To see the other types of publications on this topic, follow the link: Computer network protocols – Standards – Research.

Journal articles on the topic 'Computer network protocols – Standards – Research'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer network protocols – Standards – Research.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Lundar, Johan Andre, Tor-Morten Grønli, and Gheorghita Ghinea. "Performance Evaluation of a Modern Web Architecture." International Journal of Information Technology and Web Engineering 8, no. 1 (January 2013): 36–50. http://dx.doi.org/10.4018/jitwe.2013010103.

Full text
Abstract:
The past decade has marked a shift in Web development as users have become accustomed to Web applications with dynamic content and enhanced user experience. Different languages and technologies have been utilised to make way for such applications, gradually stretching existing standards and protocols to its limits. The field of Web development has been characterized by a lack of coherent architectural concepts, partly due to the absences of standard protocols that support modern communication styles. As a result of this, systems specifically designed for real-time data delivery have been required and realised with proprietary technology in the industry, consequently violating established software engineering principles such as modularity, consistency and simplicity. This paper explores how current Web technologies support the requirements of modern Web applications. A prototype application was developed in the last phase to demonstrate the efficacy of combining the WebSocket protocol and API together with the use of JavaScript as exclusive programming language at the client and server. Based on the findings of the research carried out it appears that the use of protocols and standards such as WebSocket, WebSocket API and Server-Sent Events caters for higher network performance, increased flexibility and standards compliance.
APA, Harvard, Vancouver, ISO, and other styles
2

Garg, Puneet, Ashutosh Dixit, Preeti Sethi, and Plácido Rogerio Pinheiro. "Impact of Node Density on the QoS Parameters of Routing Protocols in Opportunistic Networks for Smart Spaces." Mobile Information Systems 2020 (August 1, 2020): 1–18. http://dx.doi.org/10.1155/2020/8868842.

Full text
Abstract:
The need and importance of Smart Spaces have been potentially realized by the researchers due to its applicability in the current lifestyle. Opportunistic network, a successor of mobile ad hoc networks and a budding technology of network, is a best-suited technology for implementing Smart Spaces due to its wide range of applications in real-life scenarios ranging from building smart cities to interplanetary communication. There are numerous routing protocols which are available in opportunistic network, each having their pros and cons; however, no research till the time of listing has been done which can quantitatively demonstrate the maximum performance of these protocols and standardize the comparison of opportunistic routing protocols which has been a major cause of ambiguous performance evaluation studies. The work here presents a categorical view of the opportunistic routing protocol family and thereby compares and contrasts the various simulators suited for their simulation. Thereafter, the most popular protocols (selecting at least one protocol from each category) are compared based on node density on as many as 8 standard performance metrics using ONE simulator to observe their scalability, realism, and comparability. The work concludes by presenting the merits and demerits of each of the protocols discussed as well as specifying the best routing protocol among all the available protocols for Smart Spaces with maximum output. It is believed that the results achieved by the implemented methodology will help future researchers to choose appropriate routing protocol to delve into their research under different scenarios.
APA, Harvard, Vancouver, ISO, and other styles
3

Yun, Jung Mee, and Dae Hwan Kim. "A Study on the Convergence Adaptor Using Plug Computer." Advanced Materials Research 462 (February 2012): 348–52. http://dx.doi.org/10.4028/www.scientific.net/amr.462.348.

Full text
Abstract:
Recent studies have shown that the Internet-related energy consumption represents a significant, and increasing, part of the overall energy consumption of our society. Therefore, it is extremely important to look for energy-efficient Internet applications and protocols. For EPON, research on the development of protocols for higher energy efficiency at the PHY/MAC layers and the enactment of standards, and the improvement of energy efficiency of EPON devices is being conducted, while for networking equipment such as routers and switches and IDCs, research on saving the energy consumed by devices and the management of energy efficiency using power monitoring, cooling devices and metering technologies is being conducted. Against this backdrop, this study is aimed to develop methodology for the improvement of network energy efficiency in existing home/ small and medium-sized office network environments and to develop, test and evaluate an energy saving prototype for Convergence Adaptor
APA, Harvard, Vancouver, ISO, and other styles
4

Arokkiam, Jerome A., Pedro Alvarez, Xiuchao Wu, Kenneth N. Brown, Cormac J. Sreenan, Marco Ruffini, Nicola Marchetti, Linda Doyle, and David Payne. "Design, implementation, and evaluation of an XG-PON module for the ns-3 network simulator." SIMULATION 93, no. 5 (January 26, 2017): 409–26. http://dx.doi.org/10.1177/0037549716682093.

Full text
Abstract:
10-gigabit-capable Passive Optical Network (XG-PON), one of the latest standards of optical access networks, is regarded as one of the key technologies for future Internet access networks. This paper presents the design and evaluation of our XG-PON module for the ns-3 network simulator. This module is designed and implemented with the aim to provide a standards-compliant, configurable, and extensible module that can simulate XG-PON with reasonable speed and support a wide range of research topics. These include analyzing and improving the performance of XG-PON, studying the interactions between XG-PON and the upper-layer protocols, and investigating its integration with various wireless networks. In this paper, we discuss its design principles, describe the implementation details, and present an extensive evaluation on both functionality and performance.
APA, Harvard, Vancouver, ISO, and other styles
5

Tightiz, Lilia, and Hyosik Yang. "A Comprehensive Review on IoT Protocols’ Features in Smart Grid Communication." Energies 13, no. 11 (June 1, 2020): 2762. http://dx.doi.org/10.3390/en13112762.

Full text
Abstract:
Since the smart grid deals with a large mass of data and critical missions, it requires ubiquitous, reliable, and real-time communication. The Internet of Things (IoT) technology, which has the potential of connecting all objects over the globe through the Internet, excels in providing robust information transmission infrastructure in the smart grid. There are a multitude of possible protocols, standards, and configurations for communication in the smart grid. A commonly applied communication standard IEC 61850 recommends the use of Manufacturing Message Specification (MMS) protocol for communication in Local Area Network (LAN) and eXtensible Messaging and Presence Protocol (XMPP) in Wide Area Network (WAN). However, a plethora of research on this topic compares the behavior of other IoT protocols and standard recommendations in the smart grid. On the other hand, the sky-rocketing penetration of Renewable Energy Sources (RES), especially in the form of micro grid, transformed the central control structure of the smart grid into a distributed style called Multi-Agent Systems (MAS). This new approach defined new communication requirements and more particular IoT protocol characteristic requirements. However, a limited number of the existing studies have considered IoT protocol characteristic requirements of the smart grid and its new control structures. In this paper, we initially investigate the communication requirements of the smart grid and introduce all IoT protocols and their specifications. We analyze IoT protocol characteristics and performances in the smart grid through literature review based on the smart grid communication requirements. In this approach, we highlight weak points of these practices making them fail to acquire the holistic guidelines in utilizing proper IoT protocol that can meet the smart grid environment interaction requirements. Using the existing facilities, the public Internet, we follow the arrangement of cost-effective high penetration communication requirements for new structures of the smart grid, i.e., the MAS and multi-micro grid. In this case, we consider IoT protocol Quality of Services (QoS) requirements, especially in the case of security and reliability, to satisfy stakeholders, namely utilities and prosumers. Addressing effective elements in applying IoT in the smart grid’s future trends is another contribution to this paper.
APA, Harvard, Vancouver, ISO, and other styles
6

Velterop, Jan, and Erik Schultes. "An Academic Publishers’ GO FAIR Implementation Network (APIN)." Information Services & Use 40, no. 4 (January 6, 2021): 333–41. http://dx.doi.org/10.3233/isu-200102.

Full text
Abstract:
Presented here is a proposal for the academic publishing industry to get actively involved in the formulation of protocols and standards that make published scientific research material machine-readable in order to facilitate data to be findable, accessible, interoperable, and re-usable (FAIR). Given the importance of traditional journal publications in scholarly communication worldwide, active involvement of academic publishers in advancing the more routine creation and reuse of FAIR data is highly desired.
APA, Harvard, Vancouver, ISO, and other styles
7

Permatasari, Ulfa Septilia, and Indrastanti Ratna Widiasari. "Analisis Routing Protokol Optimized Link State Routing (OLSR) Pada Raspberry Pi." AITI 16, no. 2 (June 17, 2020): 151–64. http://dx.doi.org/10.24246/aiti.v16i2.151-164.

