To see the other types of publications on this topic, follow the link: Protocols.

Journal articles on the topic 'Protocols'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Protocols.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Shi, Lu-Feng, Karen A. Doherty, Tammy M. Kordas, and Joseph T. Pellegrino. "Short-Term and Long-Term Hearing Aid Benefit and User Satisfaction: A Comparison between Two Fitting Protocols." Journal of the American Academy of Audiology 18, no. 06 (2007): 482–95. http://dx.doi.org/10.3766/jaaa.18.6.3.

Full text
Abstract:
Currently published hearing aid fitting protocols recommend speech-in-noise testing and loudness measures, but it remains unclear how these measures affect hearing aid benefit and user satisfaction. This study compared two protocols in their effects on benefit and satisfaction. Protocol A included an electroacoustic analysis, real-ear measures, and hearing aid adjustments based on users' comments. Protocol B included all of Protocol A and a speech-in-noise test, loudness discomfort levels, and aided loudness. Thirty-two participants completed the Abbreviated Profile of Hearing Aid Benefit (APH
APA, Harvard, Vancouver, ISO, and other styles
2

Báez S., Paola, Isabel Ruiz S., Luis F. Restrepo, and Jhon D. Ruiz B. "Comparación de dos protocolos anestésicos para ovariohisterectomía en perras sanas." Revista Colombiana de Ciencias Pecuarias 20, no. 4 (2016): 6. http://dx.doi.org/10.17533/udea.rccp.324200.

Full text
Abstract:
Para determinar los cambios hemodinámicos, y fisiológicos y la recuperación en dos protocolos anestésicos, en hembras caninas sanas durante ovariohisterectomia (OVH) electiva, se utilizaron dos grupos de animales, a cada uno de los cuales se les asignó un protocolo anestésico: Grupo I (fentanil + etomidato), grupo II (fentanil + tiopental). En ambos grupos el mantenimiento se hizo con isoflurano. Cada cinco minutos durante el procedimiento quirúrgico se midieron las siguientes variables: frecuencia cardíaca, frecuencia respiratoria, temperatura, dióxido de carbono expirado, presión arterial no
APA, Harvard, Vancouver, ISO, and other styles
3

Cameron, Thomas, Doson Chua, Stephen Shalansky, Edwin Tam, and Erica Wang. "Comparison of a Fully Weight-Based Protocol with a Non–Weight-Based Dosage Titration Protocol for IV Unfractionated Heparin: A Before-and-After Study." Canadian Journal of Hospital Pharmacy 76, no. 1 (2023): 23–28. http://dx.doi.org/10.4212/cjhp.3265.

Full text
Abstract:
Background: Unfractionated heparin (UFH) is used for the prevention and treatment of arterial or venous thromboembolism. The dosage for IV infusion of UFH is generally based on the patient’s weight, with adjustment to a specific target for activated partial thromboplastin time (aPTT). In May 2019, the UFH protocols at the study institution were changed from being fully weight-based (i.e., for both initial dosing and subsequent dosage titrations) to weight-based initial dosing and non–weight-based dosage titrations, but the relative effectiveness of these 2 approaches was not known. Objectives:
APA, Harvard, Vancouver, ISO, and other styles
4

Guo, Hua, Chen Chen, Ya Gao, Xiong Li, and Jiongchao Jin. "A Secure Three-Factor Multiserver Authentication Protocol against the Honest-But-Curious Servers." Wireless Communications and Mobile Computing 2018 (September 13, 2018): 1–14. http://dx.doi.org/10.1155/2018/3284324.

Full text
Abstract:
Three-factor multiserver authentication protocols become a prevalence in recent years. Among these protocols, almost all of them do not involve the registration center into the authentication process. To improve the protocol’s efficiency, a common secret key is shared among all severs, which leads to a serious weakness; i.e., we find that these protocols cannot resist the passive attack from the honest-but-curious servers. This paper takes Wang et al.’s protocol as an example, to exhibit how an honest-but-curious server attacks their protocol. To remedy this weakness, a novel three-factor mult
APA, Harvard, Vancouver, ISO, and other styles
5

Peixoto, João Alvarez, André Borin Soares, and Vitor Macedo Ochôa. "Internet das Coisas Industrial: um ensaio de protocolos IoT para manufatura industrial." Revista Eletrônica Científica da UERGS 8, no. 3 (2022): 178–87. http://dx.doi.org/10.21674/2448-0479.83.178-187.

Full text
Abstract:
Em meio às mudanças no mercado de bens e consumo, provocadas pela transformação digital, exige-se que as máquinas de manufaturas sejam mais interativas entre si e com os painéis de monitoramento em nuvem. As conexões via internet das coisas (IoT) promovem este grau de interação e mobilidade desejados. Contudo, o ambiente industrial reivindica melhor confiabilidade e segurança, visto que a Internet das Coisas Industrial (IIoT) apresenta-se com protocolos e plataformas para este fim. Portanto, conhecer as características de protocolos e plataformas, ante a manufatura, adquire importância. O obje
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Jian, and Chong-Qiang Ye. "Multi-party semi-quantum secret sharing protocol based on measure-flip and reflect operations." Laser Physics Letters 21, no. 7 (2024): 075201. http://dx.doi.org/10.1088/1612-202x/ad4eb6.

Full text
Abstract:
Abstract Semi-quantum secret sharing (SQSS) protocols serve as fundamental frameworks in quantum secure multi-party computations, offering the advantage of not requiring all users to possess intricate quantum devices. However, current SQSS protocols mainly cater to bipartite scenarios, with few protocols suitable for multi-party scenarios. Moreover, the multi-party SQSS protocols face limitations such as low qubit efficiency and inability to share deterministic secret information. To address this gap, this paper proposes a multi-party SQSS protocol based on multi-particle GHZ states. In this p
APA, Harvard, Vancouver, ISO, and other styles
7

Sabeeruddin, Shaik. "Comparative Analysis of Network Security Controls in the Modern Era." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 8, no. 6 (2022): 1–7. https://doi.org/10.5281/zenodo.14866540.

Full text
Abstract:
In the current Digital world, to protect Data and provide secure communication internally and externally, Network security Protocols like Transport Layer Security (TLS), Internet Security Protocol (IPsec), and Hypertext Transfer Protocol Secure (HTTPS) play a crucial role in maintaining Security. This Research paper analyses the comparison of these protocols and explains their Functions, Use cases, and Limitations. This case study provides insights and explains the importance of these protocols in maintaining Security and protecting confidentiality, Integrity, and Availability. By Evaluating e
APA, Harvard, Vancouver, ISO, and other styles
8

Reges Bessa, Carlos Deyvinson. "PERFORMANCE EVALUATION ANALYSIS OF WIRELESS SENSOR NETWORKS ROUTING PROTOCOLS IN SMART GRIDS." Revista Cientifica TECNIA 26, no. 1 (2016): 9. http://dx.doi.org/10.21754/tecnia-250215.02.

Full text
Abstract:
ABSTRACTThis work aims to study which wireless sensor network routing protocol is more suitable for Smart Grids applications, through simulation of AODV protocols, AOMDV, DSDV and HTR in the NS2 simulation environment. Was simulated a network based on a residential area with 47 residences, with one node for each residence and one base station, located about 25m from the other nodes. Many parameters, such as packet loss, throughput, delay, jitter and energy consumption were tested. The network was increased to 78 and 93 nodes in order to evaluate the behavior of the protocols in larger networks
APA, Harvard, Vancouver, ISO, and other styles
9

Reges Bessa, Carlos Deyvinson. "PERFORMANCE EVALUATION ANALYSIS OF WIRELESS SENSOR NETWORKS ROUTING PROTOCOLS IN SMART GRIDS." Revista Cientifica TECNIA 26, no. 1 (2016): 17. http://dx.doi.org/10.21754/tecnia-26012016.02.

Full text
Abstract:
ABSTRACTThis work aims to study which wireless sensor network routing protocol is more suitable for Smart Grids applications, through simulation of AODV protocols, AOMDV, DSDV and HTR in the NS2 simulation environment. Was simulated a network based on a residential area with 47 residences, with one node for each residence and one base station, located about 25m from the other nodes. Many parameters, such as packet loss, throughput, delay, jitter and energy consumption were tested. The network was increased to 78 and 93 nodes in order to evaluate the behavior of the protocols in larger networks
APA, Harvard, Vancouver, ISO, and other styles
10

Reges Bessa, Carlos Deyvinson, Rodrigo Soares Semente, Xiankleber Cavalcante Benjamim, et al. "PERFORMANCE EVALUATION ANALYSIS OF WIRELESS SENSOR NETWORKS ROUTING PROTOCOLS IN SMART GRIDS." Revista Cientifica TECNIA 26, no. 1 (2016): 17. http://dx.doi.org/10.21754/tecnia.v26i1.2.

Full text
Abstract:
ABSTRACTThis work aims to study which wireless sensor network routing protocol is more suitable for Smart Grids applications, through simulation of AODV protocols, AOMDV, DSDV and HTR in the NS2 simulation environment. Was simulated a network based on a residential area with 47 residences, with one node for each residence and one base station, located about 25m from the other nodes. Many parameters, such as packet loss, throughput, delay, jitter and energy consumption were tested. The network was increased to 78 and 93 nodes in order to evaluate the behavior of the protocols in larger networks
APA, Harvard, Vancouver, ISO, and other styles
11

Saunders, Diana. "The Protocol of Protocols." Practice Nursing 9, no. 10 (1998): 3. http://dx.doi.org/10.12968/pnur.1998.9.10.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Beattie, Randall C. "Distortion Product Otoacoustic Emissions: Comparison of Sequential versus Simultaneous Presentation of Primary-Tone Pairs." Journal of the American Academy of Audiology 14, no. 09 (2003): 471–84. http://dx.doi.org/10.1055/s-0040-1715939.

Full text
Abstract:
This Grason-Stadler GSI-60 system for measuring distortion product otoacoustic emissions (DPOAEs) allows the examiner to present one set of primary-tone pairs at a time (i.e., sequential presentation), or to present as many as four sets of primary-tone pairs at a time (i.e., simultaneous presentation). The Sequential and Simultaneous protocols were used to compare administration times, DPOAEs, and noise floors (NFs) on normal-hearing subjects at three frequencies (f2 = 1000, 2000, and 4000 Hz) and eight intensities (L1 = 40–75 dB SPL in 5 dB steps; L2 = 30–65 dB SPL). The Simultaneous protocol
APA, Harvard, Vancouver, ISO, and other styles
13

Sayat, Mikhael T., Oliver Thearle, Biveen Shajilal, et al. "Mapping Guaranteed Positive Secret Key Rates for Continuous Variable Quantum Key Distribution." Entropy 26, no. 10 (2024): 865. http://dx.doi.org/10.3390/e26100865.

Full text
Abstract:
The standard way to measure the performance of existing continuous variable quantum key distribution (CVQKD) protocols is by using the achievable secret key rate (SKR) with respect to one parameter while keeping all other parameters constant. However, this atomistic method requires many individual parameter analyses while overlooking the co-dependence of other parameters. In this work, a numerical tool is developed for comparing different CVQKD protocols while taking into account the simultaneous effects of multiple CVQKD parameters on the capability of protocols to produce positive SKRs. Usin
APA, Harvard, Vancouver, ISO, and other styles
14

Corredor-Matus, José R., Carlos J. Sejín-Puche, and Mario A. González- G. "Evaluación de cinco protocolos de conservación de tejidos en chigüiro (Hydrochaeris Hydrochaeris) (Linnaeus, 1766)." Orinoquia 14, no. 2 sup (2010): 110–25. http://dx.doi.org/10.22579/20112629.98.

Full text
Abstract:
Titulo en ingles: Evaluation of five protocols of conservation‘s techniques in chiguiro Hydrochaeris hydrochaeris (Linnaeus, 1766) tissues.ABSTRACT: Bodies conservation is a technique that uses the formalin chemical almost exclusively. It´s use dehydrates the tissues, takes the tissues dissection very hard and volatilized contaminants fumes. With the purpose to carry out morphological studies in chigüiros (Hydrochaeris hydrochaeris) and minimize contaminants effects for exclusive use of formalin, tests were made with five conservations protocol´s, using compounds such: Formalin at 5, 12, 14, 1
APA, Harvard, Vancouver, ISO, and other styles
15

Khan, Muhammad, Yasir Zaki, Shiva Iyer, et al. "The case for model-driven interpretability of delay-based congestion control protocols." ACM SIGCOMM Computer Communication Review 51, no. 1 (2021): 18–25. http://dx.doi.org/10.1145/3457175.3457179.

Full text
Abstract:
Analyzing and interpreting the exact behavior of new delay-based congestion control protocols with complex non-linear control loops is exceptionally difficult in highly variable networks such as cellular networks. This paper proposes a Model-Driven Interpretability (MDI) congestion control framework, which derives a model version of a delay-based protocol by simplifying a congestion control protocol's response into a guided random walk over a two-dimensional Markov model. We demonstrate the case for the MDI framework by using MDI to analyze and interpret the behavior of two delay-based protoco
APA, Harvard, Vancouver, ISO, and other styles
16

Deepak Malik and Dr. Bijendra Singh. "Optimizing OSPF Cost Value for Best Path Selection Using Metric-Type Variation." International Research Journal on Advanced Engineering Hub (IRJAEH) 2, no. 06 (2024): 1845–54. http://dx.doi.org/10.47392/irjaeh.2024.0254.

Full text
Abstract:
Open Shortest Path First (OSPF) is a multi-vendor routing standard. Any routing protocol's goal is to discover the optimum path between source and destination addresses inside a computer network. Other routing protocols include Routing Information Protocol (RIP), Border Gateway Protocol (BGP), Enhanced Interior Gateway Routing Protocol (EIGRP), and IS-IS. which are also used in computer networking. Each routing protocol has different set of rules through which they calculate the best path selection. OSPF is often used with the combination of these routing protocol because of its flexible desig
APA, Harvard, Vancouver, ISO, and other styles
17

HU, YANJING, QINGQI PEI, and LIAOJUN PANG. "Instruction Clustering Analysis for Unknown Network Protocol's Abnormal Behavior." Journal of Interconnection Networks 15, no. 03n04 (2015): 1540002. http://dx.doi.org/10.1142/s0219265915400022.

Full text
Abstract:
Protocol's abnormal behavior analysis is an important task in protocol reverse analysis. Traditional protocol reverse analysis focus on the protocol message format, but protocol behavior especially the abnormal behavior is rare studied. In this paper, protocol behavior is represented by the labeled behavior instruction sequences. Similar behavior instruction sequences mean the similar protocol behavior. Using our developed virtual analysis platform HiddenDisc, we can capture a variety of known or unknown protocols' behavior instruction sequences. All kinds of executed or unexecuted instruction
APA, Harvard, Vancouver, ISO, and other styles
18

Sun, Xin, Piotr Kulicki, and Mirek Sopek. "Multi-Party Quantum Byzantine Agreement without Entanglement." Entropy 22, no. 10 (2020): 1152. http://dx.doi.org/10.3390/e22101152.

Full text
Abstract:
In this paper, we propose a protocol of quantum communication to achieve Byzantine agreement among multiple parties. Our protocol’s striking feature compared to the existing protocols is that we do not use entanglement to achieve the agreement. The role played by entangled states in other protocols is replaced in our protocol by a group of semi-honest list distributors. Such a replacement makes the implementation of our protocol more feasible. Moreover, our protocol is efficient in the sense that it achieves agreement in only three rounds which is a significant improvement with respect to the
APA, Harvard, Vancouver, ISO, and other styles
19

Qu, Yibo, Dongliang Fang, Zhen Wang, et al. "ICEPRE: ICS Protocol Reverse Engineering via Data-Driven Concolic Execution." Proceedings of the ACM on Software Engineering 2, ISSTA (2025): 2384–406. https://doi.org/10.1145/3728982.

Full text
Abstract:
With the advancement of digital transformation, Industrial Control Systems (ICS) are becoming increasingly open and intelligent. However, inherent vulnerabilities in ICS protocols pose significant security threats to devices and systems. The proprietary nature of ICS protocols complicates the security analysis and deployment of protective mechanisms for ICS. Protocol reverse engineering aims to infer the syntax, semantics, and state machines of protocols in the absence of official specifications. Traditional protocol reverse engineering tools face considerable limitations due to the lack of ex
APA, Harvard, Vancouver, ISO, and other styles
20

Jouyandeh, Narjes, and bReza EbrahimiAtani. "A Review of Data Aggregation Protocols in VANET and providing proposed protocol." International Academic Journal of Science and Engineering 05, no. 01 (2018): 134–44. http://dx.doi.org/10.9756/iajse/v5i1/1810012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

JIOM. "Protocols protocol and standard operating procedures." Journal of Institute of Medicine Nepal 32, no. 1 (2010): 1. http://dx.doi.org/10.59779/jiomnepal.480.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Lee, Young Moo, and Kyu Ho Park. "A protocol converter for nonblocking protocols." Integration 33, no. 1-2 (2002): 71–88. http://dx.doi.org/10.1016/s0167-9260(02)00049-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Rekha, H., and M. Siddappa. "Model Checking M2M and Centralised IOT authentication Protocols." Journal of Physics: Conference Series 2161, no. 1 (2022): 012042. http://dx.doi.org/10.1088/1742-6596/2161/1/012042.

Full text
Abstract:
Abstract It is very difficult to develop a perfect security protocol for communication over the IoT network and developing a reliable authentication protocol requires a detailed understanding of cryptography. To ensure the reliability of security protocols of IoT, the validation method is not a good choice because of its several disadvantages and limitations. To prove the high reliability of Cryptographic Security Protocols(CSP) for IoT networks, the functional correctness of security protocols must be proved secure mathematically. Using the Formal Verification technique we can prove the funct
APA, Harvard, Vancouver, ISO, and other styles
24

Wang, Ying Lian, and Jun Yao Ye. "Research on Applied-Information Technology in Hierarchical Network Security Protocols Designing Based on Public Key." Advanced Materials Research 951 (May 2014): 169–72. http://dx.doi.org/10.4028/www.scientific.net/amr.951.169.

Full text
Abstract:
This paper proposed an applied-information technology in hierarchical network security protocols designing model based on public key, the designing of the protocols is to be completed in several layers. Each sub-protocol achieved a sub-goal that it should complete, and provided data interface to a higher sub-protocol. And then merged the sub-protocol of each layer, to complete the protocols designing. In the previous research, the security of the protocol in applied-information technology was always regarded as a whole, which caused the protocols designing to be tremendous complexity. The hier
APA, Harvard, Vancouver, ISO, and other styles
25

Kudin, Anton, and Polina Seliukh. "Asymmetric cryptographic protocols with a blockchain core: development problems and their solutions." Physico-mathematical modelling and informational technologies, no. 32 (July 8, 2021): 175–80. http://dx.doi.org/10.15407/fmmit2021.32.175.

Full text
Abstract:
The problem of axiomatic construction of secure cryptographic protocols is closely related to the choice of basic cryptographic blocks from which a cryptographic protocol of arbitrary complexity can be built. Let’s call such blocks primitive cryptographic protocols. Along with a traditional choice as primitive secret sharing protocols and non-interactive proof protocols today blockchain is considered to be a primitive cryptographic protocol. The security of such cryptographic protocols with a blockchain core is studied a bit today. We consider the methods for increasing the security of protoco
APA, Harvard, Vancouver, ISO, and other styles
26

Yousif, Samar T. "SIMULATION AND COMPARISON OF AD HOC NETWORKS ROUTING PROTOCOLS BASED ON OPNET." Iraqi Journal of Information and Communication Technology 5, no. 1 (2022): 42–49. http://dx.doi.org/10.31987/ijict.5.1.190.

Full text
Abstract:
Ad-hoc routing algorithm has always been a core problem in research of ad-hoc networks. In order to be able to deal with various routing protocol problems on an ad-hoc network like poor validity and large control overhead, this paper classify and compare ad-hoc network routing protocols through OPNET simulation tool and focus on testing two routing protocols' performance namely, table-driven and on-demand routing protocol. The Destination Sequenced Distance Vector routing protocol is the most used table-driven routing protocols, While AODV and DSR routing protocols are the two most used on-dem
APA, Harvard, Vancouver, ISO, and other styles
27

Sun, Nigang, Junlong Li, Yining Liu, and Varsha Arya. "A Scalable Sharding Protocol Based on Cross-Shard Dynamic Transaction Confirmation for Alliance Chain in Intelligent Systems." International Journal on Semantic Web and Information Systems 19, no. 1 (2023): 1–30. http://dx.doi.org/10.4018/ijswis.333063.

Full text
Abstract:
Applying sharding protocol to address scalability challenges in alliance chain is popular. However, inevitable cross-shard transactions significantly hamper performance even at low ratios, negating scalability benefits when they dominate as shard scale grows. This article proposes a new sharding protocol suitable for alliance chain that reduces cross-shard transaction impact, improving system performance. It adopts a directed acyclic graph ledger, enabling parallel transaction processing, and employs dynamic transaction confirmation consensus for simplicity. The protocol's sharding process and
APA, Harvard, Vancouver, ISO, and other styles
28

Zhu, Xinghui, Ziheng Jiang, Qiyuan Zhang, Shuangrui Zhao, and Zhiwei Zhang. "An Unknown Protocol Identification Method for Industrial Internet." Wireless Communications and Mobile Computing 2022 (September 5, 2022): 1–14. http://dx.doi.org/10.1155/2022/3792205.

Full text
Abstract:
This paper focuses on the problem of protocol identification in the industrial internet and proposes an unknown protocol identification method. We first establish an industrial internet protocol detection model to classify known protocols, unknown protocols, and interference signals and then store the unknown protocols for manual analysis. Based on the Eps-neighborhood idea, we further develop an Eps-neighborhood hit algorithm and propose an identification method to identify unknown protocols, where the supervised learning classification of unknown protocol detection is realized. Finally, exte
APA, Harvard, Vancouver, ISO, and other styles
29

Salkica, Nusret, Amela Begić, Adnan Beganović, et al. "Optimisation of the bone single photon emission computed tomography in oncology patients." Journal of Health Sciences 13, no. 3 (Suplement 1) (2024): 209–12. http://dx.doi.org/10.17532/jhs.2023.2596.

Full text
Abstract:
Introduction: The introduction of hybrid imaging systems such as Single Photon Emission Computed Tomography/Computed Tomography (SPECT/CT) has completely changed the scanning procedure of conventional diagnostic nuclear medicine protocols. Modern bone scintigraphy protocols include SUV quanitification and Whole Body (WB) SPECT/CT scanning modality. The major limitation of these new technologies is relatively long scanning time. New detector systems with modern reconstruction softwares have been developed for fast scanning SPECT protocolos. These new technologies can produce images of reduced a
APA, Harvard, Vancouver, ISO, and other styles
30

Alfouzan, Faisal Abdulaziz. "Energy-Efficient Collision Avoidance MAC Protocols for Underwater Sensor Networks: Survey and Challenges." Journal of Marine Science and Engineering 9, no. 7 (2021): 741. http://dx.doi.org/10.3390/jmse9070741.

Full text
Abstract:
The Medium Access Control (MAC) layer protocol is the most important part of any network, and is considered to be a fundamental protocol that aids in enhancing the performance of networks and communications. However, the MAC protocol’s design for underwater sensor networks (UWSNs) has introduced various challenges. This is due to long underwater acoustic propagation delay, high mobility, low available bandwidth, and high error probability. These unique acoustic channel characteristics make contention-based MAC protocols significantly more expensive than other protocol contentions. Therefore, r
APA, Harvard, Vancouver, ISO, and other styles
31

Sabor, Nabil, Shigenobu Sasaki, Mohammed Abo-Zahhad, and Sabah M. Ahmed. "A Comprehensive Survey on Hierarchical-Based Routing Protocols for Mobile Wireless Sensor Networks: Review, Taxonomy, and Future Directions." Wireless Communications and Mobile Computing 2017 (2017): 1–23. http://dx.doi.org/10.1155/2017/2818542.

Full text
Abstract:
Introducing mobility to Wireless Sensor Networks (WSNs) puts new challenges particularly in designing of routing protocols. Mobility can be applied to the sensor nodes and/or the sink node in the network. Many routing protocols have been developed to support the mobility of WSNs. These protocols are divided depending on the routing structure into hierarchical-based, flat-based, and location-based routing protocols. However, the hierarchical-based routing protocols outperform the other routing types in saving energy, scalability, and extending lifetime of Mobile WSNs (MWSNs). Selecting an appro
APA, Harvard, Vancouver, ISO, and other styles
32

Zhang, Bo, Wei-Xu Shi, Jian Wang, and Chao-Jing Tang. "Quantum direct communication protocol strengthening against Pavičić’s attack." International Journal of Quantum Information 13, no. 07 (2015): 1550052. http://dx.doi.org/10.1142/s0219749915500525.

Full text
Abstract:
A quantum circuit providing an undetectable eavesdropping of information in message mode, which compromises all two-state [Formula: see text]-[Formula: see text] quantum direct communication (QDC) protocols, has been recently proposed by Pavičić [Phys. Rev. A 87 (2013) 042326]. A modification of the protocol’s control mode is proposed, which improves users’ 25% detection probability of Eve to 50% at best, as that in ping-pong protocol. The modification also improves the detection probability of Wójcik’s attack [Phys. Rev. Lett 90 (2003) 157901] to 75% at best. The resistance against man-in-the
APA, Harvard, Vancouver, ISO, and other styles
33

Marimpoong, Monalyn A., and Emma K. Sales. "Evaluation of USM Biotech DNA extraction method for selected agricultural crops in comparison with existing methods." Evaluation of USM Biotech DNA extraction method for selected agricultural crops in comparison with existing methods 1, no. 1 (2019): 31–38. https://doi.org/10.5281/zenodo.8245205.

Full text
Abstract:
Different DNA extraction protocols have been used in plant DNA extraction. However, no comparative analysis has been done to determine their efficiency, cost effectiveness and time requirement for the extraction. Three (3) established protocols and the USM Biotech modified protocols were used in this study. It aimed to evaluate the efficiency of the four DNA extraction protocols in terms of DNA yield, purity and processing time; to determine and compare the cost of sample analysis per protocol and to assess which protocol is universally applicable in extracting DNA of selected agricultural cro
APA, Harvard, Vancouver, ISO, and other styles
34

Rong, Zhenbang, Daowen Qiu, and Xiangfu Zou. "Two single-state semi-quantum secure direct communication protocols based on single photons." International Journal of Modern Physics B 34, no. 11 (2020): 2050106. http://dx.doi.org/10.1142/s0217979220501064.

Full text
Abstract:
Semi-quantum protocol is a hot topic in quantum cryptography. One of the original motivational reasons to study semi-quantum protocol is to better understand “how quantum” a protocol needs to be in order to gain an advantage over its classical counterpart. Semi-quantum secure direct communication (SQSDC) is an important branch of the semi-quantum protocol, which makes it possible to directly transfer large amounts of data between quantum participant and classical participant without need to share the secret key in advance. In this paper, we propose two new SQSDC protocols based on single photo
APA, Harvard, Vancouver, ISO, and other styles
35

Cai, Jianfei, Guozheng Yang, Jingju Liu, and Yi Xie. "FastCAT: A framework for fast routing table calculation incorporating multiple protocols." Mathematical Biosciences and Engineering 20, no. 9 (2023): 16528–50. http://dx.doi.org/10.3934/mbe.2023737.

Full text
Abstract:
<abstract> <p>Currently, most network outages occur because of manual configuration errors. Therefore, it is essential to verify the correctness of network configurations before deployment. Computing the network control plane is a key technology for network configuration verification. We can verify the correctness of network configurations for fault tolerance by generating routing tables, as well as connectivity. However, existing routing table calculation tools have disadvantages such as lack of user-friendliness, limited expressiveness, and slower speed of routing table generatio
APA, Harvard, Vancouver, ISO, and other styles
36

Taha AL-Dhief, Fahad, Naseer Sabri, N. M. Abdul Latiff, et al. "Performance Comparison between TCP and UDP Protocols in Different Simulation Scenarios." International Journal of Engineering & Technology 7, no. 4.36 (2018): 172–76. http://dx.doi.org/10.14419/ijet.v7i4.36.23739.

Full text
Abstract:
User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) are a transportation layer routing protocols which are considered of the core protocols of the internet protocol suite. The behaviour of these routing protocols with different network metrics and scenarios is still not very clear. Therefore, this paper presents a comparison of the performance of both TCP and UDP to precisely determine which of these protocols is better. Network Simulator version 2.35 (NS2) is utilized to analyse and evaluate the performance for both TCP and UDP protocols varying in the packet size and the ban
APA, Harvard, Vancouver, ISO, and other styles
37

Toprak, Talip, Doğuş Bakici, Ayşenur Turgut Kaymakçi, and Ertuğrul Gelen. "Effects of Static and Dynamic Post-Activation Potentiation Protocols on Change of Direction Performance in Adolescent Soccer Players." Acta Facultatis Educationis Physicae Universitatis Comenianae 62, no. 2 (2022): 96–108. http://dx.doi.org/10.2478/afepuc-2022-0009.

Full text
Abstract:
Summary Purpose: The study aimed to investigate the temporal effects of static and dynamic post-activation potentiation (PAP) conditioning activities on agility performance. Material and Methods: Fourteen male adolescent soccer players participated in the study. Participants performed three different conditioning activities randomly on non-consecutive days. Conditioning activities consisted of static, dynamic, and control protocols. The dynamic protocol was performed with the dynamic squat at 85% of 1-repetition maximum while the static protocol was performed 3 repetitions x 3 seconds of the i
APA, Harvard, Vancouver, ISO, and other styles
38

Inchara G. P. "Energy-Efficient Clustering Routing Protocol using Quad-Tree Divide and Conquer with Dynamic Multihop LEACH for Enhanced IoT Network Lifetime (EECR-IoT)." Journal of Electrical Systems 20, no. 11s (2024): 1166–81. https://doi.org/10.52783/jes.7398.

Full text
Abstract:
Reducing energy consumption in IoT networks remains a critical challenge in energy-efficient clustering routing protocols (EECR-IoT). Several routing protocols have been developed to address power consumption, with cluster- based protocols emerging as particularly effective. In these protocols, cluster heads are selected to aggregate data from root nodes and transmit it to the base station, optimizing energy usage. Efficient selection of cluster heads is essential to prolong network lifetime. Our proposed protocol employs static clustering for optimal cluster head selection, ensuring effective
APA, Harvard, Vancouver, ISO, and other styles
39

Goyal, Dinesh, Anil Kumar, Yatin Gandhi, and Vinit Khetani. "Securing wireless sensor networks with novel hybrid lightweight cryptographic protocols." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 2-B (2024): 703–14. http://dx.doi.org/10.47974/jdmsc-1921.

Full text
Abstract:
WSN are essential in the Internet of Things (IoT) framework as they enable the gathering and transmission of data in different fields. The limited resources of sensor nodes in these networks require security protocols that are lightweight, striking a balance between data protection and efficiency. This research paper introduces a new hybrid cryptographic protocol called AES-128-CCM + Diffie-Hellman (ACDH), which aims to tackle the security issues encountered by WSN. Here present thorough assessment of the ACDH protocol, with a specific emphasis on critical factors including Security Strength,
APA, Harvard, Vancouver, ISO, and other styles
40

Bhat, Lateef Ahmad, Vishal Sudan, and Kirat Pal Singh. "Review: Interior Gateway Protocols." International Journal of Electronics & Communication Technology 4, no. 3 (2013): 75–78. https://doi.org/10.5281/zenodo.32398.

Full text
Abstract:
An Interior Gateway Protocol (IGP) is a routing protocol which is used to exchange routing information within routing domain or autonomous systems. This paper consists of different classification of Interior gateway routing protocols. This paper also includes the comparison between IGRP, EIGRP, OSPF, protocols.
APA, Harvard, Vancouver, ISO, and other styles
41

Midha, Surabhi, and Anand Nayyar. "A Survey of Wireless Sensor Network Routing Protocols based on SPIN." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 6 (2014): 4583–92. http://dx.doi.org/10.24297/ijct.v13i6.2521.

Full text
Abstract:
SPIN(Sensor Protocols for Information via Negotiation) comprises of a set of adaptive protocols that proficiently disseminate data in wireless sensor network(WSN).SPIN overcomes certain deficiencies associated with some of the data dissemination protocols & brings in more efficiency. WSNs have limited energy and hence efficiency of protocol has a significant impact on network‟s lifetime. Many protocols have been developed that are based on SPIN and are its modifications. This paper presents a survey on SPIN protocol and the various protocols devised which use SPIN as a base in one or ano
APA, Harvard, Vancouver, ISO, and other styles
42

Guillen-Alvarado, María Carolina, Juan Ignacio Herrera-Muñoz, Carlos Arroyo-Oquendo, Shirley Rojas-Salazar, and Roger Molina-Coto. "Evaluación de protocolos de sincronización para inseminación artificial con y sin estrógenos en novillas." Nutrición Animal Tropical 19, no. 1 (2025): 91–124. https://doi.org/10.15517/nat.v19i1.65028.

Full text
Abstract:
Reproduction is basic for any livestock production system, and reproductive biotechnologies help in farm management. The use of two synchronization protocols for timed artificial insemination (TAI) with (P4E2) and without (GnRH-PG) estradiol in heifers (30 Brahman and 30 Simbrah F1) was evaluated. Ultrasonography was performed on the protocol's application days and 7 days post-TAI to evaluate the ovarian response. Blood samples were collected from 24 heifers in the experiment to assess progesterone concentrations during and after the synchronization protocol for TAI. Pregnancy outcomes were de
APA, Harvard, Vancouver, ISO, and other styles
43

Díaz Gómez, María Angustias, and Elicio Díaz Gómez. "Reflexiones sobre el Real Decreto español 171/2007, de 9 de febrero, por el que se regula la publicidad de los protocolos familiares en las sociedades familiares." Pecvnia : Revista de la Facultad de Ciencias Económicas y Empresariales, Universidad de León, no. 12 (June 1, 2011): 91. http://dx.doi.org/10.18002/pec.v0i12.617.

Full text
Abstract:
El objeto de este trabajo es analizar el Protocolo Familiar, estudiando su concepto, naturaleza jurídica y eficacia, su contenido, publicidad y desarrollo. El protocolo familiar es un instrumento jurídico que pretende organizar la relación entre la familia y la empresa, separando ambas realidades y, especialmente, trata de planificar adecuadamente la sucesión de la empresa familiar. Se trata de reflexionar sobre el Real Decreto español 171/2007, de 9 de febrero, por el que se regula la publicidad de los protocolos familiares en las Sociedades Familiares.<br /><br /><br />The
APA, Harvard, Vancouver, ISO, and other styles
44

King, Annabelle, Mark Hancock, and Joanne Munn. "The Reliability of the Lateral Step Test." Journal of Sport Rehabilitation 16, no. 2 (2007): 131–42. http://dx.doi.org/10.1123/jsr.16.2.131.

Full text
Abstract:
Context:Functional strength measures correlate more closely with functional performance than non-functional strength measures.Objectives:To determine the reliability of the lateral step test as a measure of maximal strength.Design:Intertester repeated measures.Setting:Research laboratory.Participants:Twenty four healthy, pain free subjects.Intervention:Two protocols (A and B) were evaluated. The protocols were identical except protocol B involved a three second pause. Participants performed a one repetition maximum (1RM) for each protocol on two occasions separated by one week.Main Outcome Mea
APA, Harvard, Vancouver, ISO, and other styles
45

Lakum, Tarasvi, and Barige Thirumala Rao. "Mutual query data sharing protocol for public key encryption through chosen-ciphertext attack in cloud environment." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 1 (2022): 853. http://dx.doi.org/10.11591/ijece.v12i1.pp853-858.

Full text
Abstract:
<p><span>In this paper, we are proposing a mutual query data sharing protocol (MQDS) to overcome the encryption or decryption time limitations of exiting protocols like Boneh, rivest shamir adleman (RSA), Multi-bit transposed ring learning parity with noise (TRLPN), ring learning parity with noise (Ring-LPN) cryptosystem, key-Ordered decisional learning parity with noise (kO-DLPN), and KD_CS protocol’s. Titled scheme is to provide the security for the authenticated user data among the distributed physical users and devices. The proposed data sharing protocol is designed to resist t
APA, Harvard, Vancouver, ISO, and other styles
46

Harista, Dessy Rindiyanti, Akh Choirul Abdi, and Mohammad Shiddiq Suryadi. "RELATIONSHIP BETWEEN AGE AND COVID-19 HEALTH PROTOCOL COMPLIANCE IN SAMPANG COMMUNITY, INDONESIA." Proceeding of International Conference of Kerta Cendekia 2, no. 1 (2023): 199–202. http://dx.doi.org/10.36720/ickc.v2i1.521.

Full text
Abstract:
Background: In terms of enforcing discipline, the Covid-19 prevention protocol's implementation in Indonesia remains problematic. The government's task force develops health protocols for each activity that transmits covid-19 in order to break the chain and combat the disease.
 Objectives: The study's objective was to determine the relationship between age and compliance the health protocol of Covid-19 in Sampang, Indonesia, rural communities.
 Methods: This study used a cross-sectional design. This study used a simple random sampling technique. The number of samples in this study we
APA, Harvard, Vancouver, ISO, and other styles
47

Song, Jian, Guang-song Li, Bo-ru Xu, and Chuan-gui Ma. "A Novel Multiserver Authentication Protocol with Multifactors for Cloud Service." Security and Communication Networks 2018 (November 19, 2018): 1–13. http://dx.doi.org/10.1155/2018/5432960.

Full text
Abstract:
Secure and efficient authentication protocols are necessary for cloud service. Multifactor authentication protocols taking advantage of smart card, user’s password, and biometric, are more secure than password-based single-factor authentication protocols which are widely used in practice. However, most of the multiserver authentication protocols may have weak points, such as smart card loss attack, man-in-the-middle attack, anonymity, and high computation cost of authentication center. In order to overcome the above weaknesses, we propose a novel multiserver multifactor authentication protocol
APA, Harvard, Vancouver, ISO, and other styles
48

Smirnov, Volodymyr, and Nataliia Smirnova. "Easy Net Everywhere Wireless Network Transport Protocol Stack." Central Ukrainian Scientific Bulletin. Technical Sciences 2, no. 11(42) (2025): 204–13. https://doi.org/10.32515/2664-262x.2025.11(42).2.204-213.

Full text
Abstract:
A description of the developed Easy Net Everywhere wireless network transport protocol stack is presented. The structure of protocols that implement data delivery to the destination node is described. The application conditions of each protocol are described, depending on the network configuration. The protocol stack is divided into groups. The first group includes protocols for exchanging data between nodes in the same network with a unique or group password. The second group includes protocols for data exchange between nodes of different networks with a unique password. The third group inclu
APA, Harvard, Vancouver, ISO, and other styles
49

Li, Quanrun, Ching-Fang Hsu, Kim-Kwang Raymond Choo, and Debiao He. "A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks." Security and Communication Networks 2019 (December 4, 2019): 1–13. http://dx.doi.org/10.1155/2019/7871067.

Full text
Abstract:
As an important part of smart cities, vehicle ad hoc networks (VANETs) have attracted much attention from both industry and academia. In a VANET, generating a secure session key to facilitate subsequent data-in-transit transfer between two or more vehicles is crucial, which can be achieved by using an authenticated key agreement protocol. However, most of the existing identity-based two-party authenticated key agreement protocols have significant computational requirements or are known to be insecure. Thus, in this paper, a secure and efficient identity-based two-party authenticated key agreem
APA, Harvard, Vancouver, ISO, and other styles
50

Zafeiridis, Andreas, Stylianos Rizos, Haralampos Sarivasiliou, Anastassios Kazias, Konstantina Dipla, and Ioannis S. Vrabas. "The extent of aerobic system activation during continuous and interval exercise protocols in young adolescents and men." Applied Physiology, Nutrition, and Metabolism 36, no. 1 (2011): 128–36. http://dx.doi.org/10.1139/h10-096.

Full text
Abstract:
This study assessed the extent of aerobic system activation in young adolescents and men during heavy continuous (HC), short-interval (SI), and long-interval (LI) aerobic exercise protocols, and compared this response between the 2 age groups in the 3 protocols. Ten young adolescents (aged 13.2 ± 0.3 years) and 10 men (aged 21.0 ± 1.6 years) completed a maximal incremental test, an HC exercise protocol (83% of maximal aerobic velocity; MAV), an SI exercise protocol (30 s at 110% MAV with 30 s at 50%), and an LI exercise protocol (3 min at 95% MAV with 3 min at 35%). Oxygen consumption and hear
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!