To see the other types of publications on this topic, follow the link: Design Protocols.

Journal articles on the topic 'Design Protocols'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Design Protocols.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Yao, Wenbing, Sheng-Uei Guan, Zhiqiang Jiang, and Ilias Kiourktsidis. "Self-Evolvable Protocol Design Using Genetic Algorithms." International Journal of Applied Evolutionary Computation 1, no. 1 (January 2010): 36–56. http://dx.doi.org/10.4018/jaec.2010010103.

Full text
Abstract:
Self-modifying protocols (SMP) are protocols that can be modified at run time by the computers using them. Such protocols can be modified at run time so that they can adapt to the changing communicating environment and user requirements on the fly. Evolvable protocols are SMP designed using Genetic Algorithms (GA). The purpose of this paper is to apply Genetic Algorithms (GA) to design an evolvable protocol in order to equip communication peers with more autonomy and intelligence. The next-generation Internet will benefit from the concept of evolvable protocols. In this paper, we design a Self Evolvable Transaction Protocol (SETP) with a GA executor embedded. We then use the Network Simulator (NS2) to evaluate this evolvable protocol module to demonstrate the feasibility of our new design approach.
APA, Harvard, Vancouver, ISO, and other styles
2

Turilli, Matteo. "Ethical protocols design." Ethics and Information Technology 9, no. 1 (February 8, 2007): 49–62. http://dx.doi.org/10.1007/s10676-006-9128-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yu, Song Sen, Yun Peng, and Jia Jing Zhang. "A Lightweight RFID Mechanism Design." Advanced Materials Research 216 (March 2011): 120–23. http://dx.doi.org/10.4028/www.scientific.net/amr.216.120.

Full text
Abstract:
Based on the study of existing RFID security protocols and RFID anti-collision algorithms, this paper proposes a processing mechanism integrating lightweight random key double-authentication and dynamic slot-ALOHA protocol. The mechanism is simple, practical, and compatible with EPC Gen2 standards. Research shows that comparing with the other security protocols and anti-collision protocols, the new mechanism has a little complexity and tag-cost.
APA, Harvard, Vancouver, ISO, and other styles
4

He, Jiayue, Jennifer Rexford, and Mung Chiang. "Don't optimize existing protocols, design optimizable protocols." ACM SIGCOMM Computer Communication Review 37, no. 3 (July 20, 2007): 53–58. http://dx.doi.org/10.1145/1273445.1273452.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nguyen, Philon, Thanh An Nguyen, and Yong Zeng. "Segmentation of design protocol using EEG." Artificial Intelligence for Engineering Design, Analysis and Manufacturing 33, no. 1 (April 3, 2018): 11–23. http://dx.doi.org/10.1017/s0890060417000622.

Full text
Abstract:
AbstractDesign protocol data analysis methods form a well-known set of techniques used by design researchers to further understand the conceptual design process. Verbal protocols are a popular technique used to analyze design activities. However, verbal protocols are known to have some limitations. A recurring problem in design protocol analysis is to segment and code protocol data into logical and semantic units. This is usually a manual step and little work has been done on fully automated segmentation techniques. Physiological signals such as electroencephalograms (EEG) can provide assistance in solving this problem. Such problems are typical inverse problems that occur in the line of research. A thought process needs to be reconstructed from its output, an EEG signal. We propose an EEG-based method for design protocol coding and segmentation. We provide experimental validation of our methods and compare manual segmentation by domain experts to algorithmic segmentation using EEG. The best performing automated segmentation method (when manual segmentation is the baseline) is found to have an average deviation from manual segmentations of 2 s. Furthermore, EEG-based segmentation can identify cognitive structures that simple observation of design protocols cannot. EEG-based segmentation does not replace complex domain expert segmentation but rather complements it. Techniques such as verbal protocols are known to fail in some circumstances. EEG-based segmentation has the added feature that it is fully automated and can be readily integrated in engineering systems and subsystems. It is effectively a window into the mind.
APA, Harvard, Vancouver, ISO, and other styles
6

Sari, Riri Fitri, Lukman Rosyidi, Bambang Susilo, and Muhamad Asvial. "A Comprehensive Review on Network Protocol Design for Autonomic Internet of Things." Information 12, no. 8 (July 22, 2021): 292. http://dx.doi.org/10.3390/info12080292.

Full text
Abstract:
The autonomic Internet of Things is the creation of self-management capability in the Internet of Things system by embedding some autonomic properties, with the goal of freeing humans from all detail of the operation and management of the system. At same time, this provides a system to always operate on the best performance. This paper presents a review of the recent studies related to the design of network communication protocol, which can support autonomic Internet of Things. Many of the studies come from the research and development in Wireless Sensor Network protocols, as it becomes one of the key technologies for the Internet of Things. The identified autonomic properties are self-organization, self-optimization, and self-protection. We review some protocols with the objective of energy consumption reduction and energy harvesting awareness, as it can support the self-energy-awareness property. As the result, the protocol designs are mapped according to each autonomic property supported, including protocols for MAC layer, protocols for clustering, protocols for routing, and protocols for security. This can be used to map the advances of communication protocol research for the autonomic Internet of Things and to identify the opportunities for future research.
APA, Harvard, Vancouver, ISO, and other styles
7

Alfouzan, Faisal Abdulaziz. "Energy-Efficient Collision Avoidance MAC Protocols for Underwater Sensor Networks: Survey and Challenges." Journal of Marine Science and Engineering 9, no. 7 (July 4, 2021): 741. http://dx.doi.org/10.3390/jmse9070741.

Full text
Abstract:
The Medium Access Control (MAC) layer protocol is the most important part of any network, and is considered to be a fundamental protocol that aids in enhancing the performance of networks and communications. However, the MAC protocol’s design for underwater sensor networks (UWSNs) has introduced various challenges. This is due to long underwater acoustic propagation delay, high mobility, low available bandwidth, and high error probability. These unique acoustic channel characteristics make contention-based MAC protocols significantly more expensive than other protocol contentions. Therefore, re-transmission and collisions should effectively be managed at the MAC layer to decrease the energy cost and to enhance the network’s throughput. Consequently, handshake-based and random access-based MAC protocols do not perform as efficiently as their achieved performance in terrestrial networks. To tackle this complicated problem, this paper surveys the current collision-free MAC protocols proposed in the literature for UWSNs. We first review the unique characteristic of underwater sensor networks and its negative impact on the MAC layer. It is then followed by a discussion about the problem definition, challenges, and features associated with the design of MAC protocols in UWANs. Afterwards, currently available collision-free MAC design strategies in UWSNs are classified and investigated. The advantages and disadvantages of each design strategy along with the recent advances are then presented. Finally, we present a qualitative comparison of these strategies and also discuss some possible future directions.
APA, Harvard, Vancouver, ISO, and other styles
8

Ideguchi, Tetsuo, Yuuji Koui, Nonmember, Mitsuru Tsuchida, Yukio Ushisako, Nonmember, and Michihiro Ishizaka. "Design and implementation of protocol conversion equipment for layered protocols." Electronics and Communications in Japan (Part I: Communications) 73, no. 3 (March 1990): 14–23. http://dx.doi.org/10.1002/ecja.4410730302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ko, Hoo Sang, and Shimon Y. Nof. "Design of Protocols for Task Administration in Collaborative Production Systems." International Journal of Computers Communications & Control 5, no. 1 (March 1, 2010): 91. http://dx.doi.org/10.15837/ijccc.2010.1.2466.

Full text
Abstract:
Customer-focused and concurrent engineering service systems process tasks more effectively as a result of the power of collaboration among multiple participants. In such environments, however, complex situations might arise that require decisions beyond simple coordination.Task Administration Protocols (TAPs) are designed as a control mechanism to manage complex situations in collaborative task environments. This article presents the design of TAPs for collaborative production systems in which tasks are performed by the collaboration of multiple agents. Three component protocols are found to constitute TAPs and are triggered at appropriate stages in task administration: 1) Task Requirement Analysis Protocol, 2) Shared Resource Allocation Protocol, and 3) Synchronization & Time-Out Protocol. A case study with TAPs metrics for task allocation in a collaborative production system is investigated to compare performance under TAPs, and under a non-TAP coordination protocol (which is considered to be simpler). In terms of task allocation ratio, the case study indicates that performance under TAPs is significantly better (up to 10.6%) than under the non-TAP coordination protocol, especially under medium or high load conditions. The advantage of TAPs can be explained by their design with relatively higher level of collaborative intelligence, addressing more complex control logic compared with non-TAP coordination protocols.
APA, Harvard, Vancouver, ISO, and other styles
10

Choi, Sangil, Wooksik Lee, Teukseob Song, and Jong-Hoon Youn. "Block Design-Based Asynchronous Neighbor Discovery Protocol for Wireless Sensor Networks." Journal of Sensors 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/951652.

Full text
Abstract:
Neighbor discovery is a significant research topic in wireless sensor networks. After wireless sensor devices are deployed in specific areas, they attempt to determine neighbors within their communication range. This paper proposes a new Block design-based Asynchronous Neighbor Discovery protocol for sensor networks calledBAND. We borrow the concept of combinatorial block designs for neighbor discovery. First, we summarize a practical challenge and difficulty of using the original block designs. To address this challenge, we create a new block generation technique for neighbor discovery schedules and provide a mathematical proof of the proposed concept. A key aspect of the proposed protocol is that it combines two block designs in order to construct a new block for neighbor discovery. We analyze the worst-case neighbor discovery latency numerically between our protocol and some well-known protocols in the literature. Our protocol reveals that the worst-case latency is much lower than others. Finally, we evaluate the performance ofBANDand existing representative protocols through the simulation study. The results of our simulation study show that the average and maximum latency ofBANDis about 40% lower than that of existing protocols. Furthermore,BANDspends approximately 30% less energy than others during the neighbor discovery process.
APA, Harvard, Vancouver, ISO, and other styles
11

Syahputra, Ramdhani, Rahmadi Kurnia, and Rian Ferdian. "Analysis of FHRP Design and Implementation in RIPv2 and OSPF Routing Protocols." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 4, no. 1 (February 8, 2020): 102–8. http://dx.doi.org/10.29207/resti.v4i1.1490.

Full text
Abstract:
The high reliability of data access has become a problem faced by many companies, institutions, and universities. For this reason, a protocol required that can protect the network from a communication breakdown. One method used to maintain communication is by implementing a protocol redundancy system. One or more routers will act as the primary router for load balancing, and some routers are in standby mode if one main router is down. First hop redundancy protocols (FHRP) is a protocol that implements redundancy and load balancing systems. This protocol can transfer access data traffic if one of the routers on the network is down. FHRP divided into virtual router redundancy protocol (VRRP) and gateway load balancing Protocol (GLBP). This research analyzes the design and implementation to provide information about the quality of VRRP and GLBP services on the main router and the backup router, by using an application graphical network simulator (GNS) simulation 3. In the GNS3 application, a LAN network topology is designed with eight router devices in the form of a ring topology using RIPv2 and OSPF routing protocols, then implemented in protocols VRRP and GLBP. The analysis results show that GLBP can back up the network faster than VRRP when the primary router is down. If implemented into a LAN network with RIPv2 and OSPF routing protocols, VRRP has better service quality than GLBP.
APA, Harvard, Vancouver, ISO, and other styles
12

Zhang, Kai Lin, Da Hua Li, Shu Chen Shi, Xue Song Yang, Zhen Xiao, and Qiang Gao. "Design and Implementation of Multi-Protocol Self-Adaptation Gateway." Applied Mechanics and Materials 687-691 (November 2014): 2108–11. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2108.

Full text
Abstract:
For the four kinds of network protocols which are common in industry :PROFIBUS-DP, DeviceNet, EtherNet/IP and Modbus-RTU, a gateway has been designed which could integrate the four protocols ,and have developed hardware and software program of the Multi-protocol self-adaptation gateway .It uses STM32F407ZGT6 as its major chip. A Modbus-RTU interface has been designed which depends on the UART interface of the main chip to send and receive packets in hardware. It use COMX as hardware interface of PROFIBUS-DP ,DeviceNet ,and EtherNet/IP to process their packets. It has achieved a function that the PROFIBUS-DP interface will change its address with the changing of the configuration of master .In addition, the multi-protocol self-adaptation gateway can integrate several masters which support different protocols in one network. The master controllers could communicate with each other in this network.After being tested and verified ,it has been used in the communication of DCS systems, and it has converted the packets of the four protocols which have been mentioned above and it has met the demands of designing a gateway.
APA, Harvard, Vancouver, ISO, and other styles
13

Hao, Chen, John A. Clark, and Jeremy L. Jacob. "Automated Design of Security Protocols." Computational Intelligence 20, no. 3 (August 2004): 503–16. http://dx.doi.org/10.1111/j.0824-7935.2004.00249.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Kozak, P., and W. M. Wonham. "Design of transaction management protocols." IEEE Transactions on Automatic Control 41, no. 9 (1996): 1330–35. http://dx.doi.org/10.1109/9.536503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Ramarao, K. V. S. "Design of transaction commitment protocols." Information Sciences 55, no. 1-3 (June 1991): 129–49. http://dx.doi.org/10.1016/0020-0255(91)90010-r.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Bunch, David S., David M. Rocke, and Robert O. Harrison. "Statistical design of ELISA protocols." Journal of Immunological Methods 132, no. 2 (September 1990): 247–54. http://dx.doi.org/10.1016/0022-1759(90)90036-u.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Liu, Wei Dong, Xiang Yu Li, and Li'e Gao. "Design of a Gateway for Remotely Underwater Vehicles." Applied Mechanics and Materials 209-211 (October 2012): 2138–41. http://dx.doi.org/10.4028/www.scientific.net/amm.209-211.2138.

Full text
Abstract:
A gateway based on ARM is presented to achieve mutil-protocol conversion among different electronic control units. To guarantee its real-time ability and stability, the μC/OS-II embedded operation system was adopted. The first-in-first-out data queue is used to balance the communication rate among the different communication protocols which consist of the Controller Area Network, TCP/IP and RS-232. The gateway can be used in remotely manipulation between the console with Ethernet and remote underwater vehicle with other serial communication protocols.
APA, Harvard, Vancouver, ISO, and other styles
18

Chen, Zhi, Ya Peng, and Wenjing Yue. "Model-Checking Driven Design of QoS-Based Routing Protocol for Wireless Sensor Networks." Journal of Sensors 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/716561.

Full text
Abstract:
Accurate and reliable routing protocols with Quality of Service (QoS) support determine the mission-critical application efficiency in WSNs. This paper proposes a model-checking design driven framework for designing the QoS-based routing protocols of WSNs, which involves the light-weight design process, the timed automata model, and the alternative QoS verification properties. The accurate feedback of continually model checking in the iterative design process effectively stimulates the parameter tuning of the protocols. We demonstrate the straightforward and modular characteristics of the proposed framework in designing a prototype QoS-based routing protocol. The prototype study shows that the model-checking design framework may complement other design methods and ensure the QoS implementation of the QoS-based routing protocol design for WSNs.
APA, Harvard, Vancouver, ISO, and other styles
19

Chuang, Yun-Hsin, Chin-Laung Lei, and Hung-Jr Shiu. "How to Design a Secure Anonymous Authentication and Key Agreement Protocol for Multi-Server Environments and Prove Its Security." Symmetry 13, no. 9 (September 4, 2021): 1629. http://dx.doi.org/10.3390/sym13091629.

Full text
Abstract:
An anonymous authentication and key agreement (AAKA) protocol provides anonymous members symmetric authentication and establishes a symmetric session key for secure communication in public networks. Today, numerous popular remote services are based on multi-server architecture, such as the internet of things (IoT), smart cities, cloud services, vehicular ad hoc networks (VANET), and telecare medicine information systems (TMIS). Many researchers have attempted to design AAKA protocols in multi-server environments for various applications. However, many of these have security defects, even if they have so-called “formal” security proofs. In this paper, we analyze related AAKA protocols to identify the common design defects, expound the process of designing secure AAKA protocols, and explain why the present AAKA protocols still suffer attacks, despite having security proofs. We instruct readers on how to design a secure AAKA protocol and how to prove the security. This paper will therefore be helpful for the design of new AAKA protocols, and for ensuring their security.
APA, Harvard, Vancouver, ISO, and other styles
20

Liu, Hai Yan, Yue Zhao, and Rui Huang. "Study and Design on Vulnerability Discovering of Network Protocols." Applied Mechanics and Materials 556-562 (May 2014): 5526–30. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5526.

Full text
Abstract:
Discovering the vulnerabilities in network protocols is the key for network attacks and defenses. Basing on the analysis of some currently used vulnerability discovering methods, a method combining reverse engineering and fuzzy testing is put forward for vulnerability discovering of network protocols, where reverse engineering method is first used to analyze the details of the communication protocol, then fuzzy testing is used to test the target software. This combination can promote the efficiency of the fuzzy testing. By using this method to test a real network application, several vulnerabilities are discovered, which verifies the validity of this method.
APA, Harvard, Vancouver, ISO, and other styles
21

Amin, Md Ruhul, Md Shohrab Hossain, and Mohammed Atiquzzaman. "In-Band Full Duplex Wireless LANs: Medium Access Control Protocols, Design Issues and Their Challenges." Information 11, no. 4 (April 16, 2020): 216. http://dx.doi.org/10.3390/info11040216.

Full text
Abstract:
In-band full duplex wireless medium access control (MAC) protocol is essential in order to enable higher layers of the protocol stack to exploit the maximum benefits from physical layer full duplex technology. Unlike half duplex wireless local area network, a full duplex MAC protocol has to deal with several unique issues and challenges that arise because of the dynamic nature of the wireless environment. In this paper, we have discussed several existing full duplex MAC protocols and have shown qualitative comparisons among these full duplex MAC protocols. Full duplex in-band wireless communication has the potential to double the capacity of wireless network. Inter-client Interference (ICI) is a hindrance in achieving double spectral efficiency of the in-band full-duplex wireless medium. In this paper, we have classified existing solutions to the ICI problem and compared the solutions with respect to the proposed approaches, their advantages and disadvantages.We have also identified and discussed several issues and challenges of designing a full duplex MAC protocol. Results of qualitative comparisons of various wireless full duplex MAC protocols may be applied to design new protocols as well as researchers may find the identified issues and challenges helpful to solve various problems of a full duplex MAC protocol.
APA, Harvard, Vancouver, ISO, and other styles
22

Gong, Wen Tao. "The Design of Multi-Protocol Network Based on Point-to-Point Protocol and Frame Relay." Advanced Materials Research 936 (June 2014): 2293–97. http://dx.doi.org/10.4028/www.scientific.net/amr.936.2293.

Full text
Abstract:
Local area network and wide area network are different network protocols, small and medium enterprises due to the geographical distribution of discrete and interface diversity, leading to its needs to be compatible with different network protocols, it is difficult to use a single network protocol to realize network architecture, and due to the ipv4 address scarcity, making its application or maintenance cost greatly increased, based on this, this paper presents the design of multi-protocol network architecture based on point-to-point protocol and frame relay, and with the advantages of the router is compatible with a variety of interfaces and protocols to connect different network interfaces, the paper also gives the configuration of routing information protocol and static routing through local area network, the paper presents the core information of frame relay and point-to-point protocol among the routers, and the paper gives the realization of the network address translation in the end.
APA, Harvard, Vancouver, ISO, and other styles
23

Hope, Emily S., Ben Filewod, Daniel W. McKenney, and Tony C. Lemprière. "A financial analysis of four carbon offset accounting protocols for a representative afforestation project (southern Ontario, Canada)." Canadian Journal of Forest Research 51, no. 7 (July 2021): 1015–28. http://dx.doi.org/10.1139/cjfr-2020-0183.

Full text
Abstract:
Forestry projects participate in carbon markets by sequestering carbon dioxide equivalent (CO2e) and producing carbon offsets. The creation of forest-based offsets is guided by protocols that dictate how sequestered CO2e is converted into marketable offsets. Existing protocol designs aim to produce offsets that meet sustainability requirements, while providing financial incentives for landowner participation. However, limited Canadian uptake implies that current financial incentives are insufficient to encourage the production of carbon offsets via private landowners. Here we consider various design features of four protocols and their financial implications for an illustrative afforestation project in southern Ontario, Canada. We explore the protocols (two tonne–tonne protocols and two tonne–year protocols) under two afforestation project management systems (“no-harvest” and “harvest” management scenarios). Results indicate that a project that terminates in a harvest is not economically attractive at current CO2e prices under any protocol design at a scale likely to be undertaken in southern Ontario, Canada. Projects that do not conclude in harvest are generally more attractive. Tonne–tonne protocols that pay upfront for sequestered CO2e improve the economic attractiveness of afforestation projects, but the delayed realization of the value of offset credits under tonne–year protocols reduces the economic attractiveness of these projects. We discuss these results in light of the choices facing afforestation project proponents and offset protocol designers (including governments) in general, and provide detailed insights into the financial dynamics of the Canadian case.
APA, Harvard, Vancouver, ISO, and other styles
24

Tsuneizumi, Isamu, Ailixier Aikebaier, Makoto Ikeda, Tomoya Enokido, and Makoto Takizawa. "Design and Implementation of Hybrid Time (HT) Group Communication Protocol for Homogeneous Broadcast Groups." International Journal of Distributed Systems and Technologies 2, no. 3 (July 2011): 37–48. http://dx.doi.org/10.4018/jdst.2011070103.

Full text
Abstract:
To realize the cooperation of a group of multiple peer processes (peers), messages sent by peers must be causally delivered to every peer. In a scalable group, it is necessary to reduce the communication overhead to causally deliver messages. In this paper, the authors take advantage of the linear time (LT) and physical time (PT) protocols, as the message length is O(n) for the number n of peers. However, some pairs are unnecessarily ordered, that is, even if a pair of messages is ordered in the protocols, the messages may not be causally ordered. The greater the number of messages that are unnecessarily ordered, the larger the overhead is implied since the messages must be kept in a receipt queue if a message is lost or delayed. This paper discusses a hybrid time group communication (HT) protocol that reduces the number of messages unnecessarily ordered. The HT protocol is evaluated in terms of the number of unnecessarily ordered messages compared with the PT and LT protocols. It is demonstrated that the number of unnecessarily ordered messages can be reduced in the HT protocol compared with the LT and PT protocols.
APA, Harvard, Vancouver, ISO, and other styles
25

Kristić, Ante, Julije Ožegović, and Ivan Kedžo. "Design and Modeling of Self-Adapting MAC (SaMAC) Protocol with Inconstant Contention Loss Probabilities." Wireless Communications and Mobile Computing 2018 (September 12, 2018): 1–25. http://dx.doi.org/10.1155/2018/6375317.

Full text
Abstract:
Networks based on IEEE 802.11 standard are one of the main options for deployment in industrial environment. Degradation of throughput in congested networks and short-term unfairness are well-known drawbacks of 802.11 DCF and similar MAC protocols. Those shortcomings represent significant limitation in forecasted growth of wireless usage. This is especially important in industrial wireless networks (IWN) where the scalability of wireless MAC is one of the main requirements. In this paper, a novel self-adapting MAC protocol (SaMAC) is defined and mathematically modeled. SaMAC employs constrained countdown freezing enhanced with shifted window mechanism. As a result, the protocol outperforms 802.11 DCF standard as well as shifted contention window (SCW) and constrained countdown freezing (CPCF) protocols in achieved throughput, fairness, and jitter, while keeping simple implementation. Despite protocol’s simple design, it is shown that its mathematical model is extremely complex. For proposed protocol, the assumption of constant contention loss probability, which is normally used for modeling of MAC schemes, does not hold. In the presented multidimensional Markov chain model, a unique iterative method for determining contention loss probability is developed as well as a method for throughput calculation based on such a chain. Accuracy of the presented model is verified in several network scenarios. Considering the performance of the proposed protocol, authors believe that it could be of benefit to deploy it in heavily loaded wireless networks with timing constraints, such as IWNs.
APA, Harvard, Vancouver, ISO, and other styles
26

Wei, Jun Chao, Guo Yuan Zhang, Yao Chen, and Xiu Tian Yan. "Design of a Communication Interface between the Controller and the Galvanometer." Applied Mechanics and Materials 527 (February 2014): 269–72. http://dx.doi.org/10.4028/www.scientific.net/amm.527.269.

Full text
Abstract:
In a laser marking system, a laser marking controller should be designed to control several galvanometers through a certain interface using a certain protocol, such as the XY2-100 or SPI. The selection of the protocol depends on the configuration of the laser marking system. Using different protocols makes the controller design provide two types of interfaces. If different protocols have their own physical interfaces, the circuit becomes more complicated. In order to decrease the number of physical interfaces and ensure the protocol compatibility at the same time, two protocol signal generator modules based on FPGA are provided and the output signals of the two modules share the same physical interface, and only one of them can be chosen according to a flag set by users. This design makes the circuit simpler and decreases the design cost.
APA, Harvard, Vancouver, ISO, and other styles
27

Srivastava, Pallavi, Edwin Chung, and Stepan Ozana. "Asynchronous Floating-Point Adders and Communication Protocols: A Survey." Electronics 9, no. 10 (October 15, 2020): 1687. http://dx.doi.org/10.3390/electronics9101687.

Full text
Abstract:
Addition is the key operation in digital systems, and floating-point adder (FPA) is frequently used for real number addition because floating-point representation provides a large dynamic range. Most of the existing FPA designs are synchronous and their activities are coordinated by clock signal(s). However, technology scaling has imposed several challenges like clock skew, clock distribution, etc., on synchronous design due to presence of clock signal(s). Asynchronous design is an alternate approach to eliminate these challenges imposed by the clock, as it replaces the global clock with handshaking signals and utilizes a communication protocol to indicate the completion of activities. Bundled data and dual-rail coding are the most common communication protocols used in asynchronous design. All existing asynchronous floating-point adder (AFPA) designs utilize dual-rail coding for completion detection, as it allows the circuit to acknowledge as soon as the computation is done; while bundled data and synchronous designs utilizing single-rail encoding will have to wait for the worst-case delay irrespective of the actual completion time. This paper reviews all the existing AFPA designs and examines the effects of the selected communication protocol on its performance. It also discusses the probable outcome of AFPA designed using protocols other than dual-rail coding.
APA, Harvard, Vancouver, ISO, and other styles
28

Longo, Bernadette, Craig Weinert, and T. Kenny Fountain. "Implementation of Medical Research Findings through Insulin Protocols: Initial Findings from an Ongoing Study of Document Design and Visual Display." Journal of Technical Writing and Communication 37, no. 4 (October 2007): 435–52. http://dx.doi.org/10.2190/v986-k02v-519t-721j.

Full text
Abstract:
Medical personnel in hospital intensive care units routinely rely on protocols to deliver some types of patient care. These protocol documents are developed by hospital physicians and staff to ensure that standards of care are followed. Thus, the protocol document becomes a de facto standing order, standing in for the physician's judgment in routine situations. This article reports findings from Phase I of an ongoing study exploring how insulin protocols are designed and used in intensive care units to transfer medical research findings into patient care “best practices.” We developed a taxonomy of document design elements and analyzed 29 insulin protocols to determine their use of these elements. We found that 93% of the protocols used tables to communicate procedures for measuring glucose levels and administering insulin. We further found that the protocols did not adhere well to principles for designing instructions and hypothesized that this finding reflected different purposes for instructions (training) and protocols (standardizing practice).
APA, Harvard, Vancouver, ISO, and other styles
29

Wyllie, MG. "Clinical trials design: protocols and endpoints." International Journal of Impotence Research 12, S4 (October 2000): S53—S58. http://dx.doi.org/10.1038/sj.ijir.3900578.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Anderson, Tom, Scott Shenker, Ion Stoica, and David Wetherall. "Design guidelines for robust Internet protocols." ACM SIGCOMM Computer Communication Review 33, no. 1 (January 2003): 125–30. http://dx.doi.org/10.1145/774763.774783.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Zhang, Yili, Rong-Yu Liu, George A. Heberton, Paul Smolen, Douglas A. Baxter, Leonard J. Cleary, and John H. Byrne. "Computational design of enhanced learning protocols." Nature Neuroscience 15, no. 2 (December 25, 2011): 294–97. http://dx.doi.org/10.1038/nn.2990.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

El Guibaly, F. "Design and analysis of arbitration protocols." IEEE Transactions on Computers 38, no. 2 (1989): 161–71. http://dx.doi.org/10.1109/12.16493.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Yolum, Pınar. "Design time analysis of multiagent protocols." Data & Knowledge Engineering 63, no. 1 (October 2007): 137–54. http://dx.doi.org/10.1016/j.datak.2006.12.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

ZUO, JING, XUEFEN CHI, LIN GUAN, HONGXIA LI, and IRFAN AWAN. "DESIGN OF FUZZY BASED MULTI-CONSTRAINED ROUTING PROTOCOL AND THE PERFORMANCE EVALUATION." Journal of Interconnection Networks 09, no. 04 (December 2008): 369–87. http://dx.doi.org/10.1142/s0219265908002333.

Full text
Abstract:
Single-constrained QoS routing protocols have inherent defects when applied into wireless ad hoc networks. Due to a single constraint parameter is only considered, they can't always cope with the problems caused by the uncertainty of ad hoc networks well. They are not robust enough. In order to overcome the drawbacks of single-constrained QoS routing protocols and improve the Quality of Service (QoS) of ad hoc networks, this paper proposed a multi-constrained QoS routing protocol based on fuzzy logic. It is developed from Dynamic Source Routing (DSR). The proposed protocol is service-aware in the sense that it considers the QoS required by different types of services and takes different network state parameters as the constraint conditions for fuzzy based routing system. New route discovery procedure and novel route maintenance mechanism are designed to support corresponding QoS requirements. Speed of packets sending is also adjusted adaptively referring to the outputs of the proposed fuzzy system. Performance of the fuzzy based DSR protocol is measured and evaluated under different conditions. Simulation results show that the improved protocol has better QoS guarantee capabilities compared to single-constrained QoS routing protocols for large-scale networks in terms of lower delay, smoother delay variation and lower packet loss rate.
APA, Harvard, Vancouver, ISO, and other styles
35

Stamps, Arthur E. "Evaluating Architectural Design Review." Perceptual and Motor Skills 90, no. 1 (February 2000): 265–71. http://dx.doi.org/10.2466/pms.2000.90.1.265.

Full text
Abstract:
Architectural design review is a method of environmental management which is widely used bv governmental agencies in both the United States and in Great Britain. Because design review is a governmental function, there is a major need to assess how well it works Research covering over 29,000 respondents and 5,600 environmental scenes suggests that scientific protocols can be adapted to provide an accurate and efficient design review protocol. The protocol uses preference experiments to find the standardized mean difference ([Formula: see text]) between a proposed project and a random sample of existing projects. Values of d will indicate whether the project will increase, maintain, or diminish the aesthetic merit of the sampled area. The protocol is illustrated by applying it to the case of design review for a single residence. Implications for further implementations are discussed.
APA, Harvard, Vancouver, ISO, and other styles
36

Paul, Surjit, Sanjay Kumar, and Rajiv Ranjan Suman. "A Quantum Secure Entity Authentication Protocol Design for Network Security." International Journal of Information Security and Privacy 13, no. 4 (October 2019): 1–11. http://dx.doi.org/10.4018/ijisp.2019100101.

Full text
Abstract:
Authentication is one of the significant issues for all kinds of network communications. Most of the authentication protocols designed and implemented so far for entity authentication are based on classical cryptographic techniques to prevent themselves from different types of attacks. These protocols use either password or challenge for authentication. In this article, the design of the proposed quantum secure entity authentication protocol is shown. The proposed protocol is based on the challenge response method. Due to quantum computer capability to break mathematical complexity-based cryptographic techniques, the proposed protocol uses the one-time pad (OTP) to secure itself from attacks, i.e., eavesdropping, reply attack, password guessing attack, man-in-the-middle attack, brute-force attack, quantum computer attack, etc. Security of the proposed protocol was analyzed, and it shows that the proposed protocol may prevent itself from different types of attacks. Further, analysis for quantum Secure was carried out. From the analysis, it is found that if the OTP key is truly random and cannot be reused, then a computer with infinite capacity or quantum computer cannot break the encrypted challenge and response. The proposed protocol may be used for entity authentication for the client, server, process, and user.
APA, Harvard, Vancouver, ISO, and other styles
37

Patel, Ahmed, Kenan Kalajdzic, Laleh Golafshan, and Mona Taghavi. "Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card." International Journal of Information Security and Privacy 5, no. 3 (July 2011): 1–18. http://dx.doi.org/10.4018/ijisp.2011070101.

Full text
Abstract:
Zero-knowledge authentication protocols are an alternative to authentication protocols based on public key cryptography. Low processing and memory consumption make them especially suitable for implementation in smart card microprocessors, which are severely limited in processing power and memory space. This paper describes a design and implementation of a software library providing smart card application developers with a reliable authentication mechanism based on well-known zero-knowledge authentication schemes. Java Card is used as the target smart card platform implementation based on the evaluation of the Fiat-Shamir (F-S) and Guillou-Quisquater (G-Q) protocols under various performance criteria are presented to show the effectiveness of the implementation and that G-Q is a more efficient protocol.
APA, Harvard, Vancouver, ISO, and other styles
38

Wang, Wei, Long Qing Zou, Hua Xu, You Wei An, Pei Fa Jia, Bo Li, and Yuan Luo. "A Design Method of Multiple Protocols Communication Module in Semiconductor Equipment Simulation Platform." Advanced Materials Research 462 (February 2012): 516–23. http://dx.doi.org/10.4028/www.scientific.net/amr.462.516.

Full text
Abstract:
This paper presents a design method for communication module design in semiconductor equipment simulation platform. There are several kinds of standardized protocols in semiconductor equipments intra communication, the method with which these standardized protocols can be configured and integrated in single simulation platform. These protocols can be configured statically and dynamically respectively. In static state, protocol configuration provides various protocols for chosen and edit. In the dynamic state, the virtual devices can be communicated with control system with communication module. As a case study, a process chamber system simulator with designed the communication module has been illustrated. The designed communication module accomplishes the data transmission between control system and the chamber simulation system. The devices in chamber system receive the instruction form control system and execute the required actions. The experiment results show that the simulation platform is feasible and effective.
APA, Harvard, Vancouver, ISO, and other styles
39

Müller-Török, Robert, Domenica Bagnato, and Alexander Prosser. "Council of Europe Recommendation CM/Rec(2017)5 and e-Voting Protocol Design." Masaryk University Journal of Law and Technology 14, no. 2 (September 23, 2020): 275–302. http://dx.doi.org/10.5817/mujlt2020-2-6.

Full text
Abstract:
The Corona pandemic has created a push towards digitization in a number of fields, not least in the public sector including democratic processes. This of course includes an increased interest in e-voting via the Internet. The Council of Europe has a long-standing history of work in the field including two Recommendations – (2004)11 and (2017)5 – which have become the de facto yardstick against which every e-voting system is measured. Rec(2017)5 builds on a decade of experience with e-voting and particularly strengthens two concepts important in any electronic voting system: Voting secrecy and auditability/verifiability. This has distinct implications for the design of e-voting protocols. The aim of this paper is to analyse the impact on what arguably are the most popular voting protocol families, envelope and token protocols. How does the modified Recommendation impact on the viability of protocols and protocol design? The paper first presents the Council of Europe Recommendation and the technical issues it addresses. Then a model is introduced to assess a voting protocol against the Recommendation; a typical envelope and a token protocol are assessed in view of the model and finally the two assessments are compared including policy recommendations for a path to e-voting implementation.
APA, Harvard, Vancouver, ISO, and other styles
40

Kaminska, Olena, and Peter Lynn. "The Implications of Alternative Allocation Criteria in Adaptive Design for Panel Surveys." Journal of Official Statistics 33, no. 3 (September 1, 2017): 781–99. http://dx.doi.org/10.1515/jos-2017-0036.

Full text
Abstract:
AbstractAdaptive survey designs can be used to allocate sample elements to alternative data collection protocols in order to achieve a desired balance between some quality measure and survey costs. We compare four alternative methods for allocating sample elements to one of two data collection protocols. The methods differ in terms of the quality measure that they aim to optimize: response rate, R-indicator, coefficient of variation of the participation propensities, or effective sample size. Costs are also compared for a range of sample sizes. The data collection protocols considered are CAPI single-mode and web-CAPI sequential mixed-mode. We use data from a large experiment with random allocation to one of these two protocols. For each allocation method we predict outcomes in terms of several quality measures and costs. Although allocating the whole sample to single-mode CAPI produces a higher response rate than allocating the whole sample to the mixed-mode protocol, we find that two of the targeted allocations achieve a better response rate than single-mode CAPI at a lower cost. We also find that all four of the targeted designs out-perform both single-protocol designs in terms of representativity and effective sample size. For all but the smallest sample sizes, the adaptive designs bring cost savings relative to CAPI-only, though these are fairly modest in magnitude.
APA, Harvard, Vancouver, ISO, and other styles
41

van Dooren, Marierose M. M., Valentijn Visch, Renske Spijkerman, Richard H. M. Goossens, and Vincent M. Hendriks. "Mental Health Therapy Protocols and eHealth Design: Focus Group Study." JMIR Formative Research 4, no. 5 (May 6, 2020): e15568. http://dx.doi.org/10.2196/15568.

Full text
Abstract:
Background Electronic health (eHealth) programs are often based on protocols developed for the original face-to-face therapies. However, in practice, therapists and patients may not always follow the original therapy protocols. This form of personalization may also interfere with the intended implementation and effects of eHealth interventions if designers do not take these practices into account. Objective The aim of this explorative study was to gain insights into the personalization practices of therapists and patients using cognitive behavioral therapy, one of the most commonly applied types of psychotherapy, in a youth addiction care center as a case context. Methods Focus group discussions were conducted asking therapists and patients to estimate the extent to which a therapy protocol was followed and about the type and reasons for personalization of a given therapy protocol. A total of 7 focus group sessions were organized involving therapists and patients. We used a commonly applied protocol for cognitive behavioral therapy as a therapy protocol example in youth mental health care. The first focus group discussions aimed at assessing the extent to which patients (N=5) or therapists (N=6) adapted the protocol. The second focus group discussions aimed at estimating the extent to which the therapy protocol is applied and personalized based on findings from the first focus groups to gain further qualitative insight into the reasons for personalization with groups of therapists and patients together (N=7). Qualitative data were analyzed using thematic analysis. Results Therapists used the protocol as a “toolbox” comprising different therapy tools, and personalized the protocol to enhance the therapeutic alliance and based on their therapy-provision experiences. Therapists estimated that they strictly follow 48% of the protocol, adapt 30%, and replace 22% by other nonprotocol therapeutic components. Patients personalized their own therapy to conform the assignments to their daily lives and routines, and to reduce their levels of stress and worry. Patients estimated that 29% of the provided therapy had been strictly followed by the therapist, 48% had been adjusted, and 23% had been replaced by other nonprotocol therapeutic components. Conclusions A standard cognitive behavioral therapy protocol is not strictly and fully applied but is mainly personalized. Based on these results, the following recommendations for eHealth designers are proposed to enhance alignment of eHealth to therapeutic practice and implementation: (1) study and copy at least the applied parts of a protocol, (2) co-design eHealth with therapists and patients so they can allocate the components that should be open for user customization, and (3) investigate if components of the therapy protocol that are not applied should remain part of the eHealth applied. To best generate this information, we suggest that eHealth designers should collaborate with therapists, patients, protocol developers, and mental health care managers during the development process.
APA, Harvard, Vancouver, ISO, and other styles
42

Günther, Felix. "Modeling advanced security aspects of key exchange and secure channel protocols." it - Information Technology 62, no. 5-6 (December 16, 2020): 287–93. http://dx.doi.org/10.1515/itit-2020-0029.

Full text
Abstract:
AbstractSecure connections are at the heart of today’s Internet infrastructure, protecting the confidentiality, authenticity, and integrity of communication. Achieving these security goals is the responsibility of cryptographic schemes, more specifically two main building blocks of secure connections. First, a key exchange protocol is run to establish a shared secret key between two parties over a, potentially, insecure connection. Then, a secure channel protocol uses that shared key to securely transport the actual data to be exchanged. While security notions for classical designs of these components are well-established, recently developed and standardized major Internet security protocols like Google’s QUIC protocol and the Transport Layer Security (TLS) protocol version 1.3 introduce novel features for which supporting security theory is lacking.In my dissertation [20], which this article summarizes, I studied these novel and advanced design aspects, introducing enhanced security models and analyzing the security of deployed protocols. For key exchange protocols, my thesis introduces a new model for multi-stage key exchange to capture that recent designs for secure connections establish several cryptographic keys for various purposes and with differing levels of security. It further introduces a formalism for key confirmation, reflecting a long-established practical design criteria which however was lacking a comprehensive formal treatment so far. For secure channels, my thesis captures the cryptographic subtleties of streaming data transmission through a revised security model and approaches novel concepts to frequently update key material for enhanced security through a multi-key channel notion. These models are then applied to study (and confirm) the security of the QUIC and TLS 1.3 protocol designs.
APA, Harvard, Vancouver, ISO, and other styles
43

Zhou, Qi Shu, Jie Luo, and Yan Lin Ji. "Design of DC Motor Speed Control System Based on FlexRay Network." Applied Mechanics and Materials 543-547 (March 2014): 1373–76. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.1373.

Full text
Abstract:
Nowadays, communication protocols are used in safety-critical automotive applications. Among the communication protocols, FlexRay, with real-time and reliable characters, is expected to become the communication backbone for future automotive systems. Therefore, a DC motor speed control system based on FlexRay network is presented in this paper to verify these characters. The following works have been done in this paper: study the FlexRay protocol specification, design the structure, programming, analyze the test results to get transmission delay time. Using the test system, FlexRay network was verified that message can be transferred quickly and correctly.
APA, Harvard, Vancouver, ISO, and other styles
44

Cardoen, Ben, Stijn Manhaeve, Yentl Van Tendeloo, and Jan Broeckhove. "A PDEVS simulator supporting multiple synchronization protocols: implementation and performance analysis." SIMULATION 94, no. 4 (February 1, 2017): 281–300. http://dx.doi.org/10.1177/0037549717690826.

Full text
Abstract:
With the ever-increasing complexity of simulation models, parallel simulation becomes necessary to perform simulation within reasonable time bounds. The built-in parallelism of Parallel DEVS is often insufficient to tackle this problem on its own. Several synchronization protocols have been proposed, each with their distinct advantages and disadvantages. Due to the significantly different implementation of these protocols, most Parallel DEVS simulation tools are limited to only one such protocol. In this paper, we present a Parallel DEVS simulator, grafted on C++11 and based on PythonPDEVS, supporting both conservative and optimistic synchronization protocols. The simulator not only supports both protocols but also has the capability to switch between them at runtime. The simulator can combine each synchronization protocols with either a threaded or sequential implementation of the PDEVS protocol. We evaluate the performance gain obtained by choosing the most appropriate synchronization protocol. A comparison is made to adevs in terms of CPU time and memory usage, to show that our modularity does not hinder performance. We compare the speedup obtained by synchronization with that of the inherent parallelism of PDEVS in isolation and combination, and contrast the results with the theoretical limits. We further allow for an external component to gather simulation statistics, on which runtime switching between the different synchronization protocols can be based. The effects of allocation on our synchronization protocols are also studied.
APA, Harvard, Vancouver, ISO, and other styles
45

Kola, L. M., and M. Velempini. "The Design and Implementation of the XWCETT Routing Algorithm in Cognitive Radio Based Wireless Mesh Networks." Wireless Communications and Mobile Computing 2018 (2018): 1–8. http://dx.doi.org/10.1155/2018/4173810.

Full text
Abstract:
The Wireless Mesh Networks (WMNs) technology has recently emerged as a promising high-speed wireless technology, which provides the last mile broadband Internet access and delivers integrated wireless communication solutions. Integrating the traditional wireless with new wireless technologies such as cognitive radio (CR) technology creates a platform for high-speed broadband communication. In a multihop ad hoc cognitive radio network (CRN) environment, the performance of the network is degraded by the routing protocols, which are adapted from the traditional wireless networks. In an endeavor to optimize the performance of the CRNs, existing routing protocols can be adapted and optimized. Secondly, new dynamic routing protocols can be designed to meet the requirements of CRNs. This paper investigates the existing routing protocols in WMNs and proposes a new routing protocol called extended Weighted Cumulative Expected Transmission Time (xWCETT). The xWCETT routing protocol was evaluated through network simulations using the NS 2. Its performance was evaluated with respect to the end-to-end average latency, the throughput, jitter, packet delivery ratio, and the normalized routing load. The comparative evaluation results show that the xWCETT achieves superior results in terms of average throughput, latency, and the normalized routing load.
APA, Harvard, Vancouver, ISO, and other styles
46

Al Ameen, Moshaddique, S. M. Riazul Islam, and Kyungsup Kwak. "Energy Saving Mechanisms for MAC Protocols in Wireless Sensor Networks." International Journal of Distributed Sensor Networks 6, no. 1 (January 1, 2010): 163413. http://dx.doi.org/10.1155/2010/163413.

Full text
Abstract:
Energy efficiency is a primary requirement in a wireless sensor network (WSN). This is a major design parameter in medium access control (MAC) protocols for WSN due to limited resources in sensor nodes that include low battery power. Hence a proposed MAC protocol must be energy efficient by reducing the potential energy wastes. Developing such a MAC protocol has been a hot research area in WSN. To avoid wasting the limited energy, various energy saving mechanisms are proposed for MAC protocols. These mechanisms have a common design objective—to save energy to maximize the network lifetime. This paper presents a survey on various energy saving mechanisms that are proposed for MAC protocols in WSN. We present a detailed discussion of these mechanisms and discuss their strengths and weaknesses. We also discuss MAC protocols that use these energy saving mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
47

Wu, Chuan, and Zhi Ping Zhou. "Design of Multiple Hetegenous Protocols Conversion of Home Gateway Based on Task Description." Advanced Materials Research 860-863 (December 2013): 2880–83. http://dx.doi.org/10.4028/www.scientific.net/amr.860-863.2880.

Full text
Abstract:
The disunion of communication protocol standards at present creates a huge barrier against the interconnection and interoperability of heterogeneous devices in home. To solve this problem, a method of multiple protocols conversion of home gateway was proposed to integrate a variety of heterogeneous protocol networks. Firstly, a new task description language based on ClassAD was designed to describe different heterogeneous devices for communicating each other in home networks. And a plug-in expansion mechanism was introduced to improve the scalability of heterogeneous protocols and the throughput of home networks system. As a result, the ability of semantic interoperability of heterogeneous devices is achieved to integrate new applications and drivers into the deployed intelligent home system during runtime based on the proposed home gateway.
APA, Harvard, Vancouver, ISO, and other styles
48

Odutayo, Ayodele, Dmitry Gryaznov, Bethan Copsey, Paul Monk, Benjamin Speich, Corran Roberts, Karan Vadher, et al. "Design, analysis and reporting of multi-arm trials and strategies to address multiple testing." International Journal of Epidemiology 49, no. 3 (March 16, 2020): 968–78. http://dx.doi.org/10.1093/ije/dyaa026.

Full text
Abstract:
Abstract Background It is unclear how multiple treatment comparisons are managed in the analysis of multi-arm trials, particularly related to reducing type I (false positive) and type II errors (false negative). Methods We conducted a cohort study of clinical-trial protocols that were approved by research ethics committees in the UK, Switzerland, Germany and Canada in 2012. We examined the use of multiple-testing procedures to control the overall type I error rate. We created a decision tool to determine the need for multiple-testing procedures. We compared the result of the decision tool to the analysis plan in the protocol. We also compared the pre-specified analysis plans in trial protocols to their publications. Results Sixty-four protocols for multi-arm trials were identified, of which 50 involved multiple testing. Nine of 50 trials (18%) used a single-step multiple-testing procedures such as a Bonferroni correction and 17 (38%) used an ordered sequence of primary comparisons to control the overall type I error. Based on our decision tool, 45 of 50 protocols (90%) required use of a multiple-testing procedure but only 28 of the 45 (62%) accounted for multiplicity in their analysis or provided a rationale if no multiple-testing procedure was used. We identified 32 protocol–publication pairs, of which 8 planned a global-comparison test and 20 planned a multiple-testing procedure in their trial protocol. However, four of these eight trials (50%) did not use the global-comparison test. Likewise, 3 of the 20 trials (15%) did not perform the multiple-testing procedure in the publication. The sample size of our study was small and we did not have access to statistical-analysis plans for the included trials in our study. Conclusions Strategies to reduce type I and type II errors are inconsistently employed in multi-arm trials. Important analytical differences exist between planned analyses in clinical-trial protocols and subsequent publications, which may suggest selective reporting of analyses.
APA, Harvard, Vancouver, ISO, and other styles
49

Li, Zengpeng, Can Xiang, and Chengyu Wang. "Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography." Wireless Communications and Mobile Computing 2018 (September 2, 2018): 1–11. http://dx.doi.org/10.1155/2018/5973285.

Full text
Abstract:
Authentication is the first defence line to prevent malicious entities to access smart mobile devices (or SMD). Essentially, there exist many available cryptographic primitives to design authentication protocols. Oblivious transfer (OT) protocol is one of the important cryptographic primitives to design authentication protocols. The first lattice-based OT framework under universal composability (UC) model was designed by dual mode encryption and promoted us to find an alternative efficient scheme. We note that “lossy encryption” scheme is an extension of the dual mode encryption and can be used to design UC-secure OT protocol, but the investigations of OT via lossy encryption over the lattice are absent. Hence, in order to obtain an efficient authentication protocol by improving the performance of the UC-secure OT protocol, in this paper, we first design a multibit lossy encryption under the decisional learning with errors (LWE) assumption and then design a new variant of UC-secure OT protocol for authenticated protocol via lossy encryption scheme. Additionally, our OT protocol is secure against semihonest (static) adversaries in the common reference string (CRS) model and within the UC framework.
APA, Harvard, Vancouver, ISO, and other styles
50

Gopi Krishna, P., K. Sreenivasa Ravi, D. Sai Pujitha, V. Sai Shashank, and G. Mounika. "Design and development of bi-directional smart IoT gateway with interoperability for heterogeneous devices." International Journal of Engineering & Technology 7, no. 2.8 (March 19, 2018): 109. http://dx.doi.org/10.14419/ijet.v7i2.8.10340.

Full text
Abstract:
In the world of possibilities, IoT is playing a crucial role in development and automation of things which is making life easier, comfortable and most importantly reliable. There is a drastic growth in IoT where lager number heterogeneous devices getting connected to internet, which are monitored and controlled remotely. IoT enables to connect diverse technologies, applications and protocols which lead to interoperability between the heterogeneous wireless protocols is a disadvantage. This paper implements a new Bi-Directional IoT Gateway, which enables the communication between the heterogeneous wireless protocols and wired protocol such as (Wi-Fi, ZigBee, Bluetooth, GSM and Ethernet). It enables the interconnection and interoperability between different wired and wireless protocols, by renovating the data received from distinct wireless nodes, which is acquired from the sensors or controlling data given by remote users. GSM module is used to transmit and receive the data to cloud and from the remote users where we do not have a wired internet but only GSM network.This is mainly useful in the fields of agriculture. This Bi-directional gateway gives offers significant advantages: (i) enables the connectivity between ZigBee, Wi-Fi, Bluetooth, GSM and Ethernet. (ii) Information will be transformed into required protocol format (iii) uses a light weighted protocol for transmitting the data to cloud and receiving the data from the remote location through computer or through a mobile phone. (iv) provides local storage in the gateway and puts into cloud for analyzing and future use of the received and transmitted data (v) The sensors data can be observed and controlled over a mobile phone, tablet or a personal computer.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography