To see the other types of publications on this topic, follow the link: Data ACK.

Journal articles on the topic 'Data ACK'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Data ACK.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Suherman, Suherman. "Delay reduction of transmission control protocol in WiMAX by prioritizing the acknowledgement packets." MATEC Web of Conferences 197 (2018): 11021. http://dx.doi.org/10.1051/matecconf/201819711021.

Full text
Abstract:
Transmission Control Protocol (TCP) provides reliable connection by acknowledging every transmitted packet. The faster the acknowledgement (ACK) packet is received, the quicker the next TCP window is sent. Previous study shows that by prioritizing the ACK packet route, the TCP delay for the whole data transmission is reduced. This article utilized the medium access within WiMAX network, which is the scheduler, to prioritize the ACK packet transmission. The NS-2 evaluations with various data rate transmission show that the WiMAX scheduling to prioritize the ACK packet successfully reduces the whole data transmission delay. In average, a thirty-second video duration takes 755 ms faster when prioritized ACK is applied.
APA, Harvard, Vancouver, ISO, and other styles
2

Nguyen Van, Dat, Hoang Tran Minh, Thanh Tuyen Nguyen Thi, and Truc Nguyen Thanh. "Acesulfame K in alcohol-free beverages in Binh Duong in 2018 and the declaration of Acesulfame K content on labels." Heavy metals and arsenic concentrations in water, agricultural soil, and rice in Ngan Son district, Bac Kan province, Vietnam 2, no. 3 (2019): 31–37. http://dx.doi.org/10.47866/2615-9252/vjfc.83.

Full text
Abstract:
Background: Acesulfame-K (ACK) is one of the artificial sweeters in modern diet with low calories content. However, toxicity data of ACK has not yet been studied adequately. The overuse of ACK in food manufacturing is considered a long-term issue for comsumers’ health. Objectives: The aim is to determine ACK contents in alcohol-free beverages and the percentage of enterprises that comply with the ACK declaration on labels of the products sold in Binh Duong province in 2018. Method: A cross-sectional study was conducted in 58 alcohol-free beverage samples with different brands sold in Binh Duong Province from July to October of 2018. Results: The prevalence of alcohol-free beverages containing ACK, which were for sale in Binh Duong Province, was 50 %. The ACK contents varied from 11.85 to 481.7 mg/L with the average of 175.23 ± 113.35 mg/L. The highest average ACK content was found in aroma beverages (208.24 ± 127.89 mg/L) and the lowest one was detected in fruit juices (99.03 ± 92.78 mg/L). There were 65.5% of products containing ACK, nonetheless, ACK was not declared onthe label to consumers and regulatory agencies.
APA, Harvard, Vancouver, ISO, and other styles
3

Vázquez-Gallego, Francisco, Pere Tuset-Peiró, Luis Alonso, and Jesús Alonso-Zárate. "Delay and Energy Consumption Analysis of Frame Slotted ALOHA variants for Massive Data Collection in Internet of Things Scenarios." Apllied sciences 10, no. 1 (2020): 327. https://doi.org/10.3390/app10010327.

Full text
Abstract:
This paper models and evaluates three FSA-based (Frame Slotted ALOHA) MAC (Medium Access Control) protocols, namely FSA-ACK (FSA with ACKnowledgements), FSA-FBP (FSA with FeedBack Packets) and DFSA (Dynamic FSA). The protocols are modeled using an AMC (Absorbing Markov Chain), which allows to derive analytic expressions for the average packet delay, as well as the energy consumption of both the network coordinator and the end-devices. The results, based on computer simulations, show that the analytic model is accurate and outline the benefits of DFSA. In terms of delay, DFSA provides a reduction of 17% (FSA-FBP) and 32% (FSA-ACK), whereas in terms of energy consumption DFSA provides savings of 23% (FSA-FBP) and 28% (FSA-ACK) for the coordinator and savings of 50% (FSA-FBP) and 24% (FSA-ACK) for end-devices. Finally, the paper provides insights on how to configure each FSA variant depending on the network parameters, i.e., depending on the number of end-devices, to minimize delay and energy expenditure. This is specially interesting for massive data collection in IoT (Internet of Things) scenarios, which typically rely on FSA-based protocols and where the operation has to be optimized to support a large number of devices with stringent energy consumption requirements.
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Yuanyuan, and Marine Minier. "Selective Forwarding Attacks against Data and ACK Flows in Network Coding and Countermeasures." Journal of Computer Networks and Communications 2012 (2012): 1–14. http://dx.doi.org/10.1155/2012/184783.

Full text
Abstract:
Network coding has attracted the attention of many researchers in security and cryptography. In this paper, a well-known attackselective forwarding attackwill be studied in network coding systems. While most of the works have been dedicated to the countermeasures against pollution attacks where an attacker modifies intermediate packets, only few works concern selective forwarding attacks on data or acknowledgment (ACK) packets; those last ones are required in network coding. However, selective forwarding attacks stay a real threat in resource constraint networks such as wireless sensor networks, especially when selective forwarding attacks target the acknowledgment (ACK) messages, referred to asflooding attack. In the latter model, an adversary can easily create congestion in the network and exhaust all the resources available. The degradation of the QoS (delay, energy) goes beyond the capabilities of cryptographic solutions. In this paper, we first simulate and analyze the effects of selective forwarding attacks on both data flows and ACK flows. We then investigate the security capabilities of multipath acknowledgment in more details than in our original proposal (Zhang et al., 2011).
APA, Harvard, Vancouver, ISO, and other styles
5

Vázquez-Gallego, Francisco, Pere Tuset-Peiró, Luis Alonso, and Jesus Alonso-Zarate. "Delay and Energy Consumption Analysis of Frame Slotted ALOHA variants for Massive Data Collection in Internet-of-Things Scenarios." Applied Sciences 10, no. 1 (2020): 327. http://dx.doi.org/10.3390/app10010327.

Full text
Abstract:
This paper models and evaluates three FSA-based (Frame Slotted ALOHA) MAC (Medium Access Control) protocols, namely, FSA-ACK (FSA with ACKnowledgements), FSA-FBP (FSA with FeedBack Packets) and DFSA (Dynamic FSA). The protocols are modeled using an AMC (Absorbing Markov Chain), which allows to derive analytic expressions for the average packet delay, as well as the energy consumption of both the network coordinator and the end-devices. The results, based on computer simulations, show that the analytic model is accurate and outline the benefits of DFSA. In terms of delay, DFSA provides a reduction of 17% (FSA-FBP) and 32% (FSA-ACK), whereas in terms of energy consumption DFSA provides savings of 23% (FSA-FBP) and 28% (FSA-ACK) for the coordinator and savings of 50% (FSA-FBP) and 24% (FSA-ACK) for end-devices. Finally, the paper provides insights on how to configure each FSA variant depending on the network parameters, i.e., depending on the number of end-devices, to minimize delay and energy expenditure. This is specially interesting for massive data collection in IoT (Internet-of-Things) scenarios, which typically rely on FSA-based protocols and where the operation has to be optimized to support a large number of devices with stringent energy consumption requirements.
APA, Harvard, Vancouver, ISO, and other styles
6

Strait, Kevin A., Peter K. Stricklett, Mark Chapman, and Donald E. Kohan. "Characterization of vasopressin-responsive collecting duct adenylyl cyclases in the mouse." American Journal of Physiology-Renal Physiology 298, no. 4 (2010): F859—F867. http://dx.doi.org/10.1152/ajprenal.00109.2009.

Full text
Abstract:
Little is known about collecting duct adenylyl cyclase (AC) isoforms or regulation in the mouse. We performed RT-PCR for AC isoforms 1–9 in microdissected cortical (CCD) and outer medullary (OMCD) and acutely isolated inner medullary (IMCD) collecting duct. All collecting duct regions contained AC3, AC4, and AC6 mRNA, while CCD and OMCD, but not IMCD, also contained AC5 mRNA. Acutely isolated IMCD expressed AC3, AC4, and AC6 proteins by Western blot analysis. The mIMCD3 cell line expressed AC2, AC3, AC4, AC5, and AC6 mRNA; M-1 CCD cells expressed AC2, 3, 4, and 6, while mpkCCD cell lines contained AC3, AC4, and AC6 mRNA. AVP stimulated cAMP accumulation in acutely isolated mouse IMCD; this was reduced by chelation of extracellular calcium (EGTA) and almost completely abolished by blockade of calmodulin (W-7). Blockade of calmodulin kinase with KN-93 or endoplasmic reticulum calcium ATPase (thapsigargin) also reduced the AVP response. A similar inhibitory effect of W-7, KN-93, and thapsigargin was seen on forskolin-stimulated cAMP content in acutely isolated mouse IMCD. These three agents had the same pattern of blockade of AVP- or forskolin-stimulated AC activity in acutely isolated rat IMCD. AVP responsiveness in primary cultures of mouse IMCD was also reduced by W-7, KN-93, and thapsigargin. Small interfering RNA (siRNA) designed to knock down AC3 or AC6 in primary cultured mouse IMCD significantly reduced AVP-stimulated cAMP accumulation. Together, these data are consistent with a role of AC3 and AC6 in the activation of mouse collecting duct by AVP.
APA, Harvard, Vancouver, ISO, and other styles
7

Han, Jung-Han, Hyoung-Gyu Choi, and Seung-Jae Han. "Acknowledgement Corruption: A New Aspect of Physical Layer Capture in IEEE 802.11 Networks." Wireless Communications and Mobile Computing 2018 (2018): 1–15. http://dx.doi.org/10.1155/2018/3096710.