Full text
Abstract:
Optimized Link State Routing (OLSR)is one of the two standard for mesh networks. OLSR is a link state routing protocol, which use hallo message and topology control (TC) to determine the link state information across the mobile ad-hoc network. OLSR is widely used in the wireless mesh network. Raspberry Pi is a mini computer which can be used as a node router to replace the function of a router in a wireless mesh network. In this research, Raspberry Pi is used as a router nodes to determine the performance of routing protocol OLSR. The parameters used to measure its performance is self-configure time, self-healing and bandwidth usage. The test results showed that the use of routing protocols OLSR on the Raspberry Pi in a wireless mesh network proved able to repair itself if there is a problem on the network since it has ability to self-configure and self-healing.
APA, Harvard, Vancouver, ISO, and other styles
8

Rezaei, Fahimeh, Michael Hempel, and Hamid Sharif. "A Survey of Recent Trends in Wireless Communication Standards, Routing Protocols, and Energy Harvesting Techniques in E-Health Applications." International Journal of E-Health and Medical Communications 6, no. 1 (January 2015): 1–21. http://dx.doi.org/10.4018/ijehmc.2015010101.

Full text
Abstract:
One of the most rapidly growing technology areas is the advances in sensing, networking, and miniaturization in medical domain, which enables innovative new applications. This is especially apparent in e-Health and telemedicine. There is an enormous demand for innovation in wireless sensor networking, body area networks, network security and routing, and many other areas, attracting the attention of numerous researchers. With all the advances it can be challenging to identify trends and areas with opportunities for research engagement. In this paper, the authors therefore review the state-of-the-art in wireless communication used in telemedicine and e-Health applications – ranging from the Wide Area Networks to Body Area Networks – and discuss the studies and literature that employ these technologies for e-Health applications. Moreover, recent routing protocols and techniques that are used for Body Area Networks are investigated. One key challenge for e-Health applications, particularly for mobile or patient-worn devices, is energy consumption and supply. One possible solution is found in energy harvesting, and our survey encompasses current challenges and accomplishments in its application to e-Health and discuss various promising techniques.
APA, Harvard, Vancouver, ISO, and other styles
9

G. Hamid, Harth, and Zainab T. Alisa. "A survey on IoT application layer protocols." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 3 (March 10, 2021): 1663. http://dx.doi.org/10.11591/ijeecs.v21.i3.pp1663-1672.

Full text
Abstract:
<span>The constant evolution in internet technology has made. The internet of things (IoT) to be the center of research fields in computer engineering. This review paper discusses the choice of an application layer protocol in an IoT system integration so first, the paper briefly defines the potential protocols. After that, it opens up a comparison between these protocols according to how they manage their overhead and messages which affects traffic management and thus starts the discussion. The main contribution of this work is the simplification of comparison between session layer protocols in the benefit of IoT applications exclusively. IoT system Standards and platforms are being improved constantly. IoT enables application devices to connect and coordinate their tacks, such applications like healthcare, smart home, and industrial automation. Several protocols have been discussed to provide effective communication for resource-limited devices. However, their traffic management is still a field for researches, to find the optimal protocol choice for different situations. The review collects the results of other works that experimentally compared application layer protocols in the IoT environment and presents the graphical and tabular compression. Finally, the conclusion summarize the choice in different applications.</span>
APA, Harvard, Vancouver, ISO, and other styles
10

Asemi, Asefeh, and Fezzeh Ebrahimi. "A Thematic Analysis of the Articles on the Internet of Things in the Web of Science With HAC Approach." International Journal of Distributed Systems and Technologies 11, no. 2 (April 2020): 1–17. http://dx.doi.org/10.4018/ijdst.2020040101.

Full text
Abstract:
This research was carried out using the bibliometric method to thematically analyze the articles on IoT in the Web of Science with Hierarchical Agglomerative Clustering approach. First, the descriptors of the related articles published from 2002 to 2016 were extracted from WoS, by conducting a keyword search using the “Internet of Things” keyword. Data analysis and clustering were carried out in SPSS, UCINET, and PreMap. The analysis results revealed that the scientific literature published on IoT during the period had grown exponentially, with an approximately 48% growth rate in the last two years of the study period (i.e. 2015 and 2016). After analyzing the themes of the documents, the resulting concepts were classified into twelve clusters. The twelve main clusters included: Privacy and Security, Authentication and Identification, Computing, Standards and Protocols, IoT as a component, Big Data, Architecture, Applied New Techniques in IoT, Application, Connection and Communication Tools, Wireless Network Protocols, and Wireless Sensor Networks.
APA, Harvard, Vancouver, ISO, and other styles
11

Agnihotri, Shailja, and K. R. Ramkumar. "A survey and comparative analysis of the various routing protocols of Internet of Things." International Journal of Pervasive Computing and Communications 13, no. 3 (September 4, 2017): 264–81. http://dx.doi.org/10.1108/ijpcc-03-2017-0023.

Full text
Abstract:
Purpose The purpose of this paper is to provide insight into various swarm intelligence-based routing protocols for Internet of Things (IoT), which are currently available for the Mobile Ad-hoc networks (MANETs) and wireless sensor networks (WSNs). There are several issues which are limiting the growth of IoT. These include privacy, security, reliability, link failures, routing, heterogeneity, etc. The routing issues of MANETs and WSNs impose almost the same requirements for IoT routing mechanism. The recent work of worldwide researchers is focused on this area. Design/methodology/approach The paper provides the literature review for various standard routing protocols. The different comparative analysis of the routing protocols is done. The paper surveys various routing protocols available for the seamless connectivity of things in IoT. Various features, advantages and challenges of the said protocols are discussed. The protocols are based on the principles of swarm intelligence. Swarm intelligence is applied to achieve optimality and efficiency in solving the complex, multi-hop and dynamic requirements of the wireless networks. The application of the ant colony optimization technique tries to provide answers to many routing issues. Findings Using the swarm intelligence and ant colony optimization principles, it has been seen that the protocols’ efficiency definitely increases and also provides more scope for the development of more robust, reliable and efficient routing protocols for the IoT. Research limitations/implications The existing protocols do not solve all reliability issues and efficient routing is still not achieved completely. As of now no techniques or protocols are efficient enough to cover all the issues and provide the solution. There is a need to develop new protocols for the communication which will cater to all these needs. Efficient and scalable routing protocols adaptable to different scenarios and network size variation capable to find optimal routes are required. Practical implications The various routing protocols are discussed and there is also an introduction to new parameters which can strengthen the protocols. This can lead to encouragement of readers, as well as researchers, to analyze and develop new routing algorithms. Social implications The paper provides better understanding of the various routing protocols and provides better comparative analysis for the use of swarm-based research methodology in the development of routing algorithms exclusively for the IoT. Originality/value This is a review paper which discusses the various routing protocols available for MANETs and WSNs and provides the groundwork for the development of new intelligent routing protocols for IoT.
APA, Harvard, Vancouver, ISO, and other styles
12

LLORET, JAIME, JESUS TOMAS, MIGUEL GARCIA, and RAQUEL LACUESTA. "A B2B ARCHITECTURE AND PROTOCOL FOR RESEARCHERS COOPERATION." International Journal of Cooperative Information Systems 22, no. 02 (June 2013): 1350010. http://dx.doi.org/10.1142/s021884301350010x.

Full text
Abstract:
Some works on the researchers cooperation's literature provide the key lines for building research networks and propose new protocols and standards for business to business (B2B) data exchange, but none of them explains how researchers should contact and the procedure to select the most appropriate partner of a research enterprise, institute or university. In this paper, we propose a B2B architecture and protocol between research entities, that uses ebXML protocol. The contacts for cooperation are established based on some defined parameters and an information retrieval system. We explain the information retrieval system, the researcher selection procedure, the XML-based protocol and the workflow of our proposal. We also show the information that has to be exchanged to contact other researchers. Several simulations demonstrate that our proposal is a feasible architecture and may be used to promote the research cooperation. The main purpose of this paper is to propose an efficient procedure for searching project partners.
APA, Harvard, Vancouver, ISO, and other styles
13

Chaaban, Yaser. "Packet Analysis: a Model Implementation of a Special Communication Protocol Using Micro Programming." Information Technology and Control 50, no. 1 (March 25, 2021): 28–44. http://dx.doi.org/10.5755/j01.itc.50.1.25321.

