To see the other types of publications on this topic, follow the link: PROTOCOL ANALYSIS.

Journal articles on the topic 'PROTOCOL ANALYSIS'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'PROTOCOL ANALYSIS.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

S V Kharat, Gumaste. "Performance Analysis of DSR Protocol." International Journal of Scientific Engineering and Research 1, no. 3 (2013): 62–68. https://doi.org/10.70729/j201340.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hussain, Kashif. "Comparative Analysis of DNA Extraction Protocols from Blood for Bovine Theileriosis." International Journal of Agriculture and Biology 34, no. 03 (2025): 340301. https://doi.org/10.17957/ijab/15.2361.

Full text
Abstract:
Genomic DNA serves as the foundation for molecular research and advancements including disease sureveillance, biodiversity conservation and environmental monitoring etc. Cost-effectiveness coupled with DNA quality and quantity are prerequisites for molecular tools, which depend on extraction protocols. The current study compared four DNA extraction protocols to evaluate DNA quantity, integrity, purity, cost-effectiveness and suitability for detecting theileriosis. The DNA concentration with 100 µL of blood was highest for Tris-HCL EDTA protocol (A) 209.6 ng/µL, followed by phenol-chloroform pr
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Fu Lin, Jie Yang, Hong Wei Zhou, and Ying Liu. "A New Dynamic Protocol Analysis Model." Advanced Materials Research 765-767 (September 2013): 1761–65. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1761.

Full text
Abstract:
Traditional static analysis methods such as formal validation and theorem proving were used to analyze protocols security previously. These methods can not measure and evaluate actual security of protocols accurately for the setting and suppose are far from the actual conditions. This paper proposes a new dynamic protocol analysis model. The system based on the model can be used to active test in actual running conditions, analyze known protocols security, integrity, robustness, and analyze unknown protocols online, provide support for protocol designer. The systems structure, working flow and
APA, Harvard, Vancouver, ISO, and other styles
4

Zhao, Wen Hong. "Protocols Analysis by Base-Function." Applied Mechanics and Materials 530-531 (February 2014): 682–85. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.682.

Full text
Abstract:
A new description method of protocol structure is presented by base-function firstly. Then, a protocol analysis method base on it is proposed. To analyses the private protocols, a new self-learning algorithm is discussed. Finally, the flow of protocol analysis based on base-function is given. Experiment results show the efficiency of presented method.
APA, Harvard, Vancouver, ISO, and other styles
5

Owen, Stephen, Pearl Brereton, and David Budgen. "Protocol analysis." Communications of the ACM 49, no. 2 (2006): 117–22. http://dx.doi.org/10.1145/1113034.1113039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

KOVACIK, Cyril Filip, and Gabriel BUGAR. "ANALYSIS OF OPERATIONAL PROPERTIES OF VOIP NETWORK." Acta Electrotechnica et Informatica 1335-8243, no. 1338-3957 (2021): 30–34. http://dx.doi.org/10.15546/aeei-2021-0005.

Full text
Abstract:
Voice transmission over the Internet network is now taken for granted. Many end-user applications address this issue. However, this paper focuses on the specific use of the SCCP protocol created by Cisco, its implementation in a computer network and end devices, determination of the operational properties of this implementation, and their comparison in different conditions. VoIP traffic is compared at different bandwidths and implemented by different configurations of IP protocols. By investigated implementations of IP protocols are meant IPv4, IPv6, and IPv4 protocol with applied NAT. As part
APA, Harvard, Vancouver, ISO, and other styles
7

Anggriani, Sufy, Rizki Savira Firdaus, and Windy Amanda Siwi Suherlan. "Analisis Penyimpanan Protokol Notaris Secara Elektronik." Notaire 6, no. 3 (2023): 437–48. http://dx.doi.org/10.20473/ntr.v6i3.50802.

Full text
Abstract:
AbstractThe collapse of the efficiency of notary protocol storage that is carried out physically has resulted in the idea of developing a way for a notary to store the notary protocol, by transferring the storage media into electronic form. Thus, access in submitting notary protocols to the notary receiving the protocol is seen as more efficient because it involves technological advances. This research aims to analyze the importance of notary protocols being stored electronically and to analyze the criteria for notaries receiving electronic notary protocols. In this research, normative researc
APA, Harvard, Vancouver, ISO, and other styles
8

HU, YANJING, QINGQI PEI, and LIAOJUN PANG. "Instruction Clustering Analysis for Unknown Network Protocol's Abnormal Behavior." Journal of Interconnection Networks 15, no. 03n04 (2015): 1540002. http://dx.doi.org/10.1142/s0219265915400022.

Full text
Abstract:
Protocol's abnormal behavior analysis is an important task in protocol reverse analysis. Traditional protocol reverse analysis focus on the protocol message format, but protocol behavior especially the abnormal behavior is rare studied. In this paper, protocol behavior is represented by the labeled behavior instruction sequences. Similar behavior instruction sequences mean the similar protocol behavior. Using our developed virtual analysis platform HiddenDisc, we can capture a variety of known or unknown protocols' behavior instruction sequences. All kinds of executed or unexecuted instruction
APA, Harvard, Vancouver, ISO, and other styles
9

Neeru Kumari and Dr. Tilak Raj. "OSPF Metric Convergence and Variation Analysis During Redistribution with Routing Information Protocol." International Research Journal on Advanced Engineering and Management (IRJAEM) 2, no. 06 (2024): 1985–91. http://dx.doi.org/10.47392/irjaem.2024.0293.

Full text
Abstract:
Open Shortest Path First networking protocol falls under the category of Interior gateway routing protocols and is multi-vendor supported. The task of OSPF like any other routing protocol is to calculate the best path between source IP address and destination IP address within the organisation computer network. There are various other routing protocols like Routing Information Protocol, Border Gateway Protocol, Intermediate System - Intermediate System (IS-IS), Enhanced Interior Gateway Routing Protocol, etc. which are used in computer network. Routing protocols have different algorithms throu
APA, Harvard, Vancouver, ISO, and other styles
10

Muhammad Farhan, Muhammad Asif, Maaz Bin Ahmad, and Khalid Maqsood. "A Comparative Analysis of Unicast Routing Protocols for MPLS-VPN." Lahore Garrison University Research Journal of Computer Science and Information Technology 3, no. 1 (2019): 43–49. http://dx.doi.org/10.54692/lgurjcsit.2019.030167.

Full text
Abstract:
MPLS-VPN technology is introduced to provide secure transmission with minimum propagation delay. This paper presents a comparative analysis of unicast routing protocols for MPLSVPN enabled networks. The motive behind this analysis is to observe the consequence of unicast routing protocols on the performance of MPLS-VPN enabled networks and to choose most suitable routing protocol for such type of networks. To conduct the analysis, a test bed is established in GNS3 simulator. Three main unicast routing protocols i.e. Enhanced Interior Gateway Routing Protocol (EIGRP), Open Shortest Path First (
APA, Harvard, Vancouver, ISO, and other styles
11

Zhao, Wen Hong. "Protocols Analysis Based on the Combination Mode of Walsh Function." Applied Mechanics and Materials 543-547 (March 2014): 3482–85. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3482.

Full text
Abstract:
To analyses networks, technologies of network protocol analysis are usually used. A new approach of protocols analysis is presented based on the combination mode of walsh function. It consists of three parts, such as the protocol structure characterization method, the hierarchical protocol analysis and the self-learning combination modes. After discussing the analysis process, an experiment shows the efficiency of presented approach.
APA, Harvard, Vancouver, ISO, and other styles
12

Yongming Yao, Yongming Yao, Yulin Wang Yongming Yao, Weiyi Jiang Yulin Wang, Ziyuan Wang Weiyi Jiang, and Song Huang Ziyuan Wang. "PPAdroid: An Approach to Android Privacy Protocol Analysis." 網際網路技術學刊 23, no. 3 (2022): 561–71. http://dx.doi.org/10.53106/160792642022052303014.

Full text
Abstract:
<p>With the continuous growth of the number of mobile applications, users may provide personal information to applications consciously or unconsciously. Privacy protocol could help users understand the privacy behavior of applications. However, users usually ignore the content of the privacy protocol due to the length of their context. To solve such a problem, we conduct an empirical study on privacy protocols of Android applications and propose a method to detect sentences related to personal information operations in privacy protocol documents. In our proposed method, a verb list, a ne
APA, Harvard, Vancouver, ISO, and other styles
13

Lu, Siqi, Qingdi Han, Xuyang Miao, and Yubo Liu. "Research on Security Protocol Analysis Tool SmartVerif." Journal of Physics: Conference Series 2132, no. 1 (2021): 012022. http://dx.doi.org/10.1088/1742-6596/2132/1/012022.

Full text
Abstract:
Abstract Security protocols have been designed to protect the security of the network. However, many security protocols cannot guarantee absolute security in real applications. Therefore, security tests of the network protocol become particularly important. In this paper, firstly, we introduce SmartVerif, which is the first formal analysis tool to automatically verify the security of protocols through dynamic strategies. And then, we use SmartVerif to verify the pseudo-randomness of the encapsulated key of the Two-Pass AKE protocol, which was proposed by Liu’s in ASIACRYPT in 2020. Finally, we
APA, Harvard, Vancouver, ISO, and other styles
14

Smith, John, Dana Kay Smith, and Eileen Kupstas. "Automated Protocol Analysis." Human-Computer Interaction 8, no. 2 (1993): 101–45. http://dx.doi.org/10.1207/s15327051hci0802_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Rekhter, Yakov. "IDRP protocol analysis." ACM SIGCOMM Computer Communication Review 22, no. 2 (1992): 17–28. http://dx.doi.org/10.1145/141800.141802.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Grossman, Stephen. "Khandwalla's protocol analysis." Creativity Research Journal 7, no. 1 (1994): 93–95. http://dx.doi.org/10.1080/10400419409534515.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Sedgwick, P. "Per protocol analysis." BMJ 340, apr07 1 (2010): c1825. http://dx.doi.org/10.1136/bmj.c1825.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Gurtov, Andrei. "Performance analysis of general backoff protocols." Journal of Communications Software and Systems 4, no. 1 (2008): 13. http://dx.doi.org/10.24138/jcomss.v4i1.233.

Full text
Abstract:
In this paper, we analyze backoff protocols, such as the one used in Ethernet. We examine a general backoff function(GBF) rather than just the binary exponential backoff (BEB) used by Ethernet. Under some mild assumptions we find stability and optimality conditions for a wide class of backoff protocols with GBF. In particular, it is proved that the maximal throughput rate over the class of backoff protocols is a fixed function of the number of stations (N) and the optimal average service time is about Ne for large N. The reasons of the instability of the BEB protocol (for a big enough input ra
APA, Harvard, Vancouver, ISO, and other styles
19

Xiao, Meihua, Weiwei Song, Ke Yang, Ri OuYang, and Hanyu Zhao. "Formal Analysis of the Security Protocol with Timestamp Using SPIN." Computational Intelligence and Neuroscience 2022 (August 23, 2022): 1–11. http://dx.doi.org/10.1155/2022/2420590.

Full text
Abstract:
The verification of security protocols is an important basis for network security. Now, some security protocols add timestamps to messages to defend against replay attacks by network intruders. Therefore, verifying the security properties of protocols with timestamps is of great significance to ensure network security. However, previous formal analysis method of such protocols often extracted timestamps into random numbers in order to simplify the model before modeling and verification, which probably cause time-dependent security properties that are ignored. To solve this problem, a method fo
APA, Harvard, Vancouver, ISO, and other styles
20

Byun, Ilmu. "Cooperative Hybrid-ARQ Protocols: Unified Frameworks for Protocol Analysis." ETRI Journal 33, no. 5 (2011): 759–69. http://dx.doi.org/10.4218/etrij.11.0110.0630.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Syahputra, Ramdhani, Rahmadi Kurnia, and Rian Ferdian. "Analysis of FHRP Design and Implementation in RIPv2 and OSPF Routing Protocols." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 4, no. 1 (2020): 102–8. http://dx.doi.org/10.29207/resti.v4i1.1490.

Full text
Abstract:
The high reliability of data access has become a problem faced by many companies, institutions, and universities. For this reason, a protocol required that can protect the network from a communication breakdown. One method used to maintain communication is by implementing a protocol redundancy system. One or more routers will act as the primary router for load balancing, and some routers are in standby mode if one main router is down. First hop redundancy protocols (FHRP) is a protocol that implements redundancy and load balancing systems. This protocol can transfer access data traffic if one
APA, Harvard, Vancouver, ISO, and other styles
22

Zheng, Mingwei, Qingkai Shi, Xuwei Liu, et al. "ParDiff: Practical Static Differential Analysis of Network Protocol Parsers." Proceedings of the ACM on Programming Languages 8, OOPSLA1 (2024): 1208–34. http://dx.doi.org/10.1145/3649854.

Full text
Abstract:
Countless devices all over the world are connected by networks and communicated via network protocols. Just like common software, protocol implementations suffer from bugs, many of which only cause silent data corruption instead of crashes. Hence, existing automated bug-finding techniques focused on memory safety, such as fuzzing, can hardly detect them. In this work, we propose a static differential analysis called ParDiff to find protocol implementation bugs, especially silent ones hidden in message parsers. Our key observation is that a network protocol often has multiple implementations an
APA, Harvard, Vancouver, ISO, and other styles
23

Mehri-Toonabi, Ali, Mahdi Davoudi Darareh, and Shahrooz Janbaz. "High-dimensional quantum key distribution using polarization-phase encoding: security analysis." International Journal of Quantum Information 18, no. 06 (2020): 2050031. http://dx.doi.org/10.1142/s0219749920500318.

Full text
Abstract:
In this work, we introduce a high-dimensional polarization-phase (PoP)-based quantum key distribution protocol, briefly named PoP[Formula: see text], where [Formula: see text] is the dimension of a hybrid quantum state including polarization and phase degrees of freedom of the same photon, and [Formula: see text] is the number of mutually unbiased bases. We present a detailed description of the PoP[Formula: see text] protocol as a special case, and evaluate its security against various individual and coherent eavesdropping strategies, and in each case, we compare it with the BB84 and the two-d
APA, Harvard, Vancouver, ISO, and other styles
24

Jin-Ze Du, Jin-Ze Du, Jun-Wei Liu Jin-Ze Du, Tao Feng Jun-Wei Liu, and Zhan-Ting Yuan Tao Feng. "Formal Analysis and Improvement of Z-Wave Protocol." 電腦學刊 34, no. 4 (2023): 025–39. http://dx.doi.org/10.53106/199115992023083404003.

Full text
Abstract:
<p>In order to verify the security of the Z-Wave communication protocol, the possible attacks in the protocol are analyzed to reduce user privacy security vulnerabilities. For the communication process and key exchange process between the controller and the node, this paper uses CPN tools to model the Z-Wave S2 protocol, and introduces the Dolev-Yao attack model to verify the security behavior of the protocol. The results show that there is a man-in-the-middle attack when using S2 authentication for device inclusion. In response to this vulnerability, we propose a lightweight static auth
APA, Harvard, Vancouver, ISO, and other styles
25

Debuisschert, Thierry, and Simon Fossier. "Security analysis of the time-coding quantum key distribution protocols." Quantum Information and Computation 11, no. 11&12 (2011): 968–87. http://dx.doi.org/10.26421/qic11.11-12-7.

Full text
Abstract:
We report the security analysis of time-coding quantum key distribution protocols. The protocols make use of coherent single-photon pulses. The key is encoded in the photon time-detection. The use of coherent superposition of states allows to detect eavesdropping of the key. We give a mathematical model of a first protocol from which we derive a second, simpler, protocol. We derive the security analysis of both protocols and find that the secure rates can be similar to those obtained with the BB84 protocol. We then calculate the secure distance for those protocols over standard fibre links. Wh
APA, Harvard, Vancouver, ISO, and other styles
26

Shadi, Nashwan, and M. Alshammari Bandar. "Formal Analysis of MCAP Protocol Against Replay Attack." British Journal of Mathematics & Computer Science 22, no. 1 (2017): 1–14. https://doi.org/10.9734/BJMCS/2017/32744.

Full text
Abstract:
Replay attack is considered a common attacking technique that is used by adversaries to gain access to confidential information. Several approaches have been proposed to prevent replay attack in security-critical systems such as Automated Teller Machines (ATM) systems. Among those approaches is a recent one called the Mutual Chain Authentication Protocol for the Saudi Payments Network transactions (MCAP). This protocol aims to allow Saudi banking systems to overcome existing weaknesses in the currently used Two-Factor Authentication (2FA) protocols. In this paper, we analyze and verify the rec
APA, Harvard, Vancouver, ISO, and other styles
27

Lin, Wen Qi, Yi Liu, Li Meng Song, Yuan Jiao Zhang, and Fei Guo. "Comparison and Analysis of MAC Protocol in Multimedia Communications." Applied Mechanics and Materials 519-520 (February 2014): 496–99. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.496.

Full text
Abstract:
MAC protocol analysis and comparison to the multimedia communication theory as the framework, firstly discusses the requirement of communication network in computer networks and multimedia applications. MAC protocols oriented to wireless sensor networks are compared and analyzed. Summary of CSMA/CA, CSMA/CD, S-MAC and basic principles and applicable occasions, main parameters is made. Properties of the three MAC protocols is compared. The results of this study provides reference for MAC protocol oriented to multimedia communications.
APA, Harvard, Vancouver, ISO, and other styles
28

Xiao, Meihua, Lina Chen, Ke Yang, and Zehuan Li. "Formal Analysis of Rational Exchange Protocols Based on the Improved Buttyan Model." Symmetry 17, no. 7 (2025): 1033. https://doi.org/10.3390/sym17071033.

Full text
Abstract:
A rational exchange protocol is a type of e-commerce protocol that aims to maximize the participants’ own interests. The Buttyan model is commonly used to analyze the security of such protocols. However, this model has limitations in dealing with uncertainties and false messages in rational exchanges. To address these shortcomings, this paper proposes a formal analysis method based on Bayesian games. By incorporating participants’ types and beliefs, the Buttyan model is extended to enhance its ability to express uncertainties. Additionally, attack messages are introduced to simulate the potent
APA, Harvard, Vancouver, ISO, and other styles
29

Kang, Baoyuan, Yanbao Han, Kun Qian, and Jianqi Du. "Analysis and Improvement on an Authentication Protocol for IoT-Enabled Devices in Distributed Cloud Computing Environment." Mathematical Problems in Engineering 2020 (June 23, 2020): 1–6. http://dx.doi.org/10.1155/2020/1970798.

Full text
Abstract:
Recently, a number of authentication protocols integrated with the Internet of Things (IoT) and cloud computing have been proposed for secure access control on large-scale IoT networks. In this paper, we carefully analyze Amin et al.’s authentication protocol for IoT-enabled devices in distributed cloud computing environment and find that Amin et al.’s protocol is vulnerable to several weaknesses. The main shortcoming of Amin et al.’s protocol is in authentication phase; a malicious cloud server can counterfeit the cloud server chosen by a user, and the control server cannot find this counterf
APA, Harvard, Vancouver, ISO, and other styles
30

Shi, Lu-Feng, Karen A. Doherty, Tammy M. Kordas, and Joseph T. Pellegrino. "Short-Term and Long-Term Hearing Aid Benefit and User Satisfaction: A Comparison between Two Fitting Protocols." Journal of the American Academy of Audiology 18, no. 06 (2007): 482–95. http://dx.doi.org/10.3766/jaaa.18.6.3.

Full text
Abstract:
Currently published hearing aid fitting protocols recommend speech-in-noise testing and loudness measures, but it remains unclear how these measures affect hearing aid benefit and user satisfaction. This study compared two protocols in their effects on benefit and satisfaction. Protocol A included an electroacoustic analysis, real-ear measures, and hearing aid adjustments based on users' comments. Protocol B included all of Protocol A and a speech-in-noise test, loudness discomfort levels, and aided loudness. Thirty-two participants completed the Abbreviated Profile of Hearing Aid Benefit (APH
APA, Harvard, Vancouver, ISO, and other styles
31

Dey, Tanay, M. M. A. Hashem, and Subroto Kumar Mondal. "ON PERFORMANCE ANALYSIS OF AMBR PROTOCOL IN MOBILE AD HOC NETWORKS." IIUM Engineering Journal 11, no. 2 (2010): 240–54. http://dx.doi.org/10.31436/iiumej.v11i2.28.

Full text
Abstract:
Due to mobility of nodes in ad hoc networks, the most challenging issue is to design and to make sound analysis of a routing protocol that determines its robustness to deliver packets in low routing packet overhead. In this paper, we thoroughly analyzed the Adaptive Monitor Based Routing (AMBR) protocol by varying different parameters that affect a routing protocol to measure its performance. Analysis shows that it requires less routing control overhead comparing with other prevalent routing protocols. An improved analytical model is also presented in this paper. All these analyses firmly prov
APA, Harvard, Vancouver, ISO, and other styles
32

Sarvaiya, Ms Shilpa B. "Analysis of IoT Data Transfer Messaging Protocols on Application Layer." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (2022): 1812–19. http://dx.doi.org/10.22214/ijraset.2022.45604.

Full text
Abstract:
Abstract: Now on a daily basis during a smarter embedded world, have Internet of Things. IoT have lot of things for the embedded systems, and it's the potential to remodel our world with the assistance of it. Internet of Things (IoT) or Web of Things (WoT) is emerging technology and it wireless network between two or more objects or smart things connect via Internet. IoT classified in two types first is within IoT and second side is outside of IoT. In inside IoT consider as protocols in IoT. In outside of IoT consider as sensor, actuators, etc., those are physically possible. In within IoT con
APA, Harvard, Vancouver, ISO, and other styles
33

Vasudha and Bhola Anoop. "Comprehensive Analysis on Cluster based Hierarchical Routing Protocols for Wireless Sensor Networks." Journal of Switching Hub 4, no. 1 (2019): 1–9. https://doi.org/10.5281/zenodo.2537434.

Full text
Abstract:
<em>The most important key issuefor research purpose in WSN is the </em><em>Routing protocol. As indicated by organized network the routing protocols can be broadly described as flat and hierarchical routing protocol.The paper presents a few common progressive hierarchical routing protocols in detail and is investigated on their performance in network. Likewise, routing protocols share prominent role in terms of competence in WSN.Due to restrictions of resources in the sensors, it is difficult to plan an effective design of efficient routing protocol. The paper investigated Hierarchical based
APA, Harvard, Vancouver, ISO, and other styles
34

Rahul, Desai, P. Patil B, and Pal Sharma Davinder. "Routing Protocols for Mobile Ad Hoc Network: A Survey and Analysis." Indonesian Journal of Electrical Engineering and Computer Science 5, no. 1 (2017): 795–801. https://doi.org/10.11591/ijeecs.v7.i3.pp795-801.

Full text
Abstract:
Ad hoc networks are mobile wireless networks where each node is acting as a router. The existing routing protocols such as Destination sequences distance vector, Optimized list state routing protocols, Ad hoc on demand routing protocol, Ad hoc on demand multipath routing protocol, Dynamic source routing are optimized versions of distance vector or link state routing protocols. In this paper, existing protocols such as DSDV, AODV, AOMDV, OLSR and DSR are analyzed on 50 nodes Mobile Ad Hoc network with random mobility. Packet delivery ratio, delay, control overhead and throughput parameters are
APA, Harvard, Vancouver, ISO, and other styles
35

Abdulhameed, N. Hameed, Abdulghani Alabady Salah, and A. Thanoon Mohammad. "Performance analysis and evaluation of distance vector and link state routing protocols over a large area networks." TELKOMNIKA (Telecommunication, Computing, Electronics and Control) 20, no. 6 (2022): 1189–99. https://doi.org/10.12928/telkomnika.v20i6.22211.

Full text
Abstract:
Routing protocols are extremely important incredibly significant in data communication and computer networks. The high performance, reliability, stability, and security of the networks depend primarily on choosing the best type of dynamic routing protocol. In this paper, we evaluate and investigate the network performance for routing information protocol (RIP), enhanced interior gateway routing protocol (EIGRP), open shortest path first (OSPF), and intermediate system-to-intermediate system (IS-IS) routing protocols with three different scenarios of routes failure using the optimized network e
APA, Harvard, Vancouver, ISO, and other styles
36

Ahsan, Usama, Muhammad Mubashir Khan, Asad Arfeen, and Khadija Azam. "Security analysis of KXB10 QKD protocol with higher-dimensional quantum states." International Journal of Quantum Information 18, no. 08 (2020): 2150005. http://dx.doi.org/10.1142/s0219749921500052.

Full text
Abstract:
Quantum key distribution (QKD) is one of the exciting applications of quantum mechanics. It allows the sharing of secret keys between two communicating parties with unconditional security. A variety of QKD protocols have been proposed since the inception of the BB84 protocol. Among different implementation techniques of QKD protocols, there is a category which exploits higher dimensions qubit states to encode classical bits. In this paper, we focus on such a QKD protocol called KXB10, which uses three bases with higher dimensions. Analysis of the generalized dimension quantum states is perform
APA, Harvard, Vancouver, ISO, and other styles
37

Maurya, Indubala, and Rakesh Garg. "Systematic review meta-analysis protocol preparation and registration – A narrative review." Indian Journal of Anaesthesia 69, no. 1 (2025): 132–37. https://doi.org/10.4103/ija.ija_1165_24.

Full text
Abstract:
Systematic reviews and meta-analyses (SRMAs) help in decision making, especially on conflicting publication findings and quality. SRMA identifies the source of heterogeneity, reduces subjectivity and identifies and fills gaps in existing knowledge. However, conducting an SRMA requires a well-written protocol, which acts as a clear roadmap for the researcher and defines objectives, methods and expected outcomes. Predefined research questions and methods minimise bias, thus increasing the reliability of the results. The protocol ensures that the study team stays consistent in data collection, sy
APA, Harvard, Vancouver, ISO, and other styles
38

Sabeeruddin, Shaik. "Comparative Analysis of Network Security Controls in the Modern Era." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 8, no. 6 (2022): 1–7. https://doi.org/10.5281/zenodo.14866540.

Full text
Abstract:
In the current Digital world, to protect Data and provide secure communication internally and externally, Network security Protocols like Transport Layer Security (TLS), Internet Security Protocol (IPsec), and Hypertext Transfer Protocol Secure (HTTPS) play a crucial role in maintaining Security. This Research paper analyses the comparison of these protocols and explains their Functions, Use cases, and Limitations. This case study provides insights and explains the importance of these protocols in maintaining Security and protecting confidentiality, Integrity, and Availability. By Evaluating e
APA, Harvard, Vancouver, ISO, and other styles
39

Zain, Alaa, Heba El-khobby, Hatem M. Abd Elkader, and Mostafa Abdelnaby. "MANETs performance analysis with dos attack at different routing protocols." International Journal of Engineering & Technology 4, no. 2 (2015): 390. http://dx.doi.org/10.14419/ijet.v4i2.4609.

Full text
Abstract:
A Mobile Ad-Hoc Networks (MANET) is widely used in many industrial and people's life applications, such as earth monitoring, natural disaster prevention, agriculture biomedical related applications, and many other areas. Security threat is one of the major aspects of MANET, as it is one of the basic requirements of wireless sensor network, yet this problem has not been sufficiently explored. The main purpose of this paper is to study different MANETs routing protocols with three scenarios of Denial of Service (DoS) attacks on network layer using proactive routing protocol i.e. Optimized Link S
APA, Harvard, Vancouver, ISO, and other styles
40

Wang, Wei, and Qing Feng Cheng. "Analysis of Two ID-Based Key Exchange Protocols." Applied Mechanics and Materials 135-136 (October 2011): 289–93. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.289.

Full text
Abstract:
In this paper, we analyze two ID-based authenticated key exchange (AKE) protocols in the eCK model. One is a two-party AKE protocol between members of distinct domains proposed by Xia et al. in 2009. The other is a dynamic group AKE protocol proposed by Xie et al. in 2010. The results of analysis show that both of them are insecure in the eCK model.
APA, Harvard, Vancouver, ISO, and other styles
41

Feng, Tao, and Yi Wu. "Formal Security Analysis and Improvement Based on LonTalk Authentication Protocol." Security and Communication Networks 2022 (July 12, 2022): 1–19. http://dx.doi.org/10.1155/2022/8104884.

Full text
Abstract:
Security analysis of security protocol can be used to ensure communication security in the network. The process of security protocol analysis using the formal analysis method is simple and standardized, which is a research hotspot in the field of information security. In this study, a formal analysis method based on colored Petri net theory and Dolev-Yao attacker model is adopted to analyze LonTalk authentication protocol, and three types of attackable vulnerabilities including replay, tamper, and spoofing are found in LonTalk authentication protocol; thus, a secure LonTalk-SA authentication p
APA, Harvard, Vancouver, ISO, and other styles
42

Flinn, Barry, Savanah Dale, Andrew Disharoon, and Stephen Kresovich. "Comparative Analysis of In Vitro Responses and Regeneration between Diverse Bioenergy Sorghum Genotypes." Plants 9, no. 2 (2020): 248. http://dx.doi.org/10.3390/plants9020248.

Full text
Abstract:
Sorghum has been considered a recalcitrant plant in vitro and suffers from a lack of regeneration protocols that function broadly and efficiently across a range of genotypes. This study was initiated to identify differential genotype-in vitro protocol responses across a range of bioenergy sorghum parental lines and the common grain sorghum genotype Tx430 in order to characterize response profiles for use in future genetic studies. Two different in vitro protocols, LG and WU, were used for comparisons. Distinct genotype-protocol responses were observed, and the WU protocol performed significant
APA, Harvard, Vancouver, ISO, and other styles
43

Shaefer, Jeffry R., Cara Joy Riley, Paul Caruso, and David Keith. "Analysis of Criteria for MRI Diagnosis of TMJ Disc Displacement and Arthralgia." International Journal of Dentistry 2012 (2012): 1–8. http://dx.doi.org/10.1155/2012/283163.

Full text
Abstract:
Aims. To improve diagnostic criteria for TMJ disc displacement (DD).Methods. The standard protocol for MRI diagnosis of DD, using a 12 o’clock reference position, was compared to an alternative protocol. The alternative protocol involves the functional relationship between the condyle and articular eminence, using a line perpendicular to the posterior slope of the eminence as a reference for disc position. The disc location was examined using both protocols, and disc diagnoses were compared in their relationship with joint pain. Statistical analyses includedPvalue, sensitivity, specificity, od
APA, Harvard, Vancouver, ISO, and other styles
44

Feng, Tao, Taining Chen, and Xiang Gong. "Formal Security Analysis of ISA100.11a Standard Protocol Based on Colored Petri Net Tool." Information 15, no. 2 (2024): 118. http://dx.doi.org/10.3390/info15020118.

Full text
Abstract:
This paper presents a formal security analysis of the ISA100.11a standard protocol using the Colored Petri Net (CPN) modeling approach. Firstly, we establish a security threat model for the ISA100.11a protocol and provide a detailed description and analysis of the identified security threats. Secondly, we use the CPN tool to model the protocol formally and conduct model checking and security analysis. Finally, we analyze and discuss the results of the model checking, which demonstrate that the ISA100.11a standard protocol may have vulnerabilities when certain security threats exist, and provid
APA, Harvard, Vancouver, ISO, and other styles
45

Kaur, Arshdeep, Sandeep Kumar Arora, and Mahedi Masud. "Comparative Analysis of Clustering using AODV DSDV and CBRP." International Journal of Engineering & Technology 7, no. 3.8 (2018): 131. http://dx.doi.org/10.14419/ijet.v7i3.8.16847.

Full text
Abstract:
In a network whether wireless or wired, a set of protocols which are used to distribute the information through various routes between the nodes are said to be the routing protocols which serves as a majorly vital part of the computer networks. They specify the particular and specific path of information exchange by the sending and receiving of packets. Vehicular ad- hoc networks are quite emerging technologies of today’s era presenting the provision of seamless and uninterrupted communication in the network of mobile nodes in dynamic environment. Routing itself proves to be quite a considerab
APA, Harvard, Vancouver, ISO, and other styles
46

Desai, Rahul M., B. P. Patil, and Davinder Pal Sharma. "Routing Protocols for Mobile Ad Hoc Network - A Survey and Analysis." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 3 (2017): 795. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp795-801.

Full text
Abstract:
&lt;p class="Default"&gt;Ad hoc networks are mobile wireless networks where each node is acting as a router. The existing routing protocols such as Destination sequences distance vector, Optimized list state routing protocols, Ad hoc on demand routing protocol, Ad hoc on demand multipath routing protocol, Dynamic source routing are optimized versions of distance vector or link state routing protocols. In this paper, existing protocols such as DSDV, AODV, AOMDV, OLSR and DSR are analyzed on 50 nodes Mobile Ad Hoc network with random mobility. Packet delivery ratio, delay, control overhead and t
APA, Harvard, Vancouver, ISO, and other styles
47

Wang, Qun, Zhonghao Sun, Zhangquan Wang, et al. "A Practical Format and Semantic Reverse Analysis Approach for Industrial Control Protocols." Security and Communication Networks 2021 (March 12, 2021): 1–11. http://dx.doi.org/10.1155/2021/6690988.

Full text
Abstract:
Industrial control protocol is the basis of communication and interaction of industrial control system, and its security is related to the whole industrial infrastructure. Because many industrial control systems use proprietary protocols, it is necessary to adopt protocol reverse analysis technology to parse them and then detect whether there are secure vulnerabilities in the protocols by means of fuzzy testing. However, most of the existing technologies are designed for common network protocols, and there is no improvement for industrial control protocol. Therefore, we propose a multistage en
APA, Harvard, Vancouver, ISO, and other styles
48

Karanasiou, A., E. Diapouli, M. Viana, et al. "On the quantification of atmospheric carbonate carbon by thermal/optical analysis protocols." Atmospheric Measurement Techniques Discussions 3, no. 6 (2010): 5375–409. http://dx.doi.org/10.5194/amtd-3-5375-2010.

Full text
Abstract:
Abstract. Carbonaceous species, usually classified into two categories, organic carbon (OC) and elemental carbon (EC), constitute an important component of the atmospheric aerosol. Carbonate carbon (CC), or inorganic carbon, another constituent of carbonaceous material, is often not considered in many atmospheric chemistry studies. The reason for this may be its low contribution to fine particle mass in most areas studied, along with the difficulties in its analytical determination in atmospheric aerosols. The objective of this study was the quantification of atmospheric carbonate concentratio
APA, Harvard, Vancouver, ISO, and other styles
49

Song, Daegene. "Numerical Analysis in Entanglement Swapping Protocols." NeuroQuantology 20, no. 2 (2022): 153–57. http://dx.doi.org/10.14704/nq.2022.20.2.nq22083.

Full text
Abstract:
Entanglement has recently been one of the most essential elements in the development of various quantum technologies. In fact, a swapping protocol was introduced to create a long-distance entanglement from multiple shorter ones. Extending the previous work, this paper provides a more detailed numerical analysis to help create long-distance entanglement out of the two non-maximal three-level states. Specifically, it shows that while the protocol does not always yield optimal results, namely, the weaker link, there is a substantial number of states that yield an optimal result. Moreover, we disc
APA, Harvard, Vancouver, ISO, and other styles
50

K.Thamizhmaran. "Optimization Link Sate Routing Analysis with Destination Sequenced Distance Vector for MANET." Journal of Research in Electrical Power System 1, no. 1 (2025): 31–37. https://doi.org/10.5281/zenodo.15210274.

Full text
Abstract:
<em>Every node functions as a router, finding and maintaining routes to other nodes in the network to let them know about their benefits. However, security, energy, and transmission are still disadvantages.&nbsp; In a mobile setting, routing is handled via a variety of protocols.&nbsp; Routing protocol performance is a critical issue due to its extremely dynamic nature.&nbsp; The two well-known protocols that will be the subject of this study are the Optimized Link State Routing (OLSR) and Destination Sequenced Distance Vector (DSDV) protocols. When the routing protocols are built using NS2.34
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!