Full text
Abstract:
Even if a collision occurs in IEEE 802.11 network, a transmission may be successfully decoded at the receiver if the signal strength of one transmission is sufficiently stronger than the other transmission. This phenomenon is called “Physical Layer Capture” (PLC). While existing works have considered PLC between data frames, in this paper we investigate the case that an ACK frame collides with the unfinished transmission of other data frames after the occurrence of PLC between data frames. As a result of this collision, the ACK frame may be corrupted and the corresponding data frame needs to be retransmitted. We call this phenomenon “ACK Corruption” (AC). We identify the characteristic of AC via extensive experiments and simulations. Our study reveals that AC can occur in all IEEE 802.11 variants and its chance is dependent upon the relative signal strength between the stations and the MCS setting used. Further, we devise a way to avoid AC occurrence and evaluate its effectiveness.
APA, Harvard, Vancouver, ISO, and other styles
8

Statkus, Arūnas, Šarūnas Paulikas, and Audrius Krukonis. "TCP Acknowledgment Optimization in Low Power and Embedded Devices." Electronics 10, no. 6 (2021): 639. http://dx.doi.org/10.3390/electronics10060639.

Full text
Abstract:
Paper investigates transport control protocol (TCP) acknowledgment (ACK) optimization in low power or embedded devices to improve their performance on high-speed links by limiting the ACK rate. Today the dominant protocol for interconnecting network devices is the TCP and it has a great influence on the entire network operation if the processing power of network devices is exhausted to the processing data from the TCP stack. Therefore, on high-speed not congested networks the bottleneck is no longer the network link but low-processing power network devices. A new ACK optimization algorithm has been developed and implemented in the Linux kernel. Proposed TCP stack modification minimizes the unneeded technical expenditure from TCP flow by reducing the number of ACKs. The results of performed experiments show that TCP ACK rate limiting leads to the noticeable decrease of CPU utilization on low power devices and an increase of TCP session throughput but does not impact other TCP QoS parameters, such as session stability, flow control, connection management, congestion control or compromises link security. Therefore, more resources of the low-power network devices could be allocated for high-speed data transfer.
APA, Harvard, Vancouver, ISO, and other styles
9

Wijaya, Hendra, and Wahyu Andhyka Kusuma. "Implementasi Sistem Multi-Telemetri menggunakan Protokol RF24 untuk monitoring Pada Greenhouse." Techno.Com 17, no. 4 (2018): 365–76. http://dx.doi.org/10.33633/tc.v17i4.1788.

Full text
Abstract:
Dewasa ini, sistem multi telemetri sudah banyak digunakan pada berbagai bidang. Multi telemetri merupakan susunan dari beberapa telemetri. Telemetri merupakan transmisi data dari jarak jauh yang memungkinkan pengaksesan data hasil pengukuran dari jarak/lokasi yang jauh dari tempat asal pengukuran terjadi. Pada penelitian ini dilakukan perancangan sistem multi telemetri untuk pengukuran suhu dan kelembaban pada prototype greenhouse. Pada proses sensing, sensor yang digunakan adalah sensor DHT 11 dan modul yang digunakan untuk pengiriman data adalah modul transceiver nRF24l01. Dalam penelitian, dilakukan uji performa kinerja dari Nrf24l01 sebagai modul transceiver apakah modul ini berfungsi dengan baik ketika melakukan pengiriman data. Pengujian pengiriman data dari Sensor node ke sink node dilakukan dengan 3 macam data rate yaitu 250Kbps, 1Mbps, dan 2Mbps. Pengujian ketika auto ACK digunakan dan tidak, Error ratio, missing handling, RTT, dan jarak jangkau juga dilakukan. Berdasarkan hasil pengujian didapatkan, penggunaan auto ACK akan membuat pengiriman data tidak stabil dan RTT semakin lama. Jika auto ACK dimatikan, maka data rate 2Mbps memiliki waktu pengiriman paling cepat dibandingkan data rate lainnya. Modul transceiver nrf24l01 sendiri memiliki jarak jangkau +-60 m. Untuk missing handling data, array dimanfaatkan untuk menyimpan data sementara.
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Hua. "Design and Implementation of Wireless Sensor Network Data Transfer Protocol." Applied Mechanics and Materials 539 (July 2014): 220–23. http://dx.doi.org/10.4028/www.scientific.net/amm.539.220.

Full text
Abstract:
This paper discussed the problem of wireless sensor network data transmission protocols, and combined with the characteristics of WSN and the actual needs, the design and implementation of a data transmission priority queue and priority transmission scheme of ACK, provide an end-to-end transmission for the important information, and achieve the timely, reliable transmission of control information.
APA, Harvard, Vancouver, ISO, and other styles
11

Omulupi, Edward A., and Nancy A. Masasabi. "EFFECTS OF APPROPRIATING LUHYIA MUSICAL STYLES TO THE AUTHENTICITY OF ANGLICAN HYMNS OF BUTERE DIOCESE, WESTERN KENYA." African Musicology Online 10, no. 2 (2021): 1–26. http://dx.doi.org/10.58721/amo.v10i2.2.

Full text
Abstract:
The Anglican Church of Kenya (ACK) liturgical hymns have been greatly influenced by African indigenous music traditions. Singing of the hymns with appropriated Luhyia musical styles has had a profound effect on its authenticity in terms of performance style, harmony, rhythm, texture, form and structure, yet no study has been done to assess the extent to which these musical elements are altered. By examining the liturgical singing of ACK hymns in Butere Diocese, this study sought to determine the effect of appropriating Luhyia musical styles on both structure and performance. The article is underpinned on Nzewi musical theory of change and continuity which states that, for change to occur and be determined, there has to be an established cultural frame of reference. The study entailed collection of qualitative data done through use of interview schedules, observation check-lists, field notebook and tape recorders. The collected data was then organized in topics of discussions, analyzed descriptively and presented thematically and by use of staff notation. The findings of the study revealed structural changes that causes divided congregational perception on the performance of appropriated ACK hymns with some congregants opposing the resultant dance movements invoked by instrumentation as lost Anglicanism, while others approving of this new style of hymnody. Therefore, in order to strike a balance between Anglicanism and forces of appropriation, the study recommends the ACK choir directors to regulate instrumentation in liturgical hymnody. It is the authors’ hope that findings of this study will encourage choir directors to compose ACK hymns within their diverse Kenyan indigenous idioms in order to localize their worship singing experiences more.
APA, Harvard, Vancouver, ISO, and other styles
12

Kim, Yonggang, Gyungmin Kim, and Hyuk Lim. "Cloud-Based Wi-Fi Network Using Immediate ACK in Uplink Data Transmissions." IEEE Access 6 (2018): 37045–54. http://dx.doi.org/10.1109/access.2018.2852622.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Cramer, Annette, Robert Gerstmeir, Steffen Schaffer, Michael Bott, and Bernhard J. Eikmanns. "Identification of RamA, a Novel LuxR-Type Transcriptional Regulator of Genes Involved in Acetate Metabolism of Corynebacterium glutamicum." Journal of Bacteriology 188, no. 7 (2006): 2554–67. http://dx.doi.org/10.1128/jb.188.7.2554-2567.2006.

Full text
Abstract:
ABSTRACT In Corynebacterium glutamicum, the acetate-activating enzymes phosphotransacetylase and acetate kinase and the glyoxylate cycle enzymes isocitrate lyase and malate synthase are coordinately up-regulated in the presence of acetate in the growth medium. This regulation is due to transcriptional control of the respective pta-ack operon and the aceA and aceB genes, brought about at least partly by the action of the negative transcriptional regulator RamB. Using cell extracts of C. glutamicum and employing DNA affinity chromatography, mass spectrometry, and peptide mass fingerprinting, we identified a LuxR-type transcriptional regulator, designated RamA, which binds to the pta-ack and aceA/aceB promoter regions. Inactivation of the ramA gene in the genome of C. glutamicum resulted in mutant RG2. This mutant was unable to grow on acetate as the sole carbon and energy source and, in comparison to the wild type of C. glutamicum, showed very low specific activities of phosphotransacetylase, acetate kinase, isocitrate lyase, and malate synthase, irrespective of the presence of acetate in the medium. Comparative transcriptional cat fusion experiments revealed that this deregulation takes place at the level of transcription. By electrophoretic mobility shift analysis, purified His-tagged RamA protein was shown to bind specifically to the pta-ack and the aceA/aceB promoter regions, and deletion and mutation studies revealed in both regions two binding motifs each consisting of tandem A/C/TG4-6T/C or AC4-5A/G/T stretches separated by four or five arbitrary nucleotides. Our data indicate that RamA represents a novel LuxR-type transcriptional activator of genes involved in acetate metabolism of C. glutamicum.
APA, Harvard, Vancouver, ISO, and other styles
14

Muhammad Gaffar, Fatmawati Gaffar, Muhammad Hasan, SKM, M.Kes, and Dr. Hj. Kartini Marzuki, M.Si. "Penerapan Model Pembelajaran Andragogical Content Knowledge (ACK) pada Mata Kuliah Psikologi Sosial." Jurnal Kewidyaiswaraan 5, no. 1 (2020): 2–10. http://dx.doi.org/10.56971/jwi.v5i1.40.

Full text
Abstract:
Pengamatan penulis selama melakukan penelitian pada proses perkuliahan khususnya mahasiswasemester III Angkatan 2018 Mata Kuliah Psikologi Sosial Jurusan Pendidikan Luar Sekolah sebagian besar mahasiswa memiliki kemampuan yang berbeda terutama dalam berinteraksi dengan dosen dalam hal mengemukakan pendapat dan sesama peserta pada saat berdiskusi maupun menyimak materi perkuliahan sehingga dari kondisi tersebut tentunya setiap mahasiswa memiliki tingkat pemahaman yang berbeda. Dari data tersebut diketahui bahwa menerapkan model pembelajaran Andragogical Content Knowledge (ACK) sangat penting untuk menunjang kondisi belajar mahasiswa dikelas menjadi optimal sehingga dapat menimbulkan hasil belajar yang optimal seperti diharapkan. Penelitian ini bertujuan untuk mengetahui dan mengkaji tentang ‘’Penerapan Model Pembelajaran Andragogical Content Knowledge (ACK) Pada Mata Kuliah Psikologi Sosial (Studi Pada Jurusan Pendidikan Luar Sekolah Fakultas Ilmu Pendidikan Universitas Negeri Makassar). Pengumpulan data dilakukan dengan menggunakan wawancara, observasi dan dokumentasi. Penerapan Model Pembelajaran Andragogical Content Knowledge (ACK) Pada Mata Kuliah Psikologi Sosial (Studi Pada Jurusan Pendidikan Luar Sekolah Fakultas Ilmu Pendidikan Universitas Negeri Makassar) dapat meningkatkan kemampuan mahasiswa dalam melakukan interaksi social sehingga mereka dapat terlibat secara langsung berpartisipasi secara aktif selama program tersebut dilaksanakan. Model pembelajaran ini, sangat efektif untuk diterapkan dalam kegiatan pembelajaran dan pelatihan terutama bagi mahasiswa maupun orang dewasa sebagai peserta pelatihan yang memerlukan pengalaman tambahan untuk peningkatan kemandirian belajar.
APA, Harvard, Vancouver, ISO, and other styles
15

Liu, Yu, and Xin Ni. "Research and DSP Realization on the Improved Algorithms for PUCCH Format 2a/2b in TD-LTE System." Applied Mechanics and Materials 543-547 (March 2014): 2103–7. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.2103.

Full text
Abstract:
In TD-LTE system, the transmitter generates PUCCH format 2a/2b information, including reference signal with 1/2 bits ACK/NACK feedback information, and the receiver first must use blind estimate to get the ACK/NACK feedback information, and then get the channel response of the reference signal symbols, then the channel response of the data symbols is obtained by time domain interpolation algorithm. This paper first introduces the traditional algorithm of d (10) and the existing algorithm, and then proposes an improved algorithms. Though simulation analysis, the improved algorithms are superior to the traditional algorithm, and the LS algorithm is to implement by DSP, after trade-offs between complexity and performance.
APA, Harvard, Vancouver, ISO, and other styles
16

Lee, Sungwon, Yeongjoon Bae, Muhammad Toaha Raza Khan, Junho Seo, and Dongkyun Kim. "Avoiding Spurious Retransmission over Flooding-Based Routing Protocol for Underwater Sensor Networks." Wireless Communications and Mobile Computing 2020 (August 25, 2020): 1–9. http://dx.doi.org/10.1155/2020/8839541.

Full text
Abstract:
In underwater wireless sensor networks (UWSN), acoustic communication naturally introduces challenges such as long propagation delay and high packet loss. The flooding-based routing protocol can address these challenges with its multipath characteristics. As in flooding-based routing, due to multipath propagation mechanism, not only DATA but also ACK messages are transmitted through multiple routes however still some packet loss will degrade the performance. So, to provide high reliability of message delivery, an efficient retransmission mechanism is inevitable. Though, if the network uses conventional transport layer protocol such as TCP, it will suffer a spurious retransmission problem as TCP was originally not designed for the multipath environment. In this paper, we propose route discrimination for flooding-based routing to reduce spurious retransmission in UWSN to solve the limitation. The notion of ACK copies waiting time (ACWT) is utilized which is selectively updated based on the similarity of paths of transmission of ACK message copies. We also improved our previous solution that lacks flexibility to cope with dynamic link error characteristics. Through evaluation, we verified that our new scheme achieves the performance improvements of 14%~84% in terms of retransmission ratio compared to the previous research.
APA, Harvard, Vancouver, ISO, and other styles
17

Muriithi, Peter Njiru, Titus Mwanthi, and Nathan Chiroma. "Influence of Marketing Strategy on Church Sustainability: The Anglican Church of Kenya." European Journal of Theology and Philosophy 2, no. 6 (2022): 17–25. http://dx.doi.org/10.24018/theology.2022.2.6.70.

Full text
Abstract:
The Anglican Church of Kenya (ACK) is the oldest church in Kenya and the largest protestant denomination in the country. Since religions were liberalized after the attainment of political independence in AD 1964, the church has experienced declining congregations due to the registration of new denominations, especially the Pentecostal ones. The decline has been noticeable from the beginning of the 21st Century but there are no reports of strategies to resolve the phenomenon. Since congregation members are the customers for a church, the declining phenomenon indicates a marketing problem that requires a marketing strategy. This research investigated how the ACK is operationalizing a marketing strategy and its influence on its sustainability. The ACK operates on standardized structures and a diocese is the highest independent unit. This research was conducted in the diocese of Kirinyaga as the unit of analysis with Wanguru Archdeaconry as the unit of observation. The independent variables were the elements of the marketing mix, namely Product, Promotion, Position and Price strategies while the dependent variable was the church sustainability. Data collection involved 308 participants drawn from the 19 parishes in the Wanguru archdeaconry and included the church leadership and the congregation members. The research instruments were a semi-structured questionnaire and interviews. For the Product variable, the research applied the Maslow Hierarchy of needs theory while for the promotion variable, it was the AIDA Model (Attention, Interest, Desire and Action). For the positioning strategy, the Segmentation, Targeting and Positioning (STP) Model was applied while the Value-Based Pricing theory was used for the price strategy. For church sustainability, the research applied the Triple Bottom Line model. Data analysis was conducted using Structural Package for Social Sciences (SPSS). The results indicated that the ACK has not operationalized an effective marketing strategy for while the Gospel as the marketing product of the church was highly rated, there were low scores for Promotion, Position and Price strategies.
APA, Harvard, Vancouver, ISO, and other styles
18

Tang, Dan, Kai Chen, XiaoSu Chen, HuiYu Liu, and Xinhua Li. "Adaptive EWMA Method Based on Abnormal Network Traffic for LDoS Attacks." Mathematical Problems in Engineering 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/496376.

Full text
Abstract:
The low-rate denial of service (LDoS) attacks reduce network services capabilities by periodically sending high intensity pulse data flows. For their concealed performance, it is more difficult for traditional DoS detection methods to detect LDoS attacks; at the same time the accuracy of the current detection methods for LDoS attacks is relatively low. As the fact that LDoS attacks led to abnormal distribution of the ACK traffic, LDoS attacks can be detected by analyzing the distribution characteristics of ACK traffic. Then traditional EWMA algorithm which can smooth the accidental error while being the same as the exceptional mutation may cause some misjudgment; therefore a new LDoS detection method based on adaptive EWMA (AEWMA) algorithm is proposed. The AEWMA algorithm which uses an adaptive weighting function instead of the constant weighting of EWMA algorithm can smooth the accidental error and retain the exceptional mutation. So AEWMA method is more beneficial than EWMA method for analyzing and measuring the abnormal distribution of ACK traffic. The NS2 simulations show that AEWMA method can detect LDoS attacks effectively and has a low false negative rate and a false positive rate. Based on DARPA99 datasets, experiment results show that AEWMA method is more efficient than EWMA method.
APA, Harvard, Vancouver, ISO, and other styles
19

Yetti, Yetti, Indra Afrita, and Deddy Felandry. "Penggunaan Jasa Freight Forwarder Internasional Untuk Ekspor Benih Lobster Dari Perspektif Hukum Persaingan Usaha." JOURNAL EQUITABLE 6, no. 1 (2021): 105–25. http://dx.doi.org/10.37859/jeq.v6i1.2681.

Full text
Abstract:
Permasalahan adalah bagaimana Penggunaan Jasa Internasional Freight Forwarder untuk Ekspor Benih Lobster Dalam Perpektif Hukuim Persaingan Usaha bagaimana Akibat Hukum dan Penggunaan Jasa Internaional Freight Forwarder ini. Metode penelitian bersifat yuridis normatif, yang menganalisis dugaan pelanggaran undang-undang anti monopoli dengan cara bersekongkol dan memonopoli pengiriman benih lobster, dengan sumber datanya Bahan Hukum Primer, Bahan Hukum Sekunder dan Bahan Hukum Tertier. Teknik Pengumpulkan Data adalah Studi Kepustakaan, dan analisis data dengan diskriptif analisis. Hasil penelitian adalah bahwa PT ACK, selaku freght forwarder telah melakukan dugaan pelanggaran terhadap Pasal 17 tentang monopoli dan Pasal 24 persekongkolan dengan dua perusahan lainnya yakni KKP, dan Ketua Asosiasi Pengusaha Lobster Indonesia. Akibat hukumnya dengan adanya tindakan tersebut mengakibatkan terhalangnya para pelaku usaha pesaing PT ACK untuk menawarkan jasa kargo angkutan ekspor benih lobster ke luar negeri, tindakan dugaan pelanggaran yang dilakukan tiga pihak tersebut dapat dikenakan denda bagi pelaku monopoli dan persekongkolan ini berdasarkan Undang-Undang No. 11 tahun 2020 tentang Cipta Kerja yakni minimal Rp1 miliar.
APA, Harvard, Vancouver, ISO, and other styles
20

Mohammadi, Bahram, Yicong Hong, Yuankai Qi, Qi Wu, Shirui Pan, and Javen Qinfeng Shi. "Augmented Commonsense Knowledge for Remote Object Grounding." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 5 (2024): 4269–77. http://dx.doi.org/10.1609/aaai.v38i5.28223.

Full text
Abstract:
The vision-and-language navigation (VLN) task necessitates an agent to perceive the surroundings, follow natural language instructions, and act in photo-realistic unseen environments. Most of the existing methods employ the entire image or object features to represent navigable viewpoints. However, these representations are insufficient for proper action prediction, especially for the REVERIE task, which uses concise high-level instructions, such as “Bring me the blue cushion in the master bedroom”. To address enhancing representation, we propose an augmented commonsense knowledge model (ACK) to leverage commonsense information as a spatio-temporal knowledge graph for improving agent navigation. Specifically, the proposed approach involves constructing a knowledge base by retrieving commonsense information from ConceptNet, followed by a refinement module to remove noisy and irrelevant knowledge. We further present ACK which consists of knowledge graph-aware cross-modal and concept aggregation modules to enhance visual representation and visual-textual data alignment by integrating visible objects, commonsense knowledge, and concept history, which includes object and knowledge temporal information. Moreover, we add a new pipeline for the commonsense-based decision-making process which leads to more accurate local action prediction. Experimental results demonstrate our proposed model noticeably outperforms the baseline and archives the state-of-the-art on the REVERIE benchmark. The source code is available at https://github.com/Bahram-Mohammadi/ACK.
APA, Harvard, Vancouver, ISO, and other styles
21

LIU, Anfeng, Xiao LIU, He LI, and Jun LONG. "MDMA: A Multi-Data and Multi-ACK Verified Selective Forwarding Attack Detection Scheme in WSNs." IEICE Transactions on Information and Systems E99.D, no. 8 (2016): 2010–18. http://dx.doi.org/10.1587/transinf.2015inp0005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Atmani, Mouloud, Djamil Aïssani, and Yassine Hadjadj Aoul. "Modelling and analysis data fragmentation in IEEE 802.15.4 slotted CSMA/CA protocol without ACK mode." International Journal of Critical Computer-Based Systems 7, no. 1 (2017): 4. http://dx.doi.org/10.1504/ijccbs.2017.084061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Koshidgewar, Dr. Bhasker. "Fault Detection in network layer protocol." International Journal of Advance and Applied Research 5, no. 23 (2024): 507–12. https://doi.org/10.5281/zenodo.13642659.

Full text
Abstract:
<strong>Abstract:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </strong> <strong>C</strong>ertain failures are easy to detect with the flooding scheme described in this paper.&nbsp; Others are not.&nbsp; This section will discuss which sorts of errors can be automatically diagnosed and reported, so that a network manager can then investigate the problem.
APA, Harvard, Vancouver, ISO, and other styles
24

Koshidgewar, Dr. Bhasker. "Fault Detection in network layer protocol." International Journal of Advance and Applied Research 5, no. 23 (2024): 507–12. https://doi.org/10.5281/zenodo.13642751.

Full text
Abstract:
<strong>Abstract:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </strong> <strong>C</strong>ertain failures are easy to detect with the flooding scheme described in this paper.&nbsp; Others are not.&nbsp; This section will discuss which sorts of errors can be automatically diagnosed and reported, so that a network manager can then investigate the problem
APA, Harvard, Vancouver, ISO, and other styles
25

Yamada, Yoshiyuki, Marc E. Rothenberg, Melissa McBride, Abel Sanchez-Aguilera та Jose Cancelas. "Stem Cell Factor Signaling Collaborates in the Development of FIP1L1/PDGFRα Induced Chronic Eosinophilic Leukemia in a Murine Model". Blood 112, № 11 (2008): 470. http://dx.doi.org/10.1182/blood.v112.11.470.470.

Full text
Abstract:
Abstract We have previously demonstrated the synergistic role of stem cell factor (SCF) in systemic mastocytosis associated with FIP1L1/PDGFRA (F/P)- chronic eosinophilic leukemia (CEL) (Yamada Y et al., Blood 2008). The aim of this study is to determine if SCF is also required for eosinophilia development in CEL. First, F/P- or vector control-transduced bone marrow hematopoietic stem cell/progenitors (BM-HSC/P) were cultured in SCF in the presence of hydrocortisone (10−5M, HC-SCF) for 2 or 3 weeks. Expression of F/P in HSC/P induced a 27,000-fold higher cell expansion in the presence of HC-SCF compared with HC-SCF -cultured control vector-transduced HSC/P. The cultured cells were then assayed in an IL-5-containing methylcellulose for analysis of CFU-Eosinophil formation, while the culture was continued with SCF in the absence or presence of HC. Only F/P+ HSC/P formed CFU-Eosinophil after ex-vivo culture in the presence of SCF (19 ± 2.2 CFU-eosinophils/105 cells) and HC-SCF-cultured BM-HSC/P quickly differentiated into mast cells after deprivation of HC (98% c-kit+/EGFP+ cells at two weeks of culture after HC withdrawal), suggesting that SCF in collaboration with F/P fusion, may expand progenitor cells of both eosinophil and mast cell lineages. In addition, we analyzed the role of SCF/ckit signaling in disease development of F/P+ CEL in vivo. CEL mice were developed using retroviral introduction of F/P fusion into HSC/P of IL-5 transgenic mice as previously reported (Yamada Y et al., Blood 2006). CEL mice were treated with a blocking anti-c-kit antibody, ACK-2, or an isotype-matched control antibody. ACK-2 treatment suppressed the circulating leukocyte count, eosinophil count and spleen weight significantly in CEL mice, whereas control (vector control-IL-5 transgenic BM-HSC/P transplanted wild type mice) did not show significant diference between ACK-2 treatment and isotype control one (Table). These results suggest that SCF signaling is required for eosinophilic leukemia development induced by FIP1L1/PDGFRa. Table Circulating total leukocyte and eosinophilc counts and spleen weight of mice treated with antibodies Control CEL isotype-control ACK-2 isotype-control ACK-2 Data are shown as mean ± SD, **p &amp;lt; 0.001 compared with isotype control, † p&amp;lt;0.001 compared with control WBC, white blood cells, CEL, chronic eosinophilic leukemia. WBC(mm3) 8805±4377 5480±1433 176278±1210† 9602±12177±68.3** Eosinophil(mm3) 2609±671 804±235 29940±18735† 3480±4292±68.3** Spleen weight (mg) 137±11.3 89.9±211.2 2±11.2** 222.8±68.3**
APA, Harvard, Vancouver, ISO, and other styles
26

Zhao, Jumin, Xiaojuan Liu, and Dengao Li. "Fast and Reliable Burst Data Transmission for Backscatter Communications." Sensors 19, no. 24 (2019): 5418. http://dx.doi.org/10.3390/s19245418.

Full text
Abstract:
Computational radio frequency identification (CRFID) sensors are able to transfer potentially large amounts of data to the reader in the radio frequency range. However, the existing EPC C1G2 protocol is inefficient when there are abundant critical and emergency data to be transmitted and cannot adapt to changing energy-harvesting and channel conditions. In this paper, we propose a fast and reliable method for burst data transmission by fragmenting large data packets into blocks and we introduce a burst transmission mechanism to optimize the EPC C1G2 communication procedure for burst transmission when there are critical and emergency data to be transmitted. In addition, we utilize erasure codes to reduce Acknowledgement (ACK) delay and to improve system reliability. Our results show that our proposed scheme significantly outperforms the current fixed frame length approach and the dynamic frame length and charging time adaptation scheme (DFCA) and that the goodput is close to the theoretically optimal value under different energy-harvesting and channel conditions.
APA, Harvard, Vancouver, ISO, and other styles
27

Jewan, Singh, and Mansotra Vibhakar. "Prospect Convenient Steadfast Procedure in Wireless Sensor Network." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 3 (2018): 613–15. https://doi.org/10.11591/ijeecs.v9.i3.pp613-615.

Full text
Abstract:
This article objective is to improve the steadfast routing in Wireless Sensor Networks with little interfering and avoid packet collision. In the scheme, the entire node has the option of electing next Data Communication Node (DCN). The next data communication node is chosen depend on the intensity of link, remaining energy, and the node with distance towards the Base Station. Thus, the sender node transmits the information to the best DCN. Instantly, the DCN sends the acknowledgement (ACK) along with the number of packets received back to the node from which it obtains the data. The sender node assures the delivery of the transmitted packets by comparing the value of number of packets sent with the value obtained with the acknowledgement. If they are equivalent, it will send the verification identity to the DCN. If it is not equivalent, it will decide another node with highest link intensity. After that, the data chooses the DCN and repeat the process until the data reaches the Base Station.
APA, Harvard, Vancouver, ISO, and other styles
28

Alexander Njue. "Interrogating Clergy Compensation and Available Resources Competition in ACK Embu Diocese in Kenya." Editon Consortium Journal of Arts, Humanities and Social Studies 3, no. 1 (2021): 225–36. http://dx.doi.org/10.51317/ecjahss.v3i1.208.

Full text
Abstract:
The purpose of this study was to examine resources available against clergy compensation in ACK Embu Diocese. Descriptive study was carried out in four archdeaconries and inferential statistics were obtained using SPSS. The archdeaconries that were studied were Nginda, Kagaari, Kianjokoma and Karungu. The district has a population of 278,196, with total Christian population of ACK numbering to 25,000. The research design used in this study was descriptive. Kerringer (1969) state, descriptive studies are not only restricted to the facts finding but may often results in formulation of important principles of knowledge and solution to significant problems. The study employed questionnaire as the method of data collection. The researcher targeted a population of 300 people (clergy and laity). From the target population, a sample of 70 clergy and 120 laity people was purposively selected from the four archdeaconries. After data collection, the researcher put together all raw data and analyzed it by tabling it under respective groups of respondent (clergy, laity and administration). At the end of analyses the researcher presented the results in form of tables, pie charts and bar charts to help the readers understand the analyses in a better way. Validity and reliability were tested using pretesting methods. Validity is the accuracy and meaningfulness of the inferences which are based on the research resource. The study findings indicate that the resources available for clergy remuneration are land, investments (businesses such as rental income, book shops and schools) and also quota payments.
APA, Harvard, Vancouver, ISO, and other styles
29

Manyoki, Raymond, and Ndung’u J. B. Ikenye. "Predictors of Violence against Women in African Christian Marriage in Kenya: A Case of ACK Cathedral Voi." Eastern African Journal of Humanities and Social Sciences 3, no. 2 (2024): 102–9. http://dx.doi.org/10.58721/eajhss.v3i2.679.

Full text
Abstract:
Recent events suggest that women in Christian marriages in Kenya may be at risk of experiencing violence, despite the belief that such marriages are less violent. This research examined predictors of violence against women in Christian marriages at ACK Cathedral Voi. The main aim of this research was to investigate violence against women in Christian marriages at ACK Cathedral church in Voi. The research was guided by the social learning theory. A design of descriptive research was utilized. The study employed stratified simple random sampling. A structured survey was given to the participants and the Likert scale was employed to evaluate their answers, with data analysis performed using SPSS-26 software and Microsoft Excel spreadsheets. The study reveals violence against women in Christian marriages is primarily physical, verbal, and sexual, influenced by poverty, lack of education, cultural practices, gender discrimination, and economic instability. It suggests religious leaders provide mediation, counselling, mentorship, coaching, seminars, and team-building programs to address these issues. The church should also collaborate with the government for educational programs.
APA, Harvard, Vancouver, ISO, and other styles
30

Chilwan, Shihab. "Dataset for DoS Detection Dataset: A Benchmark for AI-Driven Intrusion Detection and DoS Attack Analysis." Science Management Design Journal 2, no. 2 (2024): 22–28. https://doi.org/10.70295/smdj.2412023.

Full text
Abstract:
The "DOS ATTACK" dataset, which consists of network traffic data specially prepared to support the research effort into finding the possibility to trace DoS attacks using artificial intelligence and machine learning-based techniques, has more than 820,000 entries. Labeled instances of attack and normal traffic represent this dataset, which are highly useful for training and evaluation of intrusion detection systems. Some of the notable features include source and destination IP addresses, protocol type, packet size, and TCP-specific flags like SYN and ACK, which are actually quite crucial to observe patterns of attacks. The dataset is fairly balanced as about 17 percent of entries fall under the category of attack instances, which gives very realistic settings for evaluating the model. This dataset may also be important for benchmarking AIbased network intrusion detection models, especially for recognition of DoS attacks and general knowledge about network behavior under attack conditions. Salient patterns of distribution in the SYN and ACK flags, packet sizes, and temporal characteristics shown in our analysis could constitute a foundation for more advanced intrusion detection research
APA, Harvard, Vancouver, ISO, and other styles
31

Okada, S., H. Nakauchi, K. Nagayoshi, et al. "Enrichment and characterization of murine hematopoietic stem cells that express c-kit molecule." Blood 78, no. 7 (1991): 1706–12. http://dx.doi.org/10.1182/blood.v78.7.1706.1706.

Full text
Abstract:
Abstract The proto-oncogene c-kit encodes a transmembrane tyrosine kinase receptor for stem cell factor (SCF). The c-kit/SCF signal is expected to have an important role in hematopoiesis. A monoclonal antibody (ACK- 2) against the murine c-kit molecule was prepared. Flow cytometric analysis showed that the bone marrow cells that expressed the c-kit molecule (approximately 5%) were B220(B)-, TER119(erythroid)-, Thy1negative-low, and WGA+. A small number of Mac-1(macrophage)+ or Gr- 1(granulocyte)+ cells were c-kit-low positive. Colony-forming unit in culture (CFU-C) and day-8 and day-12 CFU-spleen (CFU-S) existed exclusively in the c-kit-positive fraction. About 20% of the Lin(lineage)-c-kit+ cells were rhodamine-123low and this fraction contained more day-12 CFU-S than day-8 CFU-S. On the basis of these findings, murine hematopoietic stem cells were enriched with normal bone marrow cells. One of two and one of four Thy-1lowLin-WGA+c-kit+ cells were CFU-C and CFU-S, respectively. Long-term repopulating ability was investigated using B6/Ly5 congenic mice. Eight and 25 weeks after transplantation of Lin-c-kit+ cells, donor-derived cells were found in the bone marrow, spleen, thymus, and peripheral blood. In peripheral blood, T cells, B cells, and granulocyte-macrophages were derived from donor cells. Injection of ACK-2 into the irradiated mice after bone marrow transplantation decreased the numbers of day-8 and day-12 CFU-S in a dose-dependent manner. Day-8 spleen colony formation was completely suppressed by the injection of 100 micrograms ACK-2, but a small number of day-12 colonies were spared. Our data show that the c- kit molecule is expressed in primitive stem cells and plays an essential role in the early stages of hematopoiesis.
APA, Harvard, Vancouver, ISO, and other styles
32

Okada, S., H. Nakauchi, K. Nagayoshi, et al. "Enrichment and characterization of murine hematopoietic stem cells that express c-kit molecule." Blood 78, no. 7 (1991): 1706–12. http://dx.doi.org/10.1182/blood.v78.7.1706.bloodjournal7871706.

Full text
Abstract:
The proto-oncogene c-kit encodes a transmembrane tyrosine kinase receptor for stem cell factor (SCF). The c-kit/SCF signal is expected to have an important role in hematopoiesis. A monoclonal antibody (ACK- 2) against the murine c-kit molecule was prepared. Flow cytometric analysis showed that the bone marrow cells that expressed the c-kit molecule (approximately 5%) were B220(B)-, TER119(erythroid)-, Thy1negative-low, and WGA+. A small number of Mac-1(macrophage)+ or Gr- 1(granulocyte)+ cells were c-kit-low positive. Colony-forming unit in culture (CFU-C) and day-8 and day-12 CFU-spleen (CFU-S) existed exclusively in the c-kit-positive fraction. About 20% of the Lin(lineage)-c-kit+ cells were rhodamine-123low and this fraction contained more day-12 CFU-S than day-8 CFU-S. On the basis of these findings, murine hematopoietic stem cells were enriched with normal bone marrow cells. One of two and one of four Thy-1lowLin-WGA+c-kit+ cells were CFU-C and CFU-S, respectively. Long-term repopulating ability was investigated using B6/Ly5 congenic mice. Eight and 25 weeks after transplantation of Lin-c-kit+ cells, donor-derived cells were found in the bone marrow, spleen, thymus, and peripheral blood. In peripheral blood, T cells, B cells, and granulocyte-macrophages were derived from donor cells. Injection of ACK-2 into the irradiated mice after bone marrow transplantation decreased the numbers of day-8 and day-12 CFU-S in a dose-dependent manner. Day-8 spleen colony formation was completely suppressed by the injection of 100 micrograms ACK-2, but a small number of day-12 colonies were spared. Our data show that the c- kit molecule is expressed in primitive stem cells and plays an essential role in the early stages of hematopoiesis.
APA, Harvard, Vancouver, ISO, and other styles
33

Belhamdi, Badreddine, Zoulikha Merzougui, Hamza Laksaci, Chemseddine Belabed, Salim Boudiaf, and Mohamed Trari. "Removal of dissolved organic nitrogen amino acid from aqueous solutions using activated carbon based on date pits." Water Practice and Technology 15, no. 4 (2020): 1158–73. http://dx.doi.org/10.2166/wpt.2020.089.

Full text
Abstract:
Abstract Nitrogenous disinfection by-products (N-DBPs) in chlorinated drinking water are receiving increasing attention due to their elevated toxicities. An effective strategy to control N-DBP formation is to reduce their nitrogenous precursors (amino acids) before disinfection. This work was undertaken to study free amino acid l-tyrosine adsorption onto two activated carbons synthesized from date pits. The amino acid is plentiful in low-molecular weight algal organic matter, which helps the formation of nitrogenous and carbonaceous disinfection by-products during water treatment. The equilibrium adsorption of l-tyrosine was studied on well-characterized activated carbons prepared by KOH (ACK) and ZnCl2 (ACZ) activation, possessing textural properties evaluated by SEM analysis, N2 adsorption–desorption isotherms and FT-IR spectroscopy. Batch experiments were conducted to determine the activated carbons’ adsorption capacities. The effect of contact time, initial adsorbate concentration, solution pH, and temperature were studied. The Langmuir model gave the best fit for the experimental data of l-tyrosine with a maximum monolayer adsorption capacity of 178.57 and 102.04 mg·g−1 on ACK and ACZ, respectively. Thermodynamic parameters ΔG°, ΔH° and ΔS° were also estimated for the adsorption study. The adsorption was spontaneous and exothermic, and involved physisorption.
APA, Harvard, Vancouver, ISO, and other styles
34

Kim, Jeong Nam, Sang-Joon Ahn, and Robert A. Burne. "Genetics and Physiology of Acetate Metabolism by the Pta-Ack Pathway of Streptococcus mutans." Applied and Environmental Microbiology 81, no. 15 (2015): 5015–25. http://dx.doi.org/10.1128/aem.01160-15.

Full text
Abstract:
ABSTRACTIn the dental caries pathogenStreptococcus mutans, phosphotransacetylase (Pta) catalyzes the conversion of acetyl coenzyme A (acetyl-CoA) to acetyl phosphate (AcP), which can be converted to acetate by acetate kinase (Ack), with the concomitant generation of ATP. A ΔackAmutant displayed enhanced accumulation of AcP under aerobic conditions, whereas little or no AcP was observed in the Δptaor ΔptaΔackAmutant. The Δptaand ΔptaΔackAmutants also had diminished ATP pools compared to the size of the ATP pool for the parental or ΔackAstrain. Surprisingly, when exposed to oxidative stress, the ΔptaΔackAstrain appeared to regain the capacity to produce AcP, with a concurrent increase in the size of the ATP pool compared to that for the parental strain. The ΔackAand ΔptaΔackAmutants exhibited enhanced (p)ppGpp accumulation, whereas the strain lacking Pta produced less (p)ppGpp than the wild-type strain. The ΔackAand ΔptaΔackAmutants displayed global changes in gene expression, as assessed by microarrays. All strains lacking Pta, which had defects in AcP production under aerobic conditions, were impaired in their abilities to form biofilms when glucose was the growth carbohydrate. Collectively, these data demonstrate the complex regulation of the Pta-Ack pathway and critical roles for these enzymes in processes that appear to be essential for the persistence and pathogenesis ofS. mutans.
APA, Harvard, Vancouver, ISO, and other styles
35

G., S. Sivagamasundari, Thamizhmaran K., and Mariya vincy S. "Comparison of Network Quality Performance in MANET form using Secure 3-ACK Algorithm." Journal of Research and Advancement in Electrical Engineering 5, no. 3 (2022): 1–8. https://doi.org/10.5281/zenodo.7346393.

Full text
Abstract:
<em>In ongoing arising research year the developing innovation that permits to the clients to get to data and administrations anyplace no matter what their geographic area called as MANET. Mobile Ad hoc Network (MANET) is the huge advancements among different un-wired correspondence advancements where every one of the versatile hubs are versatile and which can be associated with arbitrary progressively involving remote connection in the irregular way. It can give Quality of Service (QoS) necessities in genuine update transmission for remote application. Be that as it may, it stream including basic mission application like military use or crisis recuperation. In this exploration paper proposed effective Affirmations based Secure Quality Situated Circulated, that cam work on a best execution of QoS with decreasing postponement likewise increment network correspondence throughput for Upgraded Versatile 3 ACK&#39;s (S-EA3ACK) utilizing EAACK (DSA) with MAJE4 symmetric cryptography uniquely intended for MANET through Organization Test system 2.34 (NS2) to carry out it.</em>
APA, Harvard, Vancouver, ISO, and other styles
36

Hwang, Ho Young. "Analysis of Throughput and Delay for an Underwater Multi-DATA Train Protocol with Multi-RTS Reception and Block ACK." Sensors 20, no. 22 (2020): 6473. http://dx.doi.org/10.3390/s20226473.

Full text
Abstract:
We propose an underwater multi-DATA train protocol with multi-RTS reception and block ACK (BACK) for underwater acoustic sensor networks. Due to long underwater acoustic propagation delay, some RTS frames may not overlap at a sink node, even if the RTS frames were sent to the sink node simultaneously by different sensor nodes. We consider that our underwater sink node can recover these nonoverlapping RTS frames. Since our RTS frame contains ID of the RTS sending node and a timestamp, the sink node calculates the propagation delay between the RTS sending node and the sink node, then broadcasts a CTS frame. Since our CTS frame contains when each RTS sending node can transmit a DATA frame to the sink node, multiple DATA frames transmitted by different sensor nodes can be formed as a train at the sink node. We also propose an underwater BACK protocol which is analogous to our proposed underwater multi-DATA train protocol. We analyze normalized throughput and mean access delay of our proposed protocols and the conventional protocols. The analytical and simulation results show that our analysis is accurate and our proposed protocols outperform the conventional protocols. Our proposed protocol can shorten the delay and increase the throughput via the multi-DATA train, multi-RTS reception, and BACK.
APA, Harvard, Vancouver, ISO, and other styles
37

Zhang, Haishan, Xinchun Wang, and Chenghui Jia. "False Data Filtering Strategy in Wireless Sensor Network Based on Neighbor Node Monitoring." International Journal of Online Engineering (iJOE) 13, no. 03 (2017): 174. http://dx.doi.org/10.3991/ijoe.v13i03.6869.

Full text
Abstract:
&lt;span style="font-family: 'Times New Roman',serif; font-size: 12pt; mso-fareast-font-family: SimSun; mso-fareast-theme-font: minor-fareast; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;"&gt;The injection attack of false data is a common attack form in wireless sensor network. This attack form achieves the purpose of consuming limited network resources and severely threatens the safety of wireless sensor network through consistent sending false data. This paper proposes a type of false data filtering strategy based on neighbor node monitoring. The idea of this strategy is to enable each node to store the neighbor node's information within the two-hop range. In the meantime, the data package determines whether the upstream node is original node or data forwarding intermediate node through whether ACK package is remitted by the upstream node to avoid the impersonation of wireless sensor network node by malicious node. The false data package of malicious node will be filtered within one hop. The simulation experiment verifies the filtering performance and anti-capture performance of this strategy, thus guaranteeing the safety of wireless sensor network.&lt;/span&gt;
APA, Harvard, Vancouver, ISO, and other styles
38

Wan, Xiao Xia, and Guo Min Wu. "A Wireless Sensor Network Routing Scheme for Timely Environmental Monitoring System." Applied Mechanics and Materials 274 (January 2013): 604–7. http://dx.doi.org/10.4028/www.scientific.net/amm.274.604.

Full text
Abstract:
Environmental Monitoring system has become more and more critical for biological protection recently. To get timely information from monitored environment, a timely wireless senor network routing scheme (TNRS) is proposed, which is made up of three phrases: initial setup, route discovery and establishment, data communication and route maintenance. In the first phrase, every sensor node will get the initial route table. In the second phrase, source node will find its own path with high fitness value. In the third phrase, data transmission and route maintenance are done under ACK confirmation mechanism. Simulation shows that TNRS routing scheme can decrease data miss ratio by 24.88%, and reduce average data latency by 14.85%, compared to SPEED routing scheme. So TNRS scheme can provide better real time service for environmental monitoring system.
APA, Harvard, Vancouver, ISO, and other styles
39

Alexander Njue. "Strategies Used to Mobilize Resources for Clergy Remuneration in Anglican Church of Kenya (ACK) Embu Diocese, of Embu County, Kenya." Editon Consortium Journal of Economics and Development Studies 2, no. 2 (2020): 148–58. http://dx.doi.org/10.51317/ecjeds.v2i2.150.

Full text
Abstract:
This study sought to investigate strategies used to mobilize resources for clergy remuneration in ACK Embu Diocese. The study was carried in Nginda, Kagaari, Kianjokoma and Karungu districts, inferential statistics were obtained using SPSS. The district has a population of 278,196, with a total Christian population of ACK numbering to 25,000. The research used descriptive research design. Kerringer (1969) state, descriptive studies are not only restricted to the facts finding Kerringer (1969) state, descriptive studies are not only restricted to the facts finding but may frequently result in the formulation of critical principles of knowledge and solution but may often result in the formulation of important principles of knowledge and solution to significant problems. The study employed a questionnaire as the method of data collection. The researcher targeted a population of 300 people (clergy and laity). From the target population, a sample of 70 clergies and 120 laity people was purposively selected from the four archdeaconries. After data collection, the researcher put together all raw data and analyzed it by tabling it under respective groups of the respondent (clergy, laity and administration). At the end of analyses, the researcher presented the results in the form of tables, pie charts and bar charts from helping the readers understand the analyses in a better way. Validity and reliability were tested using pretesting methods. Validity is the accuracy and meaningfulness of the inferences, which are based on the research resource. Quota payments was the current major strategy used to mobilize resources for clergy payment. Respondents identified various strategies for mobilizing resources as decentralizing quota payments to the parish, (60% of quota to go to the diocese and 40% to pay the clergy) and by exploiting other resources available.
APA, Harvard, Vancouver, ISO, and other styles
40

Muñoz, Rodrigo, Juan Saez Hidalgo, Felipe Canales, Diego Dujovne, and Sandra Céspedes. "SCHC over LoRaWAN Efficiency: Evaluation and Experimental Performance of Packet Fragmentation." Sensors 22, no. 4 (2022): 1531. http://dx.doi.org/10.3390/s22041531.

Full text
Abstract:
Low Power Wide Area Networks (LPWAN) are expected to enable the massive connectivity of small and constrained devices to the Internet of Things. Due to the restricted nature of both end devices and network links, LPWAN technologies employ network stacks where there is no interoperable network layer as a general case; instead, application data are usually placed directly into technology-specific two-layer frames. Besides not being able to run standard IP-based protocols at the end device, the lack of an IP layer also causes LPWAN segments to operate in an isolated manner, requiring middleboxes to interface non-IP LPWAN technologies with the IP world. The IETF has standardized a compression and fragmentation scheme, called Static Context Header Compression and Fragmentation (SCHC), which can compress and fragment IPv6 and UDP headers for LPWAN in a way that enables IP-based communications on the constrained end device. This article presents a model to determine the channel occupation efficiency based on the transmission times of SCHC messages in the upstream channel of a LoRaWAN™ link using the ACK-on-Error mode of standard SCHC. The model is compared against experimental data obtained from the transmission of packets that are fragmented using a SCHC over LoRaWAN implementation. This modeling provides a relationship between the channel occupancy efficiency, the spreading factor of LoRa™, and the probability of an error of a SCHC message. The results show that the model correctly predicts the efficiency in channel occupation for all spreading factors. Furthermore, the SCHC ACK-on-Error mode implementation for the upstream channel has been made fully available for further use by the research community.
APA, Harvard, Vancouver, ISO, and other styles
41

Yu, Yan, Xianliang Jiang, Guang Jin, Zihang Gao, and Penghui Li. "A Buffer Management Algorithm Based on Dynamic Marking Threshold to Restrain MicroBurst in Data Center Network." Information 12, no. 9 (2021): 369. http://dx.doi.org/10.3390/info12090369.

Full text
Abstract:
The data center has become the infrastructure of most Internet services, and its network carries different types of business flow, such as query, data backup, control information, etc. At the same time, the throughput-sensitive large flows occupy a lot of bandwidth, resulting in the small flow’s longer completion time, finally affecting the performance of the applications. Recent proposals consider only dynamically adjusting the ECN threshold or reversing the ECN packet priority. This paper combines these two improvements and presents the HDCQ method for coordinating data center queuing, separating large and small flows, and scheduling in order to ensure flow completion time. It uses the ECN mechanism to design load-adaptive marking threshold update algorithms for small flows to prevent micro-bursts from occurring. At the same time, packets marked with ECN or ACK are raised in priority, prompting these packets to be fed back to the sender as soon as possible, effectively reducing the TCP control loop delay. Extensive experimental analysis on the network simulator (NS-2) shows that the HDCQ algorithm has better performance in the face of micro-burst traffic, reducing the average flow completion time by up to 24% compared with the PIAS.
APA, Harvard, Vancouver, ISO, and other styles
42

Bwire, Peter J., Jackline G. Ngari, and Josephine Gitome. "Adoption of Online Church Services and Participation by Kenya Anglican Youth Organization in Cathedral Deanery, Thika Diocese, Kiambu County, Kenya." African Multidisciplinary Journal of Research 9, no. 2 (2025): 178–202. https://doi.org/10.71064/spu.amjr.9.2.322.

Full text
Abstract:
The Church has continued to embrace the use of online media platforms with a view of reaching out to a wider audience. The Anglican Church of Kenya (ACK) through her leadership has been on the forefront since 2017 in championing the use of online media platforms due to decreasing youth enrolment in church, which stood at 10% in 2017. This is happening at a time when the number of youth who have subscribed to online media platforms is also increasing. The study examined the adoption of online church platforms and participation of youth in an ACK deanery, the involvement of the youth in planning for online church service and the challenges encountered by the youth in online church service. The study employed Connectivism Learning Theory by George Siemens (2005) to understand how technology and innovations are adopted at ACK, St. Andrew’s and St. Monica’s Mugumo-ini parishes. The study reviewed empirical data on online church services, youth involvement and challenges of online platforms in enhancing participation among the youth. The study adopted a mixed approach method and utilized a descriptive research design. The target population was (1055) and a sample of 15% (159) which was proportionately and purposively selected. A semi-structured questionnaire was administered to members of Kenya Anglican Youth Organisation (KAYO) and parents/guardians, while FGD was carried out among church leadership, whereas the bishop was interviewed. A pilot study was conducted in Memorial Parish and was considered in the final study. This was done by calculating Pearson’s correlation and Cronbach Alpha, which met the 0.7 threshold. Face validity was carried out to ensure the accuracy of the questionnaire and interview schedule. Data collected was then analysed descriptively and thematically. The findings of the study showed that the church adopted Facebook at (84.6%), Twitter (0%), YouTube (38.5%), and WhatsApp (61.5%). On the involvement of the youth, the study found that the church involved the youth in technical support 61.5%. Challenges faced by the youth in online church participation included distraction by other social media (61.6%), internet connectivity at 23% and cost of data at 15.4%. The study found that overall online church attendance among the youth stood at 38.5%. The study's overall recommendations were that; the church ought to utilize YouTube and Facebook for live streaming, run online church services for the youth for a maximum of 30 minutes, and use WhatsApp for online bible study services. Further, the study recommends that the church should offer meaningful involvement of the youth and its leadership rather than limiting them to technical support. These may include offering strategic training on innovative online technologies to church leadership and monitor online youth participation by assessing statistics after each online service/activity.
APA, Harvard, Vancouver, ISO, and other styles
43

Zhu, Hai, Dan Wang, and Peng Sun. "A Scheme of Downlink HARQ Scheduling in TDD LTE-A." International Journal of Information and Communication Sciences 1, no. 3 (2016): 43–46. http://dx.doi.org/10.11648/j.ijics.20160103.12.

Full text
Abstract:
In order to provide a higher peak data rate, carrier aggregation (CA) is implemented into Long Term Evolution Advanced (LTE-A) systems. However, more and more downlink hybrid automatic repeat request (HARQ) feedback information need to be transmitted. Especially, in time division duplexing (TDD) systems must comply with the updownconfig, the complexity and storage of HARQ scheduling increase largely under CA. In this paper, a HARQ scheduling scheme is proposed which is based on dynamic information tables to generate and schedule the downlink feedback information of acknowledgment/negative acknowledgment (ACK/NACK) in Long Term Evolution Advanced (LTE-A) system. Some storing tables based on component carriers are designed and a dynamic updated scheme is proposed, which reduces the scheduling complexity and memory occupation effectively.
APA, Harvard, Vancouver, ISO, and other styles
44

Suryadi, Heri Rahmat, Irmawati Amir, Rustan Ruslan, et al. "The influence of activator types on the capacitance value of carbon electrodes from coconut shell." Journal of Aceh Physics Society 11, no. 2 (2022): 52–58. http://dx.doi.org/10.24815/jacps.v11i2.23789.

Full text
Abstract:
Abstrak. Penelitian ini bertujuan untuk mengetahui karakteristik karbon aktif dalam aplikasi elektroda karbon dari tempurung kelapa serta pengaruh jenis dari aktivator yang digunakan terhadap kapasitansi elektroda karbon dari tempurung kelapa. Karbon yang telah diperoleh dari tempurung kelapa diproses hingga mencapai ukuran 300 mesh. Karbon tersebut kemudian diaktivasi dengan beberapa aktivator seperti HCl, NaOH dan K2CO3 dengan perbandingan 1:1. Karbon yang telah diaktivasi selanjutnya dikeringkan dengan oven kemudian dilakukan pencucian hingga netral. Karbon aktif kemudian dipelet menjadi elektroda dalam tekanan 8 ton lalu selanjutnya dilakukan pengukuran dimensi dan densitas serta pengujian Cyclic Voltametry. Hasil pengukuran dimensi diperoleh nilai densitas dari CSC, AC1, AC2 dan AC3 masing-masing 0,794 g/cm3, 0,610 g/cm3, 0,649 g/cm3 dan 0,731 g/cm3. Selanjutnya hasil pengujian Cyclic Voltametry diperoleh data kapasitansi spesifik, energi spesifik dan daya spesifik. Nilai kapasitansi spesifik dari CSC, AC1, AC2 dan AC3 adalah masing-masing 0,361011 F/g, 0,33898 F/g, 3,38583 F/g dan 4,461538 F/g. Lalu nilai rapat energi dari CSC, AC1, AC2 dan AC3 adalah masing-masing 0,045126 Wh/kg, 0,042373 Wh/kg, 0,423228 Wh/kg dan 0,557692 Wh/kg. Kemudian nilai rapat daya dari CSC, AC1, AC2 dan AC3 adalah masing-masing 0,216606 W/kg, 0,196721 W/kg, 2,186441 W/kg dan 2,676923 W/kg. Abstract. This study aims to determine the characteristics of activated carbon in the application of carbon electrodes from coconut shells and the influence of the type of activator used on the capacitance of carbon electrodes from the coconut shell. The carbon that has been obtained from the coconut shell is processed up to 300 mesh in size. The carbon is then activated with several activators such as HCl, NaOH and K2CO3 with a ratio of 1:1. Activated carbon is then dried in an oven then washed to neutral. Activated carbon is then pelleted into electrodes under a pressure of 8 tons, which is then tested by Cyclic Voltametry. Activated carbon is then pelleting be electrodes under a pressure of 8 tons and then measurements of dimensions densities and done testing by Cyclic Voltammetry. Dimension measurement results obtained density values from CSC, AC1, AC2 and AC3 are 0,794 g/cm3, 0,610 g/cm3, 0,649 g/cm3 dan 0,731 g/cm3 respectively. Furthermore, the results of the Cyclic Voltametry test obtained data on specific capacitance, specific energy and specific power. Specific capacitance values of CSC, AC1, AC2 and AC3 are respectively 0.361011 F/g, 0.33898 F/g, 3.38583 F/g and 4.461538 F/g. Afterwards the energy density values of CSC, AC1, AC2 and AC3 are respectively 0.045126 Wh/kg, 0.042373 Wh/kg, 0.423228 Wh/kg and 0.557692 Wh/kg. Then the power density values of CSC, AC1, AC2 and AC3 are respectively 0.216606 W/kg, 0.203390 W/kg, 2.031496 W/kg and 2.676923 W/kg.
APA, Harvard, Vancouver, ISO, and other styles
45

Singh, Jewan, and Vibhakar Mansotra. "Prospect Convenient Steadfast Procedure in Wireless Sensor Network." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 3 (2018): 613. http://dx.doi.org/10.11591/ijeecs.v9.i3.pp613-615.

Full text
Abstract:
&lt;p&gt;This article objective is to improve the steadfast routing in Wireless Sensor Networks with little interfering and avoid packet collision. In the scheme, the entire node has the option of electing next Data Communication Node (DCN). The next data communication node is chosen depend on the intensity of link, remaining energy, and the node with distance towards the Base Station. Thus, the sender node transmits the information to the best DCN. Instantly, the DCN sends the acknowledgement (ACK) along with the number of packets received back to the node from which it obtains the data. The sender node assures the delivery of the transmitted packets by comparing the value of number of packets sent with the value obtained with the acknowledgement. If they are equivalent, it will send the verification identity to the DCN. If it is not equivalent, it will decide another node with highest link intensity. After that, the data chooses the DCN and repeat the process until the data reaches the Base Station.&lt;/p&gt;
APA, Harvard, Vancouver, ISO, and other styles
46

Mwangi, Peter Maina, David Minja, and Barnabé Anzuruni Msabah. "Relationship between Strategic Leadership Intent and Church Growth: A Case of the Anglican Church of Kenya." International Journal of Research and Innovation in Social Science VIII, no. IV (2024): 3029–40. http://dx.doi.org/10.47772/ijriss.2024.804282.

Full text
Abstract:
The Anglican Church of Kenya (ACK) faces challenges in its growth endeavors, including program sustainability and the need for technological and spiritual advancement. These challenges imply that ACK followers may not fully benefit from the socio-economic and spiritual advantages associated with church membership. This study aimed to investigate the correlation between strategic leadership intent and ACK’s growth. The study utilized a cross-sectional design to investigate church leadership dynamics within the Anglican Church of Kenya, specifically focusing on strategic leadership and church growth. A sample of 315 church leaders was drawn from various administrative levels, including provincial administration members and diocesan secretariat members, reflecting both urban and rural demographics. Proportional stratified sampling ensured representation across different strata. Data collection involved a structured questionnaire administered either online or in person, covering participant demographics and key research variables. Reliability coefficients, such as Cronbach’s alpha, were computed to ensure the questionnaire’s internal consistency. Statistical analyses, including linear regression, were conducted using SPSS to evaluate research hypotheses. The study found that strategic leadership intent explained 19.1% of the variance in church growth within the Anglican Church of Kenya, indicating a significant relationship between the two factors. A one-unit increase in strategic leadership intent corresponded to a 0.438 increase in church growth, suggesting a positive association between the two variables. These findings support the idea that effective strategic leadership plays a crucial role in driving church growth, with nearly one-fifth of the variations in growth attributable to strategic leadership. Overall, the results underscore the importance of strategic leadership in fostering the growth and development of the Anglican Church of Kenya. Subsequent research endeavors could explore distinct facets of strategic leadership to discern their individual impacts on church growth.
APA, Harvard, Vancouver, ISO, and other styles
47

Qolami, Ali, Mohammad Nassiri, and Hatam Abdoli. "A Transmission Power Control Mechanism for 802.15.4+RPL-Operated Wireless Sensor Network." International Journal of Sensors, Wireless Communications and Control 10, no. 2 (2020): 197–206. http://dx.doi.org/10.2174/2210327909666190405164610.

Full text
Abstract:
Background and Objective: Wireless Sensor Networks (WSNs) are typically formed by one or more sink nodes and a large number of sensor nodes that are able to sense, process and transmit data. Topology control mechanisms can be utilized to guarantee requirements such as connectivity, coverage, delay and network lifetime in WSNs. One effective way to control the topology is adjusting transmission power level in each node according to the link quality conditions. The goal of Transmission Power Control (TPC) is to set the transmission range of each node by adjusting its transmission power level. Methods: In this paper, we investigate TPC in 802.15.4+RPL WSNs. In our proposed mechanism, each node dynamically adjusts its transmission power based on channel conditions before sending every data and ACK packet. Result and Conclusion: The results of extensive simulations confirm that our power control method improves network performance, especially in terms of network lifetime, which is an essential issue in WSNs.
APA, Harvard, Vancouver, ISO, and other styles
48

Liu, Canyou, Jimin Zhao, Feilong Mao, et al. "A TCP Acceleration Algorithm for Aerospace-Ground Service Networks." Sensors 22, no. 23 (2022): 9187. http://dx.doi.org/10.3390/s22239187.

Full text
Abstract:
The transmission of satellite payload data is critical for services provided by aerospace ground networks. To ensure the correctness of data transmission, the TCP data transmission protocol has been used typically. However, the standard TCP congestion control algorithm is incompatible with networks with a long time delay and a large bandwidth, resulting in low throughput and resource waste. This article compares recent studies on TCP-based acceleration algorithms and proposes an acceleration algorithm based on the learning of historical characteristics, such as end-to-end delay and its variation characteristics, the arrival interval of feedback packets (ACK) at the receiving end and its variation characteristics, the degree of data packet reversal and its variation characteristics, delay and jitter caused by the security equipment’s deep data inspection, and random packet loss caused by various factors. The proposed algorithm is evaluated and compared with the TCP congestion control algorithms under both laboratory and ground network conditions. Experimental results indicate that the proposed acceleration algorithm is efficient and can significantly increase throughput. Therefore, it has a promising application prospect in high-speed data transmission in aerospace-ground service networks.
APA, Harvard, Vancouver, ISO, and other styles
49

Xiao, Dong, Min Zhao, Ning Jia, Tong-Rui Peng, Yan Chen, and Li Ma. "A Novel Routing Control Technique for the Energy Hole in the Underwater Acoustic Distributed Network." Complexity 2021 (February 18, 2021): 1–10. http://dx.doi.org/10.1155/2021/6655488.

Full text
Abstract:
The energy hole is a severe problem for underwater acoustic distributed networks in that it affects the normal operations of the network and shortens the network’s life span. To deal with this problem, a loop-free routing control technique is proposed in this paper. The classical shortest-path routing control method is used to generate multiple disjointed routing tables. The residual energy of the nodes and the changing information of the uplink/downlink matrix are added to the data frames for distribution. The source node specifies the routing path to transmit the data frames based on the changing information, and the relay nodes route the data frames strictly according to the routing path designated by the source node. Besides, the energy consumption of the relay node is saved by replying to the pseudo-ACK frame. Simulation experiments are implemented in four typical scenarios, and the results reflect that the proposed technique could extend the network’s life span by approximately 10% when compared to other mature techniques. Besides, it has no other negative effects on the normal operations of the network.
APA, Harvard, Vancouver, ISO, and other styles
50

Kim, Gayoung, Jin-Gu Kang, and Minjoong Rim. "Dynamic Duty-Cycle MAC Protocol for IoT Environments and Wireless Sensor Networks." Energies 12, no. 21 (2019): 4069. http://dx.doi.org/10.3390/en12214069.

Full text
Abstract:
This paper proposes a new protocol that can be used to reduce transmission delay and energy consumption effectively. This will be done by adjusting the duty-cycle (DC) ratio of the receiver node and the contention window size of the sender node according to the traffic congestion for various devices in the Internet of Things (IoT). In the conventional duty-cycle MAC protocol, the data transmission delay latency and unnecessary energy consumption are caused by a high collision rate. This is because the receiver node cannot sufficiently process the data of the transmitting node during the traffic peak time when the transmission and reception have the same duty-cycle ratio. To solve this problem, this paper proposes an algorithm that changes the duty-cycle ratio of the receiver and broadcasts the contention window size of the senders through Early Acknowledgment (E-ACK) at peak time and off/peak time. The proposed algorithm, according to peak and off/peak time, can transmit data with fewer delays and minimizes energy consumption.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!