Journal articles on the topic 'Design Protocols'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Design Protocols.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yao, Wenbing, Sheng-Uei Guan, Zhiqiang Jiang, and Ilias Kiourktsidis. "Self-Evolvable Protocol Design Using Genetic Algorithms." International Journal of Applied Evolutionary Computation 1, no. 1 (January 2010): 36–56. http://dx.doi.org/10.4018/jaec.2010010103.
Full textTurilli, Matteo. "Ethical protocols design." Ethics and Information Technology 9, no. 1 (February 8, 2007): 49–62. http://dx.doi.org/10.1007/s10676-006-9128-9.
Full textYu, Song Sen, Yun Peng, and Jia Jing Zhang. "A Lightweight RFID Mechanism Design." Advanced Materials Research 216 (March 2011): 120–23. http://dx.doi.org/10.4028/www.scientific.net/amr.216.120.
Full textHe, Jiayue, Jennifer Rexford, and Mung Chiang. "Don't optimize existing protocols, design optimizable protocols." ACM SIGCOMM Computer Communication Review 37, no. 3 (July 20, 2007): 53–58. http://dx.doi.org/10.1145/1273445.1273452.
Full textNguyen, Philon, Thanh An Nguyen, and Yong Zeng. "Segmentation of design protocol using EEG." Artificial Intelligence for Engineering Design, Analysis and Manufacturing 33, no. 1 (April 3, 2018): 11–23. http://dx.doi.org/10.1017/s0890060417000622.
Full textSari, Riri Fitri, Lukman Rosyidi, Bambang Susilo, and Muhamad Asvial. "A Comprehensive Review on Network Protocol Design for Autonomic Internet of Things." Information 12, no. 8 (July 22, 2021): 292. http://dx.doi.org/10.3390/info12080292.
Full textAlfouzan, Faisal Abdulaziz. "Energy-Efficient Collision Avoidance MAC Protocols for Underwater Sensor Networks: Survey and Challenges." Journal of Marine Science and Engineering 9, no. 7 (July 4, 2021): 741. http://dx.doi.org/10.3390/jmse9070741.
Full textIdeguchi, Tetsuo, Yuuji Koui, Nonmember, Mitsuru Tsuchida, Yukio Ushisako, Nonmember, and Michihiro Ishizaka. "Design and implementation of protocol conversion equipment for layered protocols." Electronics and Communications in Japan (Part I: Communications) 73, no. 3 (March 1990): 14–23. http://dx.doi.org/10.1002/ecja.4410730302.
Full textKo, Hoo Sang, and Shimon Y. Nof. "Design of Protocols for Task Administration in Collaborative Production Systems." International Journal of Computers Communications & Control 5, no. 1 (March 1, 2010): 91. http://dx.doi.org/10.15837/ijccc.2010.1.2466.
Full textChoi, Sangil, Wooksik Lee, Teukseob Song, and Jong-Hoon Youn. "Block Design-Based Asynchronous Neighbor Discovery Protocol for Wireless Sensor Networks." Journal of Sensors 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/951652.
Full textSyahputra, Ramdhani, Rahmadi Kurnia, and Rian Ferdian. "Analysis of FHRP Design and Implementation in RIPv2 and OSPF Routing Protocols." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 4, no. 1 (February 8, 2020): 102–8. http://dx.doi.org/10.29207/resti.v4i1.1490.
Full textZhang, Kai Lin, Da Hua Li, Shu Chen Shi, Xue Song Yang, Zhen Xiao, and Qiang Gao. "Design and Implementation of Multi-Protocol Self-Adaptation Gateway." Applied Mechanics and Materials 687-691 (November 2014): 2108–11. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2108.
Full textHao, Chen, John A. Clark, and Jeremy L. Jacob. "Automated Design of Security Protocols." Computational Intelligence 20, no. 3 (August 2004): 503–16. http://dx.doi.org/10.1111/j.0824-7935.2004.00249.x.
Full textKozak, P., and W. M. Wonham. "Design of transaction management protocols." IEEE Transactions on Automatic Control 41, no. 9 (1996): 1330–35. http://dx.doi.org/10.1109/9.536503.
Full textRamarao, K. V. S. "Design of transaction commitment protocols." Information Sciences 55, no. 1-3 (June 1991): 129–49. http://dx.doi.org/10.1016/0020-0255(91)90010-r.
Full textBunch, David S., David M. Rocke, and Robert O. Harrison. "Statistical design of ELISA protocols." Journal of Immunological Methods 132, no. 2 (September 1990): 247–54. http://dx.doi.org/10.1016/0022-1759(90)90036-u.
Full textLiu, Wei Dong, Xiang Yu Li, and Li'e Gao. "Design of a Gateway for Remotely Underwater Vehicles." Applied Mechanics and Materials 209-211 (October 2012): 2138–41. http://dx.doi.org/10.4028/www.scientific.net/amm.209-211.2138.
Full textChen, Zhi, Ya Peng, and Wenjing Yue. "Model-Checking Driven Design of QoS-Based Routing Protocol for Wireless Sensor Networks." Journal of Sensors 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/716561.
Full textChuang, Yun-Hsin, Chin-Laung Lei, and Hung-Jr Shiu. "How to Design a Secure Anonymous Authentication and Key Agreement Protocol for Multi-Server Environments and Prove Its Security." Symmetry 13, no. 9 (September 4, 2021): 1629. http://dx.doi.org/10.3390/sym13091629.
Full textLiu, Hai Yan, Yue Zhao, and Rui Huang. "Study and Design on Vulnerability Discovering of Network Protocols." Applied Mechanics and Materials 556-562 (May 2014): 5526–30. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5526.
Full textAmin, Md Ruhul, Md Shohrab Hossain, and Mohammed Atiquzzaman. "In-Band Full Duplex Wireless LANs: Medium Access Control Protocols, Design Issues and Their Challenges." Information 11, no. 4 (April 16, 2020): 216. http://dx.doi.org/10.3390/info11040216.
Full textGong, Wen Tao. "The Design of Multi-Protocol Network Based on Point-to-Point Protocol and Frame Relay." Advanced Materials Research 936 (June 2014): 2293–97. http://dx.doi.org/10.4028/www.scientific.net/amr.936.2293.
Full textHope, Emily S., Ben Filewod, Daniel W. McKenney, and Tony C. Lemprière. "A financial analysis of four carbon offset accounting protocols for a representative afforestation project (southern Ontario, Canada)." Canadian Journal of Forest Research 51, no. 7 (July 2021): 1015–28. http://dx.doi.org/10.1139/cjfr-2020-0183.
Full textTsuneizumi, Isamu, Ailixier Aikebaier, Makoto Ikeda, Tomoya Enokido, and Makoto Takizawa. "Design and Implementation of Hybrid Time (HT) Group Communication Protocol for Homogeneous Broadcast Groups." International Journal of Distributed Systems and Technologies 2, no. 3 (July 2011): 37–48. http://dx.doi.org/10.4018/jdst.2011070103.
Full textKristić, Ante, Julije Ožegović, and Ivan Kedžo. "Design and Modeling of Self-Adapting MAC (SaMAC) Protocol with Inconstant Contention Loss Probabilities." Wireless Communications and Mobile Computing 2018 (September 12, 2018): 1–25. http://dx.doi.org/10.1155/2018/6375317.
Full textWei, Jun Chao, Guo Yuan Zhang, Yao Chen, and Xiu Tian Yan. "Design of a Communication Interface between the Controller and the Galvanometer." Applied Mechanics and Materials 527 (February 2014): 269–72. http://dx.doi.org/10.4028/www.scientific.net/amm.527.269.
Full textSrivastava, Pallavi, Edwin Chung, and Stepan Ozana. "Asynchronous Floating-Point Adders and Communication Protocols: A Survey." Electronics 9, no. 10 (October 15, 2020): 1687. http://dx.doi.org/10.3390/electronics9101687.
Full textLongo, Bernadette, Craig Weinert, and T. Kenny Fountain. "Implementation of Medical Research Findings through Insulin Protocols: Initial Findings from an Ongoing Study of Document Design and Visual Display." Journal of Technical Writing and Communication 37, no. 4 (October 2007): 435–52. http://dx.doi.org/10.2190/v986-k02v-519t-721j.
Full textWyllie, MG. "Clinical trials design: protocols and endpoints." International Journal of Impotence Research 12, S4 (October 2000): S53—S58. http://dx.doi.org/10.1038/sj.ijir.3900578.
Full textAnderson, Tom, Scott Shenker, Ion Stoica, and David Wetherall. "Design guidelines for robust Internet protocols." ACM SIGCOMM Computer Communication Review 33, no. 1 (January 2003): 125–30. http://dx.doi.org/10.1145/774763.774783.
Full textZhang, Yili, Rong-Yu Liu, George A. Heberton, Paul Smolen, Douglas A. Baxter, Leonard J. Cleary, and John H. Byrne. "Computational design of enhanced learning protocols." Nature Neuroscience 15, no. 2 (December 25, 2011): 294–97. http://dx.doi.org/10.1038/nn.2990.
Full textEl Guibaly, F. "Design and analysis of arbitration protocols." IEEE Transactions on Computers 38, no. 2 (1989): 161–71. http://dx.doi.org/10.1109/12.16493.
Full textYolum, Pınar. "Design time analysis of multiagent protocols." Data & Knowledge Engineering 63, no. 1 (October 2007): 137–54. http://dx.doi.org/10.1016/j.datak.2006.12.001.
Full textZUO, JING, XUEFEN CHI, LIN GUAN, HONGXIA LI, and IRFAN AWAN. "DESIGN OF FUZZY BASED MULTI-CONSTRAINED ROUTING PROTOCOL AND THE PERFORMANCE EVALUATION." Journal of Interconnection Networks 09, no. 04 (December 2008): 369–87. http://dx.doi.org/10.1142/s0219265908002333.
Full textStamps, Arthur E. "Evaluating Architectural Design Review." Perceptual and Motor Skills 90, no. 1 (February 2000): 265–71. http://dx.doi.org/10.2466/pms.2000.90.1.265.
Full textPaul, Surjit, Sanjay Kumar, and Rajiv Ranjan Suman. "A Quantum Secure Entity Authentication Protocol Design for Network Security." International Journal of Information Security and Privacy 13, no. 4 (October 2019): 1–11. http://dx.doi.org/10.4018/ijisp.2019100101.
Full textPatel, Ahmed, Kenan Kalajdzic, Laleh Golafshan, and Mona Taghavi. "Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card." International Journal of Information Security and Privacy 5, no. 3 (July 2011): 1–18. http://dx.doi.org/10.4018/ijisp.2011070101.
Full textWang, Wei, Long Qing Zou, Hua Xu, You Wei An, Pei Fa Jia, Bo Li, and Yuan Luo. "A Design Method of Multiple Protocols Communication Module in Semiconductor Equipment Simulation Platform." Advanced Materials Research 462 (February 2012): 516–23. http://dx.doi.org/10.4028/www.scientific.net/amr.462.516.
Full textMüller-Török, Robert, Domenica Bagnato, and Alexander Prosser. "Council of Europe Recommendation CM/Rec(2017)5 and e-Voting Protocol Design." Masaryk University Journal of Law and Technology 14, no. 2 (September 23, 2020): 275–302. http://dx.doi.org/10.5817/mujlt2020-2-6.
Full textKaminska, Olena, and Peter Lynn. "The Implications of Alternative Allocation Criteria in Adaptive Design for Panel Surveys." Journal of Official Statistics 33, no. 3 (September 1, 2017): 781–99. http://dx.doi.org/10.1515/jos-2017-0036.
Full textvan Dooren, Marierose M. M., Valentijn Visch, Renske Spijkerman, Richard H. M. Goossens, and Vincent M. Hendriks. "Mental Health Therapy Protocols and eHealth Design: Focus Group Study." JMIR Formative Research 4, no. 5 (May 6, 2020): e15568. http://dx.doi.org/10.2196/15568.
Full textGünther, Felix. "Modeling advanced security aspects of key exchange and secure channel protocols." it - Information Technology 62, no. 5-6 (December 16, 2020): 287–93. http://dx.doi.org/10.1515/itit-2020-0029.
Full textZhou, Qi Shu, Jie Luo, and Yan Lin Ji. "Design of DC Motor Speed Control System Based on FlexRay Network." Applied Mechanics and Materials 543-547 (March 2014): 1373–76. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.1373.
Full textCardoen, Ben, Stijn Manhaeve, Yentl Van Tendeloo, and Jan Broeckhove. "A PDEVS simulator supporting multiple synchronization protocols: implementation and performance analysis." SIMULATION 94, no. 4 (February 1, 2017): 281–300. http://dx.doi.org/10.1177/0037549717690826.
Full textKola, L. M., and M. Velempini. "The Design and Implementation of the XWCETT Routing Algorithm in Cognitive Radio Based Wireless Mesh Networks." Wireless Communications and Mobile Computing 2018 (2018): 1–8. http://dx.doi.org/10.1155/2018/4173810.
Full textAl Ameen, Moshaddique, S. M. Riazul Islam, and Kyungsup Kwak. "Energy Saving Mechanisms for MAC Protocols in Wireless Sensor Networks." International Journal of Distributed Sensor Networks 6, no. 1 (January 1, 2010): 163413. http://dx.doi.org/10.1155/2010/163413.
Full textWu, Chuan, and Zhi Ping Zhou. "Design of Multiple Hetegenous Protocols Conversion of Home Gateway Based on Task Description." Advanced Materials Research 860-863 (December 2013): 2880–83. http://dx.doi.org/10.4028/www.scientific.net/amr.860-863.2880.
Full textOdutayo, Ayodele, Dmitry Gryaznov, Bethan Copsey, Paul Monk, Benjamin Speich, Corran Roberts, Karan Vadher, et al. "Design, analysis and reporting of multi-arm trials and strategies to address multiple testing." International Journal of Epidemiology 49, no. 3 (March 16, 2020): 968–78. http://dx.doi.org/10.1093/ije/dyaa026.
Full textLi, Zengpeng, Can Xiang, and Chengyu Wang. "Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography." Wireless Communications and Mobile Computing 2018 (September 2, 2018): 1–11. http://dx.doi.org/10.1155/2018/5973285.
Full textGopi Krishna, P., K. Sreenivasa Ravi, D. Sai Pujitha, V. Sai Shashank, and G. Mounika. "Design and development of bi-directional smart IoT gateway with interoperability for heterogeneous devices." International Journal of Engineering & Technology 7, no. 2.8 (March 19, 2018): 109. http://dx.doi.org/10.14419/ijet.v7i2.8.10340.
Full text