Full text
Abstract:
Communication protocols are used in telecommunication systems. These protocols are defined as rules, which enable the entities of communicating systems to transfer information usually as packages. Additionally, each standard communication protocol has uniquely-defined structure and consequently a special pattern of network packets. Here, it is worth mentioning that communication protocols are implemented in different ways, in the system software layer or in hardware layer (silicon chipsets). This paper presents the implementation of a special communication protocol called "Packet Analysis", which is used in the Hardware project "Minimax machine". This implementation is a software that can be written using a special simulator "Minimax simulator", which is the target execution environment. That simulator was successfully developed for micro programming and hardware simulations. In this regard, this study develops an algorithm that represents a step toward simulating communication protocols using micro-programming. The flow chart designed here gives an overview of how the "Packet Analysis" algorithm works (designed protocol), which in turn describes all steps in details. As a result, the entire system of this research paper was implemented and tested with various input values. Additionally, the implemented proposed solution (implemented protocol) was evaluated by two metrics (quantitative measures) using test-benches so that its statistics will be trustworthy for research. Other results of this study showed that there is a lot of scope for optimization in the solution presented in this research paper. This leads in turn to optimize the proposed implementation and to consider implementation alternatives.
APA, Harvard, Vancouver, ISO, and other styles
14

Qian, Long. "Research to Household Sub-Network Development Based on Bluetooth Control Technology." Advanced Materials Research 989-994 (July 2014): 4215–18. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4215.

Full text
Abstract:
With the development of household appliances, the short of communication among them is more and more becoming a problem. At present there is no central point of control among the traditional home appliances, and we cannot access them through Internet. To solve these issues, home network is proposed to connect all the appliances, home PC and portable devices together using network technology. Controlling all the appliances through one single node ( the home network gateway), home network makes life much simpler and convenient. There are several local area network technologies applicable to home network. Bluetooth technology is chosen in this paper as the home networking technology due to its many advantages over others. The implementation scheme of home control sub-network based on Bluetooth serial part profile ( SPP) and the standards of Home Network Platform in China is proposed. According to actual application fields, the communication protocol architecture for this scheme is established by using appliance control protocol promoted by the manufacturers and universal device control protocol ( UDCP) over SPP. Many management functions of appliance terminals are realized such as appending, login, operation, logout and alarming. Implementation methods of appliance terminal based on an entirely embedded single-chip manner and mobile control terminal which is realized by computer simulation are proposed. Analysis and solution of baud rate error brought by inaccurate crystal frequencies are presented. Further discussion about applying ad hoc technology to home control sub-network is carried out.
APA, Harvard, Vancouver, ISO, and other styles
15

Xia, Zhenchang, Jia Wu, Libing Wu, Yanjiao Chen, Jian Yang, and Philip S. Yu. "A Comprehensive Survey of the Key Technologies and Challenges Surrounding Vehicular Ad Hoc Networks." ACM Transactions on Intelligent Systems and Technology 12, no. 4 (June 6, 2021): 1–30. http://dx.doi.org/10.1145/3451984.

Full text
Abstract:
Vehicular ad hoc networks ( VANETs ) and the services they support are an essential part of intelligent transportation. Through physical technologies, applications, protocols, and standards, they help to ensure traffic moves efficiently and vehicles operate safely. This article surveys the current state of play in VANETs development. The summarized and classified include the key technologies critical to the field, the resource-management and safety applications needed for smooth operations, the communications and data transmission protocols that support networking, and the theoretical and environmental constructs underpinning research and development, such as graph neural networks and the Internet of Things. Additionally, we identify and discuss several challenges facing VANETs, including poor safety, poor reliability, non-uniform standards, and low intelligence levels. Finally, we touch on hot technologies and techniques, such as reinforcement learning and 5G communications, to provide an outlook for the future of intelligent transportation systems.
APA, Harvard, Vancouver, ISO, and other styles
16

Bi, Xinwen, Shaocheng Song, Haoyang Wang, Yingjian Shao, Xiaodan Zhang, Yanming Cheng, and Ilkyoo Lee. "Research on Beauty Medical Health Monitoring System Based on Wireless Sensor Network." Mobile Information Systems 2021 (September 23, 2021): 1–8. http://dx.doi.org/10.1155/2021/2894800.

Full text
Abstract:
Due to the gradual improvement of living standards in recent years and the continuous improvement of China’s health care awareness, the aesthetic medicine model has gradually changed from the treatment mode of disease treatment to the prevention mode of early detection and early treatment. Meanwhile, wireless sensor networks (WSNs) are gradually infiltrating into the medical field due to their low power consumption, small size, wireless transmission, and portability which complies with the needs of the development of medical models. Therefore, this paper studies and implements a beauty medical health monitoring system based on WSN and ZigBee short-range wireless transmission protocol; moreover, wireless power transfer (WPT) technology is used for charging sensors. Experimental results demonstrate the feasibility that the maximum power levels converted in sensors by the WPT for different ISM bands can meet the average power consumption expected in the range of 200–500 μW. And the designed system can provide an important practical reference for promoting the informationization of telemedicine and the development of beauty medical systems in China.
APA, Harvard, Vancouver, ISO, and other styles
17

Khairi, Mutaz Hamed Hussien, Sharifah H. S. Ariffin, N. M. Abdul Latiff, and Kamaludin Mohamad Yusof. "Generation and collection of data for normal and conflicting flows in software defined network flow table." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (April 1, 2021): 307. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp307-314.

Full text
Abstract:
<a name="_Hlk31039004"></a><span lang="EN-US">In terms of network simplification and regulation, Software Defined Networking (SDN) is a new form of infrastructure that offers greater adaptability and flexibility. SDN, however, is an invention that is logically centralized. </span><span>In addition, the optimization of the control plane and data plane in SDN has become an area deserving of more attention. The flow in OpenFlow has been one of the essential parameters in the SDN standards, in which every individual flow includes packet matching fields, flow priority, separate counters, instructions for packet forwarding, flow timeouts and a cookie. This research work is conducted in order to produce and collect flows from the OpenFlow switch in two scenarios; in normal flows and when conflict policy rules are enforced in the network. In this article, the throughput is required to review and evaluate the conflict impact on two protocols as a performance metric; the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) that flows via a forwarded plane. During the simulation of the SDN OpenFlow network, the metrics are tested using MININET. The results demonstrate that the existence of SDN conflict rules allows TCP and UDP to have a significant average change in bandwidth that eventually affects the network and operations performance.</span>
APA, Harvard, Vancouver, ISO, and other styles
18

O’Keefe, M. A., J. Taylor, D. Owen, B. Crowley, K. H. Westmacott, W. Johnston, and U. Dahmen. "Remote On-Line Control of a High-Voltage in situ Transmission Electron Microscope with A Rational User Interface." Proceedings, annual meeting, Electron Microscopy Society of America 54 (August 11, 1996): 384–85. http://dx.doi.org/10.1017/s0424820100164386.

Full text
Abstract:
Remote on-line electron microscopy is rapidly becoming more available as improvements continue to be developed in the software and hardware of interfaces and networks. Scanning electron microscopes have been driven remotely across both wide and local area networks. Initial implementations with transmission electron microscopes have targeted unique facilities like an advanced analytical electron microscope, a biological 3-D IVEM and a HVEM capable of in situ materials science applications. As implementations of on-line transmission electron microscopy become more widespread, it is essential that suitable standards be developed and followed. Two such standards have been proposed for a high-level protocol language for on-line access, and we have proposed a rational graphical user interface. The user interface we present here is based on experience gained with a full-function materials science application providing users of the National Center for Electron Microscopy with remote on-line access to a 1.5MeV Kratos EM-1500 in situ high-voltage transmission electron microscope via existing wide area networks. We have developed and implemented, and are continuing to refine, a set of tools, protocols, and interfaces to run the Kratos EM-1500 on-line for collaborative research. Computer tools for capturing and manipulating real-time video signals are integrated into a standardized user interface that may be used for remote access to any transmission electron microscope equipped with a suitable control computer.
APA, Harvard, Vancouver, ISO, and other styles
19

Mishra*, Arjit, Surendra Gupta, and Swarnim Soni. "Designing Information System for Private Network using RBAC, FGAC and Micro service Architecture." International Journal of Engineering and Advanced Technology 10, no. 4 (April 30, 2021): 195–200. http://dx.doi.org/10.35940/ijeat.d2474.0410421.

Full text
Abstract:
Microservice architecture is used in developing enterprise-level applications with the intent to modularise deployment of the application, this happens by creating an application as a collection of var-ious smaller applications known as microservices. An Information system is one such application that is ever-growing and therefore needs an architectural solution that addresses this issue. While microservice architecture addresses this issue by giving low coupling among microservices, future scalability of the system, and convenience in developing, deploying, and integrating new microservices.For all it‘s benefits, microservice architecture complicates the consistent implementation of security policies in this distributed system. Current industry standards are to use protocols that delegate the process of authentication and authorization to a third-party server, e.g. OAuth. Delegating these processes to be handled by the third party is not suitable for some web applications that are deployed in a less resourceful environment, e.g. organization with high internet downtime or an organization with high traffic of non working personnel e.g. people giving exams in college or workshops being held. This paper aims to research proposed solutions, existing frameworks, and technologies to implement security policies in an Information system which can be suitable for the above two scenarios.For this, we use authentication, Role-based access control (RBAC) on every request, and Fine-grained access control (FGAC) on the implementation method level, to achieve greater access control and flex-ibility of adding new microservice without changing whole security policies. We have also proposed a pre-registration condition in our system, which allows only certain people, whose data is already present in the system, to register themselves with the application. We also discuss the scenario where using a protocol like OAuth is not suitable. The solution is based on creating a central single entry point for authentication and implementing an RBAC policy that will filter every request based on access roles that the requesting user has. We further use FGAC on method level in microservices to enforce n even finer restrictions on resources to be accessed based on requirements. This solution will be implemented as apart of the Department Information System (DIS) in the following two-step:
APA, Harvard, Vancouver, ISO, and other styles
20

Brzozowski, Bartosz, Wiesław Sobieraj, and Konrad Wojtowicz. "UAV Avionics System Software Development Using Simulation Method." Solid State Phenomena 198 (March 2013): 260–65. http://dx.doi.org/10.4028/www.scientific.net/ssp.198.260.

Full text
Abstract:
During last few years avionics system research platform was invented at the Military University of Technology. This modular simulator allows user to design and verify avionics system software using hardware-in-the-loop technique. Mathematical model of an airplane under tests is implemented on a high-performance computer which response to all control signals and environmental disturbances. Environment is simulated on a separate computer which can also visualize orientation and movement of the airplane. Plane structure and aerodynamic features as well as control data can be modified accordingly to user needs. The third PC is used as an interface unit between research platform and main computational unit of the avionics system. This device can send and receive information in real-time using various data protocols and interfaces depending on sensors and actuators that are planned to be used in real system. Those three computers work in a local area network and exchange data using Gigabit Ethernet standard. Possibility to simulate behavior of an UAV controlled by the developed avionics system implemented on an embedded computer working in hardware-in-the-loop mode on the platform, allows software developer to debug any part of the application in various environment conditions very close to reality. Research platform gives also the possibility to modify algorithm and adjust its parameters in real-time to verify suitability of the implemented avionics system software for the particular UAV. The avionics system software developed using this simulation method minimize expensive in-flight tests and assure failsafe performance after first successful flight
APA, Harvard, Vancouver, ISO, and other styles
21

Wang, Feng Hua. "The Application of Wireless Security Communication in the Industrial Automation and Control." Applied Mechanics and Materials 427-429 (September 2013): 492–96. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.492.

Full text
Abstract:
Based on the wireless to realize the industrial automation, and now this is the field that people daily concerned about, but also is the hot issues of research of the community and even academic. The study of standardized wireless networks for industrial applications is more based on the Zigbee research methods. In this paper, we try to increase the combining of these new design technology and industrial automation of wireless standards. Wireless based on the PC can be applied in the micro and macro industrial by using Zigbee network; it has a variety of different types of processors and microcontrollers. Microcontroller relates to the temperature sensor, the zero crossing detector and voltage regulatory agencies. The system can completely control them through visual-based GUI (graphical user interface of the PC). The graphical user interface is the applications program based on the user-developed. All processors and controllers are interconnected PC through Zigbee. The PC will continue to monitor all the data structure unit and compare value from remote processing preloaded process. If you find any error, computer will take the necessary action. Zigbee network is also the star topology structure that tries the four nodes. The first Zigbee is connected to the personal computer, it has fully functional device, its role is transmitting and receiving the data of other nodes. The second, third and fourth of the Zigbee have device that can reduce function, and they are used to control the rotational speed of the DC motor, have separate control of the temperature and the lamp lighting. It can interconnect all processing unit of Zigbee through the RS232 protocol.
APA, Harvard, Vancouver, ISO, and other styles
22

Kim, Sungwook. "A New Cooperative Dual-Level Game Approach for Operator-Controlled Multihop D2D Communications." Mobile Information Systems 2019 (July 4, 2019): 1–11. http://dx.doi.org/10.1155/2019/6276872.

Full text
Abstract:
With the development of wireless communications and the intellectualization of mobile devices, device-to-device (D2D) communications are considered as a standard part of future 5G networks. This new paradigm can provide better user experiences while improving the system performance such as network throughput, latency, fairness, and energy efficiency. In this study, we investigate a new dual-level D2D communication scheme consisting of multiple D2D operators and a group of mobile devices. To model the interaction among D2D operators and devices, we adopt two cooperative game approaches based on the incentive mechanism design and r-egalitarian Shapley value. At the upper level, routing paths and incentive payments for multihop relay services are decided using the incentive mechanism. At the lower level, mobile devices share the given incentive based on the r-egalitarian Shapley value. Both level control procedures are mutually dependent on each other by the proper coordination and collaboration. According to the main features of two cooperative game models, the proposed scheme takes various benefits in a fair-efficient way. Through the derived simulation results, we can verify the superiority of our proposed scheme comparing to the existing protocols. Finally, we propose further challenges and future opportunities in the research area of operator-controlled multihop D2D communications.
APA, Harvard, Vancouver, ISO, and other styles
23

Spelt, Philip F., Allan M. Kirson, and Susan Scott. "New Vehicle Data Bus Architecture and In-Vehicle Information System Evaluation Platform for Intelligent Transportation Systems Modules." Transportation Research Record: Journal of the Transportation Research Board 1651, no. 1 (January 1998): 17–22. http://dx.doi.org/10.3141/1651-03.

Full text
Abstract:
An increasing number of intelligent transportation systems- (ITS-) after-market systems present a set of in-vehicle installation and use problems relatively unique in the history of automobile use. Many automobile manufacturers would like to offer these new state-of-the-art devices to customers, but are hampered by the current design cycle of new cars. While automobile manufacturers are indeed using multiplex buses [the automotive equivalent of a computer local area network (LAN)], problems remain because manufacturers are not converging on a single bus standard. A new dual-bus architecture to address these problems is presented with an in-vehicle information system (IVIS) research platform on which the principles embodied in the ITS data bus architecture can be evaluated. The dual-bus architecture has been embodied in a proposed Society of Automotive Engineers (SAE) standard, with support from both automobile and consumer electronics manufacturers. The architecture and a reference model for the interfaces and protocols of the new bus are presented and described. The goals of the ITS data bus are to be inexpensive and easy to install, and to provide for safe and secure functioning. These high-level goals are embodied in the proposed standard. The IVIS development platform comprises a number of personal computers (PCs) linked via ethernet LAN, with a high-end PC serving as the IVIS computer. In this LAN, actual devices can be inserted in place of the original PC that emulated them. This platform will serve as the development and test bed for an ITS data bus conformity test, the SAE standard for which is also being developed.
APA, Harvard, Vancouver, ISO, and other styles
24

Ponnuviji, N. P., and M. Vigilson Prem. "An Enhanced Way of Distributed Denial of Service Attack Detection by Applying Machine Learning Algorithms in Cloud Computing." Journal of Computational and Theoretical Nanoscience 17, no. 8 (August 1, 2020): 3765–69. http://dx.doi.org/10.1166/jctn.2020.9317.

Full text
Abstract:
Cloud Computing has revolutionized the Information Technology by allowing the users to use variety number of resources in different applications in a less expensive manner. The resources are allocated to access by providing scalability flexible on-demand access in a virtual manner, reduced maintenance with less infrastructure cost. The majority of resources are handled and managed by the organizations over the internet by using different standards and formats of the networking protocols. Various research and statistics have proved that the available and existing technologies are prone to threats and vulnerabilities in the protocols legacy in the form of bugs that pave way for intrusion in different ways by the attackers. The most common among attacks is the Distributed Denial of Service (DDoS) attack. This attack targets the cloud’s performance and cause serious damage to the entire cloud computing environment. In the DDoS attack scenario, the compromised computers are targeted. The attacks are done by transmitting a large number of packets injected with known and unknown bugs to a server. A huge portion of the network bandwidth of the users’ cloud infrastructure is affected by consuming enormous time of their servers. In this paper, we have proposed a DDoS Attack detection scheme based on Random Forest algorithm to mitigate the DDoS threat. This algorithm is used along with the signature detection techniques and generates a decision tree. This helps in the detection of signature attacks for the DDoS flooding attacks. We have also used other machine learning algorithms and analyzed based on the yielded results.
APA, Harvard, Vancouver, ISO, and other styles
25

Dorloff, Frank-Dieter, and Ejub Kajan. "Balancing of Heterogeneity and Interoperability in E-Business Networks." International Journal of E-Business Research 8, no. 4 (October 2012): 15–33. http://dx.doi.org/10.4018/jebr.2012100102.

Full text
Abstract:
To reach this interoperability visibility and common understanding must be ensured on all levels of the interoperability pyramid. This includes common agreements about the visions, political and legal restrictions, clear descriptions about the collaboration scenarios, included business processes and-rules, the type and roles of the Documents, a common understandable vocabulary, etc. To do this in an effective and automatable manner, ICT based concepts, frameworks and models have to be defined, that have to be known and understood, accepted and that have to provide additional e-benefits for all participating partners. In addition, ICT systems, tools and other instruments must be compliant with all the restrictions defined by the interoperability pyramid and they have to support the work properly and efficient, and last but not least they have to ensure trust and minimize e-business risks. Nowadays, many profitable and well working individual solutions on the market may be found. But there still is a gap for more general and well working interoperability solutions. This article shows the state of the Art in Research and Practice in building, managing and maintaining E-Business solutions under the focus to enhance interoperability based on standards, protocols and other helpful concepts, instruments and examples. To provide better understanding for non-specialists, also, the authors systemize the complex and interdisciplinary content and offer additional helpful explanations.
APA, Harvard, Vancouver, ISO, and other styles
26

Breden, Felix. "486 iReceptor plus: a data integration platform to share, compare and analyze adaptive immune receptor repertoire (AIRR-seq) data from antibody/B- and T-cell repertoires." Journal for ImmunoTherapy of Cancer 8, Suppl 3 (November 2020): A522. http://dx.doi.org/10.1136/jitc-2020-sitc2020.0486.

Full text
Abstract:
BackgroundOver the past few years, next-generation sequencing technologies have been developed to characterize ‘adaptive immune receptor repertoires’ (i.e., antibody/B-cell and T-cell receptor repertoires or AIRRs) in exquisite detail. AIRR sequencing (AIRR-seq) has enormous promise for understanding the dynamics of the immune repertoire in vaccinology, infectious diseases, autoimmunity, and cancer biology. While AIRR-seq data is important, it is also very large, complex, and requires specialized tools and services to curate, analyze, and share. In response to these challenges, The AIRR Community was formed in 2015 (www.airr-community.org). The AIRR Community comprises immunologists, immunogeneticists, computer scientists, bioinformaticians, and experts in legal, ethics and IP issues who are developing shared protocols and standards to facilitate sharing and analysis of these repertoire data through the AIRR Data Commons (ADC).MethodsThe iReceptor Gateway (www. ireceptor.org) implements the AIRR Data Commons as a network of federated repositories which facilitates data queries and advanced analyses. Secure data repositories, single cell immune profiling, and RNA gene expression and more detailed cell phenotype data for Systems Immunology are being added by the iReceptor Plus consortium, funded by Canadian Institutes of Health Research (CIHR) and the EU Horizon 2020 program.ResultsAs of August 2020, the iReceptor Gateway provides access to 2.7 billion receptor sequences, from 2779 repertoires, and 46 studies; these include 3 B-cell and 10 T-cell cancer studies. These can be queried for specific CDR3 sequences, in order to test whether particular sequences are public (occurring in multiple patients) or private (only found in a few individuals). These can also be queried for specific ‘metadata’, e.g. ‘find all repertoires from studies of ovarian cancer.’ The Gateway aggregates these repertoire data for further analysis by sophisticated AIRR-seq algorithms on HPC resources.ConclusionsAnalysis of aggregated AIRR-seq data through the iReceptor Gateway has great potential to revolutionize many aspects of cancer immunotherapy. The FDA has already approved the use of AIRR-seq data for monitoring clonal expansion as a diagnostic tool in MRD (minimal residual disease). Sequences from tumor specific clones provide targets for monoclonal antibodies in anti-checkpoint therapy and CAR-T cell approaches. Several studies have shown that AIRR-seq data provide biomarkers that partition patients into responders/non-responders and predict those who may exhibit adverse reactions to novel cancer immunotherapies. This potential will be realized as more researchers adopt the AIRR Community standards for sharing and analyzing AIRR-seq data, resulting in more efficient biomedical research and improved patient care.AcknowledgementsFunded by the European Union’s H2020 Research and Innovation Programme under Grant Agreement No. 825821 and Canadian Institutes of Health Research (CIHR)
APA, Harvard, Vancouver, ISO, and other styles
27

Ma, Hao Jian, Shun Hua Tan, and Yu Long Yang. "Redundant Network Research Report." Applied Mechanics and Materials 556-562 (May 2014): 5359–62. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5359.

Full text
Abstract:
Redundant traffic is refers to the network between the two nodes of the same content repeated more than once. We can provide better user behavior analysis and personalized services for the net users by analyzing of the network packets into the application layer, analyzing of network resource location and the size of the volume of data accurately and researching the characteristics of the network redundancy flow which can provide references for the evolution of the network technology especially for the CNGI’s new standards and protocols.
APA, Harvard, Vancouver, ISO, and other styles
28

Nikolaidis, I. "Optical Network Control, Architecture, Protocols, and Standards [Book Review]." IEEE Network 18, no. 3 (May 2004): 4. http://dx.doi.org/10.1109/mnet.2004.1301009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Chefrour, Djalel. "One-Way Delay Measurement From Traditional Networks to SDN." ACM Computing Surveys 54, no. 7 (July 2021): 1–35. http://dx.doi.org/10.1145/3466167.

Full text
Abstract:
We expose the state of the art in the topic of one-way delay measurement in both traditional and software-defined networks. A representative range of standard mechanisms and recent research works, including OpenFlow and Programming Protocol-independent Packet Processors (P4)-based schemes, are covered. We classify them, discuss their advantages and drawbacks, and compare them according to their application environment, accuracy, cost, and robustness. The discussion extends to the reuse of traditional schemes in software-defined networks and the benefits and limitations of the latter with respect to reducing the overhead of network wide measurements. We conclude with a summary of learned lessons and open challenges for future work.
APA, Harvard, Vancouver, ISO, and other styles
30

Tiberti, Walter, Federica Caruso, Luigi Pomante, Marco Pugliese, Marco Santic, and Fortunato Santucci. "Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks." International Journal of Distributed Sensor Networks 16, no. 10 (October 2020): 155014772095167. http://dx.doi.org/10.1177/1550147720951673.

Full text
Abstract:
Among the classes of wireless personal area networks, a wireless sensor network typically refers to a versatile and densely distributed sensing platform that enables the support of a wide variety of application domains. Among the various technical challenges addressed by more than one decade of research in wireless sensor networks, security across wireless links is by far one of the most critical ones and relates to the need of guaranteeing reliability and trustiness of the collected data. This article deals with the cryptographic aspects involved in securing wireless sensor networks, in terms of confidentiality and authentication. In particular, moving from some results previously achieved in our research activity, this article extends a cryptography scheme in order to better comply with the security requirements that arise from real-world wireless sensor network installations. The proposed scheme, called topology-authenticated key scheme 2, takes advantage of hybrid cryptography to provide security in the presence of resource-constrained sensor nodes using topology-authenticated keys to provide increased robustness to the scheme itself. The proposed extensions provide full practical support to star-topology wireless sensor networks and the article presents also some experimental results obtained by implementing the scheme on two different wireless sensor network platforms available for protocol stacks compliant with the IEEE 802.15.4 standard.
APA, Harvard, Vancouver, ISO, and other styles
31

Zhao, Hai Xu, Da Wei, Liang Dong Qu, Dong Chen, and Bo Hao. "Research for CAN Node Fault Rapid Detection Based on OSEK Network Management." Applied Mechanics and Materials 128-129 (October 2011): 975–78. http://dx.doi.org/10.4028/www.scientific.net/amm.128-129.975.

Full text
Abstract:
In order to detect the fault of automotive Electronic Control Units. In this paper, we proposed and implemented Controller Area Network (CAN) node management mechanism in the light of CAN technology standards and OSEK / VDX specifications. Besides, the standard protocols for analyzing low-speed CAN network application messages and monitoring network management messages had been developed. We utilized the vehicle network remote fault diagnosis platform and CAN analysis tool ZLGCANTEST to test the CAN data and analyze its real-time monitoring state. The experiment results indicate that CAN node management is capable of rapidly completing node fault detecting and promptly report node fault information for vehicle network remote fault diagnosis.
APA, Harvard, Vancouver, ISO, and other styles
32

Liu, Yutao, Yue Li, Yimeng Zhao, and Chunhui Zhang. "Research on MAC Protocols in Cluster-Based Ad Hoc Networks." Wireless Communications and Mobile Computing 2021 (March 29, 2021): 1–12. http://dx.doi.org/10.1155/2021/5513469.

Full text
Abstract:
Mobile ad hoc networks can be widely used in many scenes, for example, military communication, emergency communication, and 5G wide area coverage as well as ultradense network scenes. A cluster-based network can decrease network overhead effectively and then constitute a large-scale network through extending network scale by clustering and cascading. In view of multiservice simultaneous transmission demand for small-scale dense networking scene and large-scale extended networking scene, a MAC protocol based on scheduling of cluster head is proposed, which can avoid collision and retransmission between nodes effectively, and then the network synchronizing in intercluster and intracluster as well as the time-slot scheduling is solved fast and efficiently. A network synchronization algorithm based on clock spread of the sponsorship node is proposed to achieve network self-synchronizing, and a modified schedule-tree algorithm based on cluster head and exactly sponsorship node is proposed to decrease network overhead and to increase network fairness, then MAC protocol based on scheduling of cluster head is verified by simulated analysis. Finally, a dynamic gateway selection algorithm based on link stability is proposed in this paper to decrease intercluster communication control overhead and improve intercluster communication reliability.
APA, Harvard, Vancouver, ISO, and other styles
33

Cui, Cui. "Using Wireless Sensor Network to Correct Posture in Sports Training Based on Hidden Markov Matching Algorithm." Journal of Sensors 2021 (September 20, 2021): 1–11. http://dx.doi.org/10.1155/2021/2159181.

Full text
Abstract:
This paper combines the research of wireless sensor networks and sports training and proposes a wireless sensor network-based intelligent sports training system. According to the requirements of the system, this design uses the wireless sensor network system as the platform for development and the ZigBee module for wireless communication. The advantage of this system is to transmit the obtained information to the ZigBee coordinator module, and after the processing of information and the resultant decision, a nonwearable unmonitored motion training model based on visual sensing is proposed. The motion terminal collects video data streams of user motion actions and extracts features to establish HMM motion recognition algorithm to achieve recognition of motion actions, automatic counting, and intelligent scoring functions. The template matching algorithm based on dynamic time regularization and weighted Euclidean distance realizes a universal real-time motion recognition algorithm with high standard and low latency and can guide the user’s motion action based on similarity calculation. The intelligent sports training system is designed and developed to maintain a high-quality human-computer interaction experience with a real-time feedback client and uploads sports data to a cloud server via the HTTP protocol, which supports real-time sports proximity query and training plan development on the website. After practical application tests, the intelligent sports training system based on the wireless sensor network proposed in this paper is stable and reliable and adds fun and competitiveness to boring sports. The research of this paper has some reference value for the application of wireless sensor networks and the research of the motion recognition algorithm.
APA, Harvard, Vancouver, ISO, and other styles
34

Kappos, L., C. Polman, A. J. Thompson, P. Duda, M. Clanet, G. Comi, H. P. Hartung, and X. Montalban. "Towards a European Network for Multiple Sclerosis Trials (ENMST)." Multiple Sclerosis Journal 9, no. 6 (December 2003): 627–29. http://dx.doi.org/10.1191/1352458503ms962xx.

Full text
Abstract:
Quality standards for clinical studies in the field of multiple sclerosis (MS) have improved significantly, to the great benefit of patients. This development has been accompanied by soaring costs and ever increasing complexity, with industry-independent trials having become virtually impossible. We propose establishing a European network that would include expertise in all the relevant aspects of MS treatment trials. In a stepwise approach, all interested active centres across Europe should be recruited into the network, based on agreement upon common scientific standards and quality requirements. Three main goals are discussed: • to facilitate identification of potentially useful agents for MS treatment; • to establish protocols for the interactio n between investigators and industry; and • to identify common standards and a core set of data to allow for comparisons of MS trials. Collaboration with existing international organizations and institutions, especially the Sylvia Lawry Centre for MS Research, as well as with similar initiatives in North A merica and other parts of the world is envisaged.
APA, Harvard, Vancouver, ISO, and other styles
35

Wong, Michael, Yi Wang, Hao Wang, April K. Marrone, Shanil P. Haugen, Kaumudi Kulkarni, Ralph Basile, and K. Scott Phillips. "RESEARCH: Fluorescence Microscopy–Based Protocol for Detecting Residual Bacteria on Medical Devices." Biomedical Instrumentation & Technology 54, no. 6 (November 1, 2020): 397–409. http://dx.doi.org/10.2345/0899-8205-54.6.397.

Full text
Abstract:
Standard methods are needed to reliably and efficiently assess bacterial contamination of processed medical devices. This article demonstrates a standard operating procedure (SOP) for fluorescence microscopy–based detection of residual bacteria on medical devices (BAC-VIS). BAC-VIS uses a 4',6-diamidino-2-phenylindole (DAPI) stain with fluorescent microscopy to quickly and cost-effectively detect bacterial contamination of processed medical device parts. The BAC-VIS protocol was optimized and achieved greater than 80% staining efficiency and a signal-to-noise ratio of more than 20 using four representative organisms. The SOP was first validated for use on a buildup biofilm model, accessory channels of contaminated clinically used devices, and inoculated endoscope end caps and O-rings. The buildup biofilm model was used to evaluate BAC-VIS after repeated treatment of adherent bacteria with three common high-level disinfectants: glutaraldehyde, ortho-phthalaldehyde, and peracetic acid. Next, BAC-VIS was used to assess clinically used endoscope parts that cultured positive for Gram-negative bacteria. DAPI-stained cells were found on all culture-positive devices, especially in grooves and imperfections on the surface. Finally, BAC-VIS was used to detect bacteria on inoculated endoscope device components. The results showed potential for BAC-VIS to be a valuable tool for industry and academic/medical researchers for investigations of contaminated medical devices. Results obtained using BAC-VIS can increase understanding of the role of design in cleanability, wear, and prevention of contamination and may lead to improvements in materials and design that could make processed endoscope use safer for patients. Of note, this protocol is not for detecting bacteria on scopes or scope parts that will be put back into clinical use.
APA, Harvard, Vancouver, ISO, and other styles
36

Fan, Yi Xing, and Ren Bing Zhang. "Research on Network Security and Identity Authentication." Advanced Materials Research 926-930 (May 2014): 2046–49. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2046.

Full text
Abstract:
With the rapid development of computer networks and the popularity of network applications, network security has been people's increasing attention. Network security is an important issue under Network environment, authentication technology plays a very important role for network application security. Through the study of reason perish analysis and system design, providing efficient and practical solutions for network security applications system. The purpose of this paper is to research on authentication mechanisms and authentication protocols, analysis characteristics and application environments of the network authentication system, develop the VIKEY online dynamic two-factor password authentication system.
APA, Harvard, Vancouver, ISO, and other styles
37

Munir, Handy Ali, Nordin Saad, Syed Alwee Aljunid Syed Junid, Ahmad Mujahid Ahmad Zaidi, and Muhammad Kamarul Baharin. "Comparison between Two Types of Computer for Industrial Ethernet Performance." Advanced Materials Research 433-440 (January 2012): 4959–67. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.4959.

Full text
Abstract:
Ethernet is now the dominant networking in the home and office environment. Advanced of the network technology and convergence of communications, control and computer enabled the Networked Control System (NCS). Industrial Ethernet (IE) is the applications of IEEE 802.3 standards with requirements of factory equipment and network protocols. The connection based on star topology for the real-time communication between a computer and PLC. Analysis of performance based on data transfer rate, packets speed, packets volume, sum volume (KByte), Central Processing Unit (CPU) usage, percent available Read Access Memory (RAM), available Read Access Memory (RAM) and Packet InterNet Groper (PING) are conducted. It is shown that packets speed and packets volume for two types of the computer is approximately same between computer 1 and computer 2.
APA, Harvard, Vancouver, ISO, and other styles
38

Faouzi, Hassan, Hicham Mouncif, and Mohamed Lamsaadi. "AODV Energy Routing Mechanism for Multi-Channel Multi-Interface Ad Hoc Networks (EMCMI-AODV) Using a Dynamic Programming Algorithm." International Journal of Mobile Computing and Multimedia Communications 7, no. 4 (October 2016): 1–16. http://dx.doi.org/10.4018/ijmcmc.2016100101.

Full text
Abstract:
Energy consumption is a significant issue and offers a rich scope for research in ad hoc networks. However, many energy efficiency routing protocols are configured to use only a single Interface single Channel (SISC). As a result, these networks rarely can fully exploit all bandwidth available in the radio spectrum provisioned by the standards. This paper proposes two extensions to the shortest-path routing algorithm that finds routes to balance load based on residual energy of nodes and hops of route, one uses Floyd Warshall and the other uses Bellman-Ford algorithm. The protocols work with nodes equipped with a multiple network interface to overcome the problems of SISC where each node is equipped with a single antenna to ensure connectivity with all other nodes. The proposed protocols primarily exploit the idea of interaction among MAC and Network layers by using a novel cross-layer routing solution. The performance of the proposed protocols were evaluated using different scenarios and performance metrics, and achieved good results compared with similar works in the field.
APA, Harvard, Vancouver, ISO, and other styles
39

Kochhar, Aarti, Pardeep Kaur, Preeti Singh, and Sukesha Sharma. "Protocols for Wireless Sensor Networks: A Survey." Journal of Telecommunications and Information Technology 1 (March 28, 2018): 77–87. http://dx.doi.org/10.26636/jtit.2018.117417.

Full text
Abstract:
This paper presents a survey on the MAC and network layer of Wireless Sensor Networks. Performance requirements of the MAC layer are explored. MAC layer protocols for battery-powered networks and energy harvesting-based networks are discussed and compared. A detailed discussion on design constraints and classification of routing protocols is presented. Several routing protocols are compared in terms of such parameters as: energy consumption, scalability, network lifetime and mobility. Problems that require future research are presented. The cross-layer approach for WSNs is also surveyed.
APA, Harvard, Vancouver, ISO, and other styles
40

Zebrack, Brad, Karen Kayser, Laura Sundstrom, Sue Ann Savas, Chris Henrickson, Chiara Acquati, and Rebecca L. Tamas. "Psychosocial Distress Screening Implementation in Cancer Care: An Analysis of Adherence, Responsiveness, and Acceptability." Journal of Clinical Oncology 33, no. 10 (April 1, 2015): 1165–70. http://dx.doi.org/10.1200/jco.2014.57.4020.

Full text
Abstract:
Purpose The American College of Surgeons Commission on Cancer has mandated implementation of a systematic protocol for psychosocial distress screening and referral as a condition for cancer center accreditation beginning in 2015. Compliance with standards requires evidence that distress screening protocols are carried out as intended and result in appropriate referral and follow-up when indicated. The purpose of this study was to examine the fidelity of distress screening protocols at two tertiary cancer treatment centers. Methods A retrospective review and analysis of electronic medical records over a 12-week period examined clinic adherence to a prescribed distress screening protocol and responsiveness to patients whose scores on the National Comprehensive Cancer Network Distress Thermometer (DT) indicated clinically significant levels of distress requiring subsequent psychosocial contact. A weekly online survey assessed clinician perspectives on the acceptability of the protocol. Results Across clinics, rates of adherence to the distress screening protocol ranged from 47% to 73% of eligible patients. For patients indicating clinically significant distress (DT score ≥ 4), documentation of psychosocial contact or referral occurred, on average, 50% to 63% of the time, and was more likely to occur at one of two participating institutions when DT scores were high (DT score of 8 to 10). Clinician assessments of the protocol's utility in addressing patient concerns and responding to patient needs were generally positive. Conclusion Systematic tracking of distress screening protocols is needed to demonstrate compliance with new standards of care and to demonstrate how well institutions are responding to their clinical obligation to address cancer patients' emotional and psychosocial needs.
APA, Harvard, Vancouver, ISO, and other styles
41

Chen, Tao, and Min Lu. "Collaborative System Energy Efficiency of the Application of Routing Protocols in Wireless Sensor Network Research." International Journal of Future Generation Communication and Networking 8, no. 3 (June 30, 2015): 213–22. http://dx.doi.org/10.14257/ijfgcn.2015.8.3.20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Konashevych, Oleksii. "Cross-blockchain protocol for public registries." International Journal of Web Information Systems 16, no. 5 (November 2, 2020): 571–610. http://dx.doi.org/10.1108/ijwis-07-2020-0045.

Full text
Abstract:
Purpose The purpose of this paper is to present a concept of the protocol for public registries based on blockchain. New database protocol aims to use the benefits of blockchain technologies and ensure their interoperability. Design/methodology/approach This paper is framed with design science research (DSR). The primary method is exaptation, i.e. adoption of solutions from other fields. The research is looking into existing technologies which are applied here as elements of the protocol: Name-Value Storage (NVS), Berkley DB, RAID protocol, among others. The choice of NVS as a reference technology for creating a database over blockchain is based on the analysis and comparison with two other similar technologies Bigchain and Amazon QLDB. Findings The proposed mechanism allows creating a standard database over a bundle of distributed ledgers. It ensures a blockchain agnostic approach and uses the benefits of various blockchain technologies in one ecosystem. In this scheme, blockchains play the role of journal storages (immutable log), whereas the overlaid database is the indexed storage. The distinctive feature of such a system is that in blockchain, users can perform peer-to-peer transactions directly in the ledger using blockchain native mechanism of user access management with public-key cryptography (blockchain does not require to administrate its database). Originality/value This paper presents a new method of creating a public peer-to-peer database across a bundle of distributed ledgers.
APA, Harvard, Vancouver, ISO, and other styles
43

Hansson, Andreas, Kees Goossens, and Andrei Rădulescu. "Avoiding Message-Dependent Deadlock in Network-Based Systems on Chip." VLSI Design 2007 (April 30, 2007): 1–10. http://dx.doi.org/10.1155/2007/95859.

Full text
Abstract:
Networks on chip (NoCs) are an essential component of systems on chip (SoCs) and much research is devoted to deadlock avoidance in NoCs. Prior work focuses on the router network while protocol interactions between NoC and intellectual property (IP) modules are not considered. These interactions introduce message dependencies that affect deadlock properties of the SoC as a whole. Even when NoC and IP dependency graphs are cycle-free in isolation, put together they may still create cycles. Traditionally, SoCs rely solely on request-response protocols. However, emerging SoCs adopt higher-level protocols for cache coherency, slave locking, and peer-to-peer streaming, thereby increasing the complexity in the interaction between the NoC and the IPs. In this paper, we analyze message-dependent deadlock, arising due to protocol interactions between the NoC and the IP modules. We compare the possible solutions and show that deadlock avoidance, in the presence of higher-level protocols, poses a serious challenge for many current NoC architectures. We evaluate the solutions qualitatively, and for a number of designs we quantify the area cost for the two most economical solutions, strict ordering and end-to-end flow control. We show that the latter, which avoids deadlock for all protocols, adds an area and power cost of 4% and 6%, respectively, of a typical Æthereal NoC instance.
APA, Harvard, Vancouver, ISO, and other styles
44

Zhang, Li. "Research on the Interference Signal Separation and Purification Technology in Computer Network Intrusion." Applied Mechanics and Materials 602-605 (August 2014): 2031–34. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.2031.

Full text
Abstract:
in the process of computer network communication, different signals subject to different communication protocols and with different signal characteristics. After invading, an entangled state which cannot be constraint formed between the signals. The characteristic differences in the polarization domain between invasion signal and communication signal is significantly reduced, and it is not easy to purify. To solve this problem, in this paper, an novel intrusion signal classification model of orthogonal polarization array is established. According to the signal loss characteristics changed by the invasion polarization, it can achieve the characteristics separation of desired signal and interference signal in the region of the polarization. the interference immunity of the separated signal is performed by a simulation analysis, it can proved that taking this vector signal processing approach not only extends the capabilities of invasion signal processing in multi-signal communications, and can significantly improve the performance of interference resistance of multi-signal network communication system.
APA, Harvard, Vancouver, ISO, and other styles
45

Paul, Ayan, Madhubanti Maitra, Swarup Mandal, and Samir K. Sadhukhan. "Handoff Cost Minimization and Planning of Next Generation Heterogeneous Integrated Overlay Networks." International Journal of Business Data Communications and Networking 6, no. 1 (January 2010): 1–16. http://dx.doi.org/10.4018/jbdcn.2010010101.

Full text
Abstract:
Next-generation wireless technologies have seen a paradigm shift as multiple standards and protocols emerge almost every day. Each standard has its limitations and merits, which can be either masked or complemented by other standards. For commercialization, various services should be provided in a cost effective manner, compelling a service provider to roll out integrated next generation wireless networks to exploit the virtues of each. This paper discusses the planning problem of overlay network integrating, particularly 3G, WiMAX and WLAN, establishing proper connectivity among the three networks. In the proposed planning approach, the authors focused on the initial phase and have minimized the cost for vertical handoff generated, and the cost for wire line connection amongst the various network gateways of the overlay hierarchy. To validate the planning problem, the simulated annealing (SA), a well-cited meta-heuristic H-II are presented and compared with a variant of distance based planning (DBP).
APA, Harvard, Vancouver, ISO, and other styles
46

Zhang, Li-li, Qi Zhao, Li Wang, and Ling-yu Zhang. "Research on Urban Traffic Signal Control Systems Based on Cyber Physical Systems." Journal of Advanced Transportation 2020 (October 20, 2020): 1–16. http://dx.doi.org/10.1155/2020/8894812.

Full text
Abstract:
In this paper, we present a traffic cyber physical system for urban road traffic signal control, which is referred to as UTSC-CPS. With this proposed system, managers and researchers can realize the construction and simulation of various types of traffic scenarios, the rapid development, and optimization of new control strategies and can apply effective control strategies to actual traffic management. The advantages of this new system include the following. Firstly, the fusion architecture of private cloud computing and edge computing is proposed for the first time, which effectively improves the performance of software and hardware of the urban road traffic signal control system and realizes information security perception and protection in cloud and equipment, respectively, within the fusion framework; secondly, using the concept of parallel system, the depth of real-time traffic control subsystem and real-time simulation subsystem is realized. Thirdly, the idea of virtual scene basic engine and strategy agent engine is put forward in the system design, which separates data from control strategy by designing a general control strategy API and helps researchers focus on control algorithm itself without paying attention to detection data and basic data. Finally, considering China, the system designs a general control strategy API to separate data from control strategy. Most of the popular communication protocols between signal controllers and detectors are private protocols. The standard protocol conversion middleware is skillfully designed, which decouples the field equipment from the system software and achieves the universality and reliability of the control strategy. To further demonstrate the advantages of the new system, we have carried out a one-year practical test in Weifang City, Shandong Province, China. The system has been proved in terms of stability, security, scalability, practicability and rapid practice, and verification of the new control strategy. At the same time, it proves the superiority of the simulation subsystem in the performance and simulation scale by comparing the different-scale road networks of Shunyi District in Beijing and Weifang City in Shandong Province. Further tests were conducted using real intersections, and the results were equally valid.
APA, Harvard, Vancouver, ISO, and other styles
47

Shende, Dipali K., Sonavane S.S, and Yogesh Angal. "A Comprehensive Survey of the Routing Schemes for IoT applications." Scalable Computing: Practice and Experience 21, no. 2 (June 27, 2020): 203–16. http://dx.doi.org/10.12694/scpe.v21i2.1667.

Full text
Abstract:
Internet of Things (IoT) is with a perception of ‘anything’, ‘anywhere’ and provides the interconnection among devices with a remarkable scale and speed. The prevalent intention of IoT is the datatransmission through the internet without the mediation of humans. An efficient routing protocol must be included in the IoT network for the accomplishment of its objectives and securing data transmission. Accordingly, the survey presents various routing protocols for secure data communication in IoT for providing a clear vision as the major issue in the IoT networks is energy consumption. Therefore, there is a need for devising an effective routing scheme to provide superior performance over the other existing schemes in terms of energy consumption. Thus, this review article provides a detailed review of 52 research papers presenting the suggested routing protocols based on the contentbased, clustering-based, fuzzy-based, Routing Protocol for Low power and Lossy Networks, tree-based and so on. Also, a detailed analysis and discussion are made by concerning the parameters, simulation tool, and year of publication, network size, evaluation metrics, and utilized protocols. Finally, the research gaps and issues of various conventional routing protocols are presented for extending the researchers towards a better contribution of routing protocol for the secure IoT routing.
APA, Harvard, Vancouver, ISO, and other styles
48

Guo, Junyan, and Ye Du. "A Novel RLWE-Based Anonymous Mutual Authentication Protocol for Space Information Network." Security and Communication Networks 2020 (August 25, 2020): 1–12. http://dx.doi.org/10.1155/2020/5167832.

Full text
Abstract:
Currently, space information network (SIN) has become an increasingly important role in real life. As a large heterogeneous wireless network, SIN can better provide global mobile services to users anytime and anywhere, even in extreme geographic environments. In addition, there is no need to build the communication base-stations every few kilometers on the ground to ensure high service quality, which greatly reduces the construction costs and can be used as an economical communication method in sparsely populated areas. So there is a trend that more and more end users are more likely to get SIN services than traditional terrestrial cellular networks. However, due to the openness and publicity of the satellite wireless channel and the limited resources of the satellite nodes, the privacy and security cannot be perfectly guaranteed and may even be vulnerable to attacks initiated by the adversary such as replay attacks, impersonation attacks, and eavesdropping attacks. To improve the access security of SIN, researchers have proposed a series of authentication protocols based on different cryptographic assumptions. Nevertheless, existing research shows that these protocols cannot meet the requirements of higher and higher security and short authentication delay. In addition, these protocols are mainly based on public key cryptography mechanisms such as DLP and ECDLP, which can be solved by postquantum computers in polynomial time, so these protocols will no longer be secure. To solve the vulnerability of these protocols, in this paper, we propose a new RLWE-based anonymous mutual authentication and key agreement protocol, which guarantees higher security with low computational overhead even in the postquantum era. Detailed security analysis shows that our protocol meets security requirements and is resistant to a variety of known attacks. Besides, combining security comparison and performance analysis, our proposed protocol is more practical than other protocols in SIN.
APA, Harvard, Vancouver, ISO, and other styles
49

Jain, Neha, Ashish Payal, and Aarti Jain. "Effect of data packet size on the performance of RIP and OSPF routing protocols in hybrid networks." International Journal of Pervasive Computing and Communications 17, no. 4 (September 10, 2021): 361–76. http://dx.doi.org/10.1108/ijpcc-02-2021-0036.

Full text
Abstract:
Purpose The purpose of this study is to calculate the effect of different packet sizes 256, 512, 1,024 and 2,048 bytes on a large-scale hybrid network and analysis and identifies which routing protocol is best for application throughput, application delay and network link parameters for different packet sizes. As the routing protocol is used to select the optimal path to transfer data packets from source to destination. It is always important to consider the performance of the routing protocol before the final network configuration. From the literature, it has been observed that RIP (Routing Information Protocol) and OSPF (Open Shortest Path First) are the most popular routing protocols, and it has always been a challenge to select between these routing protocols, especially for hybrid networks. The efficiency of routing protocol mainly depends on resulting throughput and delay. Also, it has been observed that data packet size also plays an essential role in determining the efficiency of routing protocol. Design/methodology/approach To analyse the effect of different packet sizes using two routing protocols, routing information protocol (RIP) and open shortest path first (OSPF) on the hybrid network, require detailed planning. Designing the network for simulate and then finally analysing the results requires proper study. Each stage needs to be understood well for work accomplishment. Thus, the network’s simulation and evaluation require implementing the proposed work step by step, saving time and cost. Here, the proposed work methodology is defined in six steps or stages. Findings The simulation results show that both routing protocols – RIP and OSPF are equally good in terms of network throughput for all different packet sizes. However, OSPF performs better in terms of network delay than RIP routing protocol in different packet size scenarios. Research limitations/implications In this paper, a fixed network of 125 objects and only RIP and OSPF routing protocol have been used for analysis. Therefore, in the future, a comparison of different network sizes can be considered by increasing or decreasing the number of objects in the proposed network. Furthermore, the other routing protocols can be used for performance evaluation on the same proposed network. Originality/value The analysis can be conducted by simulation of the network, enabling us to develop a network environment without restricting the selection of parameters as it minimizes cost, network deployment overhead, human resources, etc. The results are analysed, calculated and compared for each packet size on different routing protocol networks individually and the conclusion is made.
APA, Harvard, Vancouver, ISO, and other styles
50

Majcher, Ariel, Arkadiusz Cwiek, Mikołaj Cwiok, Lech Mankiewicz, Marcin Zaremba, and Aleksander F. Zarnecki. "“PI OF THE SKY” OFF-LINE EXPERIMENT WITH GLORIA." Acta Polytechnica 54, no. 3 (June 27, 2014): 205–9. http://dx.doi.org/10.14311/ap.2014.54.0205.

Full text
Abstract:
GLORIA is the first free and open-access network of robotic telescopes in the world. Based on the Web 2.0 environment, amateur and professional users can do research in astronomy by observing with robotic telescope, and/or analyzing data acquired with GLORIA, or from other free access databases. The GLORIA project develops free standards, protocols and tools for controlling Robotic Telescopes and related instrumentation, for scheduling observations in the telescope network, and for conducting so-called off-line experiments based on the analysis of astronomical data. This contribution summarizes the implementation and results from the first research level off-line demonstrator experiment implemented in GLORIA, which was based on data collected with the “Pi of the Sky” telescope in Chile.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography