. It provides details on the common regimens for pain management including the use of opioids, nonsteroidal anti-inflammatory drugs, gabapentin, acetaminophen, ketamine, and patient-controlled analgesia (both classical intravenous and transdermal iterations). The chapter also notes the use of multimodal analgesic regimens to promote pain control while reducing the risk of opioid-related adverse effects.
APA, Harvard, Vancouver, ISO, and other styles
8

Archer, Richard. Advanced Education. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190676643.003.0005.

Full text
Abstract:
People of European descent and of African descent who struggled for equal rights agreed that education, including higher education, was essential for black advancement. When white reformers in the 1830s considered ways for people of color to attain equal rights, they, like black reformers, almost always gravitated to uplift. The prejudice of their times, they thought, would disappear as African Americans acquired education and middle-class values. Sunday schools, evening schools, writing schools, and other schools for black children and occasionally for black adults began appearing to fill basic needs. This chapter provides in-depth analysis and description of the attempt to create an African American college in New Haven, Prudence Crandall's school in Canterbury, Connecticut, and the Noyes Academy in Canaan, New Hampshire. Each of these experiments began with optimism and idealism, and each failed because of white opposition and violence.
APA, Harvard, Vancouver, ISO, and other styles
9

Platte, Nathan. “Together” for the Last Time in Since You Went Away. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780199371112.003.0010.

Full text
Abstract:
Rather than one score, Since You Went Away has slightly more than two: a rejected attempt by concert composer Alexandre Tansman and another by Max Steiner that includes multiple versions of many cues. In addition to these scores, Selznick’s notes on the score are voluminous, reflecting his desire to match his two consecutive “Best Pictures” (Gone with the Wind and Rebecca) while also contributing to the war effort through patriotic filmmaking. The result is a mixed but engrossing effort, characterized by biographer David Thomson as Selznick’s most personal film. The producer’s investment is evident throughout the score, and this chapter assesses both positive and negative consequences, including a failed attempt to engage Bernard Herrmann, Alexandre Tansman’s ignominious dismissal, Steiner’s pragmatic reuse of associative themes from earlier Selznick films, and a new, music-based publicity campaign led by Ted Wick.
APA, Harvard, Vancouver, ISO, and other styles
10

Colesworthy, Rebecca. Coda. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198778585.003.0007.

Full text
Abstract:
The book concludes by turning to Lévi-Strauss’s short essay, “New York in 1941,” in which he recounts his surprise at finding a Native American taking notes with a pen at the New York Public Library while he was conducting research for The Elementary Structures of Kinship, published in 1949. Recalling that H.D.’s The Gift was written during this same period and similarly features a cross-cultural encounter between Native Americans and Europeans, the Coda suggests that Lévi-Strauss’s encounter constitutes an instance of failed exchange—a moment when he might have imagined that writing and not woman is the “supreme gift,” the fundamental medium of exchange. The work of Woolf, Rhys, Stein, and H.D. offers a critical counterpoint to Lévi-Strauss’s both in privileging writing’s mediating power and in self-consciously wrestling with the risk of failure that haunts every gift of writing and which, historically, has shadowed women’s writing in particular.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Failed nodes"

1

Müller, Peter, and Joseph N. Ruskiewicz. "Using Debuggers to Understand Failed Verification Attempts." In Lecture Notes in Computer Science, 73–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21437-0_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ghandeharizadeh, Shahram, Haoyu Huang, and Hieu Nguyen. "Teleporting Failed Writes with Cache Augmented Data Stores." In Lecture Notes in Computer Science, 55–68. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94295-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rout, Shuvranshu Kumar, Manos De, Anup Kumar Mandal, and Biswajit Das. "Soil Nailing for Failed Slope Stabilization on Hilly Terrain." In Lecture Notes in Civil Engineering, 625–38. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6701-4_40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Järvisalo, Matti, and Janne H. Korhonen. "Conditional Lower Bounds for Failed Literals and Related Techniques." In Lecture Notes in Computer Science, 75–84. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09284-3_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zeller, Andreas. "When Abstraction Fails." In Lecture Notes in Computer Science, 1–9. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-31985-6_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Y. A., W. C. Shen, and P. W. Weng. "Seismic Evaluation of Non-ductile Reinforced Concrete Columns Failed in Shear." In Lecture Notes in Civil Engineering, 1203–11. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8079-6_113.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rebolledo, Rolando. "Topologie faible et meta-stabilite." In Lecture Notes in Mathematics, 544–62. Berlin, Heidelberg: Springer Berlin Heidelberg, 1987. http://dx.doi.org/10.1007/bfb0077655.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Santhi, K., Dhanasekaran Rajagopal, Somasundaram Devaraj, and Nirmala Madian. "Enhancing the Quality of Failed Planetary Gear Regions Using Intensity Transformation." In Lecture Notes in Networks and Systems, 121–27. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8204-7_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Metaxas, Antonis, and Michael Tsinisizelis. "The Development of Renewable Energy Governance in Greece. Examples of a Failed (?) Policy." In Lecture Notes in Energy, 155–68. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5595-9_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hamada, Toshiyuki, Kenta Nakamoto, Ikuo Nanno, Norio Ishikura, Shinichiro Oke, and Masayuki Fujii. "Characteristics of Failed Bypass Diodes for Photovoltaic Module by Artificial and Natural Lightning." In Lecture Notes in Electrical Engineering, 1218–24. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31676-1_113.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Failed nodes"

1

Hori, Atsushi, Kazumi Yoshinaga, Thomas Herault, Aurélien Bouteiller, George Bosilca, and Yutaka Ishikawa. "Sliding Substitution of Failed Nodes." In EuroMPI '15: The 22nd European MPI Users' Group Meeting. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2802658.2802670.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yongguo Mei, Changjiu Xian, S. Das, Y. C. Hu, and Yung-Hsiang Lu. "Replacing Failed Sensor Nodes by Mobile Robots." In 26th IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW'06). IEEE, 2006. http://dx.doi.org/10.1109/icdcsw.2006.90.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Staddon, Jessica, Dirk Balfanz, and Glenn Durfee. "Efficient tracing of failed nodes in sensor networks." In the 1st ACM international workshop. New York, New York, USA: ACM Press, 2002. http://dx.doi.org/10.1145/570738.570756.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cui, Liangwu, Wenwen Chen, and Shuai Hu. "Repair of Algebraic Geometry Codes of Two Failed Nodes." In 2018 11th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI). IEEE, 2018. http://dx.doi.org/10.1109/cisp-bmei.2018.8633209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Casbeer, David W., Yongcan Cao, Eloy Garcia, and Dejan Milutinović. "Average Bridge Consensus: Dealing With Active-Passive Sensors." In ASME 2015 Dynamic Systems and Control Conference. American Society of Mechanical Engineers, 2015. http://dx.doi.org/10.1115/dscc2015-9656.

Full text
Abstract:
In network average consensus problems, a failure, in which a node cannot provide the initial value, but can communicate with its neighbors gives rise to the bridge consensus problem. In its formulation, the failed node serves as a bridge which maintains the network communication connectivity, and its failure to provide the value does not impact the capability of the rest of the network nodes to reach a consensus. The proposed bridge consensus solution can deal with multiple failing nodes and large networks in a scalable manner. The solution properties are proven and illustrated by a numerical example.
APA, Harvard, Vancouver, ISO, and other styles
6

Padmavathy, N., J. Rama Charana Teja, and Sanjay K. Chaturvedi. "Performance evaluation of mobile ad hoc network using Monte Carlo simulation with failed nodes." In 2017 Second International Conference on Electrical, Computer and Communication Technologies (ICECCT). IEEE, 2017. http://dx.doi.org/10.1109/icecct.2017.8117914.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Smith, Shawn. "The Logic Mapper." In ISTFA 1998. ASM International, 1998. http://dx.doi.org/10.31399/asm.cp.istfa1998p0319.

Full text
Abstract:
Abstract The Logic Mapper software created by Knights Technology bridges the gap between traditional yield enhancement techniques in the wafer fab and analytical failure techniques in the failure analysis (FA) laboratory. With Logic Mapper, fabs can test logic devices as easily as memory devices. Traditional logic chip yield enhancement techniques within product engineering and wafer fab yield enhancement organizations rely heavily on binsort functional test correlation to anticipate and correct semiconductor process issues. Some of the key shortcomings of these techniques are: · The inability to relate a particular bin’s fallout to a suspect process level. · The inability to distinguish a defect-driven yield issue from a device-integration issue. · The inability to establish a clear link between large populations of failed die. Logic Mapper resolves these key shortcomings by taking the output from functional testers and translating it from a list of failed scan chains into a list of suspected netlist nodes. Using Merlin’s FrameworkTM software, the netlist can be used to identify the X, Y coordinates of a suspected failing node; the failure analysis and yield enhancement engineers have created a starting point for investigating failures. These nodes can then be crossmapped from the circuit design onto the chip’s layout over multiple photomask layers within the design. The ability to translate a logic device’s binsort functional test fail data to defect traces is an advancement in the quality of test information provided for failure analysis and yield enhancement.
APA, Harvard, Vancouver, ISO, and other styles
8

Deepak, Tuli, M. K. Gupta, R. Seam, S. Sharma, M. Gupta, V. Fotedar, S. Vats, N. Himthani, A. Rana, and R. Kaundal. "Evaluation of adequacy of conventional radiotherapy fields based on bony landmarks in cervical cancer patients using contrast enhanced CT." In 16th Annual International Conference RGCON. Thieme Medical and Scientific Publishers Private Ltd., 2016. http://dx.doi.org/10.1055/s-0039-1685261.

Full text
Abstract:
Introduction: Cervical cancer is the second leading cause of cancer death in Indian women. Although, it is known that in Western women the conventional pelvic fields based on bony landmarks provided inadequate coverage for pelvic lymph nodes in cervical cancer; it remains unclear in Indian patients because of the pelvic anatomic discrepancies. In the present study, we have tried to evaluate the adequacy of conventional pelvic fields based on bony landmarks by using CECT using pelvic vessels as surrogate of lymph nodes. Aims and Objectives: To evaluate the lymph node location in CECT pelvis using vessels as surrogate markers.(a) To compare the data, so obtained, with the usual radiotherapy field; where bony landmarks are used to define the field.(b) To evaluate the adequacy of radiation portal defined on bony landm-arks in covering pelvic lymph nodes. Materials and Methods: This study was conducted in the Department of Radiotherapy and Oncology, Regional Cancer Centre, IGMC, Shimla in patients suffering from carcinoma of cervix. Two dimensional radiation portals were designed on conventional simulator “Acuity.” CECT pelvis was done in the same position along with same immobilization accessories used during conventional simulation. 2 mm thick slices were taken from L1 to mid femur. Using vessels as surrogates for lymph nodes and applying Taylors guidelines, adequacy of conventional GOG field was judged. Results: Most of the parameters failed in this study, signifying inadequacy of GOG defined field in Indian population, detailed results will be discussed at the time of presentation.
APA, Harvard, Vancouver, ISO, and other styles
9

Lee, Jong Hak, Jong Eun Kim, Chang Su Park, Nam Il Kim, Jang Won Moon, Jong Chae Kim, Soo Yong Son, Kyung Dong Yoo, and Sung Joo Hong. "Failure Analysis Due to Slightly Unetched Hard Mask Using Nano Probe." In ISTFA 2013. ASM International, 2013. http://dx.doi.org/10.31399/asm.cp.istfa2013p0239.

Full text
Abstract:
Abstract In this work, a slightly unetched gate hard mask failure was analyzed by nano probing. Although unetched hard mask failures are commonly detected from the cross sectional view with FIB or FIB-TEM and planar view with the voltage contrast, in this case of the very slightly unetched hard mask, it was difficult to find the defects within the failed area by physical analysis methods. FIB is useful due to its function of milling and checking from the one region to another region within the suspected area, but the defect, located under contact was very tiny. So, it could not be detected in the tilted-view of the FIB. However, the state of the failure could be understood from the electrical analysis using a nano probe due to its ability to probe contact nodes across the fail area. Among the transistors in the fail area, one transistor’s characteristics showed higher leakage current and lower ON current than expected. After physical analysis, slightly remained hard mask was detected by TEM. Chemical processing was followed to determine the gate electrode (WSi2) connection to tungsten contact. It was also proven that when gate is floated, more leakage current flows compared to the state that the zero voltage is applied to the gate. This was not verified by circuit simulation due to the floating nodes.
APA, Harvard, Vancouver, ISO, and other styles
10

Littlewood, David, Stewart Silling, and Paul Demmie. "Identification of Fragments in a Meshfree Peridynamic Simulation." In ASME 2016 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2016. http://dx.doi.org/10.1115/imece2016-65400.

Full text
Abstract:
The peridynamic theory of solid mechanics provides a natural framework for modeling constitutive response and simulating dynamic crack propagation, pervasive damage, and fragmentation. In the case of a fragmenting body, the principal quantities of interest include the number of fragments, and the masses and velocities of the fragments. We present a method for identifying individual fragments in a peridynamic simulation. We restrict ourselves to the meshfree approach of Silling and Askari, in which nodal volumes are used to discretize the computational domain. Nodal volumes, which are connected by peridynamic bonds, may separate as a result of material damage and form groups that represent fragments. Nodes within each fragment have similar velocities and their collective motion resembles that of a rigid body. The identification of fragments is achieved through inspection of the peridynamic bonds, established at the onset of the simulation, and the evolving damage value associated with each bond. An iterative approach allows for the identification of isolated groups of nodal volumes by traversing the network of bonds present in a body. The process of identifying fragments may be carried out at specified times during the simulation, revealing the progression of damage and the creation of fragments. Incorporating the fragment identification algorithm directly within the simulation code avoids the need to write bond data to disk, which is often prohibitively expensive. Results are recorded using fragment identification numbers. The identification number for each fragment is stored at each node within the fragment and written to disk, allowing for any number of post-processing operations, for example the construction of cumulative distribution functions for quantities of interest. Care is taken with regard to very small clusters of isolated nodes, including individual nodes for which all bonds have failed. Small clusters of nodes may be treated as tiny fragments, or may be omitted from the fragment identification process. The fragment identification algorithm is demonstrated using the Sierra/SolidMechanics analysis code. It is applied to a simulation of pervasive damage resulting from a spherical projectile impacting a brittle disk, and to a simulation of fragmentation of an expanding ductile ring.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography