Journal articles on the topic 'Protocols'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Protocols.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Shi, Lu-Feng, Karen A. Doherty, Tammy M. Kordas, and Joseph T. Pellegrino. "Short-Term and Long-Term Hearing Aid Benefit and User Satisfaction: A Comparison between Two Fitting Protocols." Journal of the American Academy of Audiology 18, no. 06 (2007): 482–95. http://dx.doi.org/10.3766/jaaa.18.6.3.
Full textBáez S., Paola, Isabel Ruiz S., Luis F. Restrepo, and Jhon D. Ruiz B. "Comparación de dos protocolos anestésicos para ovariohisterectomía en perras sanas." Revista Colombiana de Ciencias Pecuarias 20, no. 4 (2016): 6. http://dx.doi.org/10.17533/udea.rccp.324200.
Full textCameron, Thomas, Doson Chua, Stephen Shalansky, Edwin Tam, and Erica Wang. "Comparison of a Fully Weight-Based Protocol with a Non–Weight-Based Dosage Titration Protocol for IV Unfractionated Heparin: A Before-and-After Study." Canadian Journal of Hospital Pharmacy 76, no. 1 (2023): 23–28. http://dx.doi.org/10.4212/cjhp.3265.
Full textGuo, Hua, Chen Chen, Ya Gao, Xiong Li, and Jiongchao Jin. "A Secure Three-Factor Multiserver Authentication Protocol against the Honest-But-Curious Servers." Wireless Communications and Mobile Computing 2018 (September 13, 2018): 1–14. http://dx.doi.org/10.1155/2018/3284324.
Full textPeixoto, João Alvarez, André Borin Soares, and Vitor Macedo Ochôa. "Internet das Coisas Industrial: um ensaio de protocolos IoT para manufatura industrial." Revista Eletrônica Científica da UERGS 8, no. 3 (2022): 178–87. http://dx.doi.org/10.21674/2448-0479.83.178-187.
Full textLi, Jian, and Chong-Qiang Ye. "Multi-party semi-quantum secret sharing protocol based on measure-flip and reflect operations." Laser Physics Letters 21, no. 7 (2024): 075201. http://dx.doi.org/10.1088/1612-202x/ad4eb6.
Full textSabeeruddin, Shaik. "Comparative Analysis of Network Security Controls in the Modern Era." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 8, no. 6 (2022): 1–7. https://doi.org/10.5281/zenodo.14866540.
Full textReges Bessa, Carlos Deyvinson. "PERFORMANCE EVALUATION ANALYSIS OF WIRELESS SENSOR NETWORKS ROUTING PROTOCOLS IN SMART GRIDS." Revista Cientifica TECNIA 26, no. 1 (2016): 9. http://dx.doi.org/10.21754/tecnia-250215.02.
Full textReges Bessa, Carlos Deyvinson. "PERFORMANCE EVALUATION ANALYSIS OF WIRELESS SENSOR NETWORKS ROUTING PROTOCOLS IN SMART GRIDS." Revista Cientifica TECNIA 26, no. 1 (2016): 17. http://dx.doi.org/10.21754/tecnia-26012016.02.
Full textReges Bessa, Carlos Deyvinson, Rodrigo Soares Semente, Xiankleber Cavalcante Benjamim, et al. "PERFORMANCE EVALUATION ANALYSIS OF WIRELESS SENSOR NETWORKS ROUTING PROTOCOLS IN SMART GRIDS." Revista Cientifica TECNIA 26, no. 1 (2016): 17. http://dx.doi.org/10.21754/tecnia.v26i1.2.
Full textSaunders, Diana. "The Protocol of Protocols." Practice Nursing 9, no. 10 (1998): 3. http://dx.doi.org/10.12968/pnur.1998.9.10.3.
Full textBeattie, Randall C. "Distortion Product Otoacoustic Emissions: Comparison of Sequential versus Simultaneous Presentation of Primary-Tone Pairs." Journal of the American Academy of Audiology 14, no. 09 (2003): 471–84. http://dx.doi.org/10.1055/s-0040-1715939.
Full textSayat, Mikhael T., Oliver Thearle, Biveen Shajilal, et al. "Mapping Guaranteed Positive Secret Key Rates for Continuous Variable Quantum Key Distribution." Entropy 26, no. 10 (2024): 865. http://dx.doi.org/10.3390/e26100865.
Full textCorredor-Matus, José R., Carlos J. Sejín-Puche, and Mario A. González- G. "Evaluación de cinco protocolos de conservación de tejidos en chigüiro (Hydrochaeris Hydrochaeris) (Linnaeus, 1766)." Orinoquia 14, no. 2 sup (2010): 110–25. http://dx.doi.org/10.22579/20112629.98.
Full textKhan, Muhammad, Yasir Zaki, Shiva Iyer, et al. "The case for model-driven interpretability of delay-based congestion control protocols." ACM SIGCOMM Computer Communication Review 51, no. 1 (2021): 18–25. http://dx.doi.org/10.1145/3457175.3457179.
Full textDeepak Malik and Dr. Bijendra Singh. "Optimizing OSPF Cost Value for Best Path Selection Using Metric-Type Variation." International Research Journal on Advanced Engineering Hub (IRJAEH) 2, no. 06 (2024): 1845–54. http://dx.doi.org/10.47392/irjaeh.2024.0254.
Full textHU, YANJING, QINGQI PEI, and LIAOJUN PANG. "Instruction Clustering Analysis for Unknown Network Protocol's Abnormal Behavior." Journal of Interconnection Networks 15, no. 03n04 (2015): 1540002. http://dx.doi.org/10.1142/s0219265915400022.
Full textSun, Xin, Piotr Kulicki, and Mirek Sopek. "Multi-Party Quantum Byzantine Agreement without Entanglement." Entropy 22, no. 10 (2020): 1152. http://dx.doi.org/10.3390/e22101152.
Full textJouyandeh, Narjes, and bReza EbrahimiAtani. "A Review of Data Aggregation Protocols in VANET and providing proposed protocol." International Academic Journal of Science and Engineering 05, no. 01 (2018): 134–44. http://dx.doi.org/10.9756/iajse/v5i1/1810012.
Full textJIOM. "Protocols protocol and standard operating procedures." Journal of Institute of Medicine Nepal 32, no. 1 (2010): 1. http://dx.doi.org/10.59779/jiomnepal.480.
Full textLee, Young Moo, and Kyu Ho Park. "A protocol converter for nonblocking protocols." Integration 33, no. 1-2 (2002): 71–88. http://dx.doi.org/10.1016/s0167-9260(02)00049-4.
Full textRekha, H., and M. Siddappa. "Model Checking M2M and Centralised IOT authentication Protocols." Journal of Physics: Conference Series 2161, no. 1 (2022): 012042. http://dx.doi.org/10.1088/1742-6596/2161/1/012042.
Full textWang, Ying Lian, and Jun Yao Ye. "Research on Applied-Information Technology in Hierarchical Network Security Protocols Designing Based on Public Key." Advanced Materials Research 951 (May 2014): 169–72. http://dx.doi.org/10.4028/www.scientific.net/amr.951.169.
Full textKudin, Anton, and Polina Seliukh. "Asymmetric cryptographic protocols with a blockchain core: development problems and their solutions." Physico-mathematical modelling and informational technologies, no. 32 (July 8, 2021): 175–80. http://dx.doi.org/10.15407/fmmit2021.32.175.
Full textYousif, Samar T. "SIMULATION AND COMPARISON OF AD HOC NETWORKS ROUTING PROTOCOLS BASED ON OPNET." Iraqi Journal of Information and Communication Technology 5, no. 1 (2022): 42–49. http://dx.doi.org/10.31987/ijict.5.1.190.
Full textSun, Nigang, Junlong Li, Yining Liu, and Varsha Arya. "A Scalable Sharding Protocol Based on Cross-Shard Dynamic Transaction Confirmation for Alliance Chain in Intelligent Systems." International Journal on Semantic Web and Information Systems 19, no. 1 (2023): 1–30. http://dx.doi.org/10.4018/ijswis.333063.
Full textZhu, Xinghui, Ziheng Jiang, Qiyuan Zhang, Shuangrui Zhao, and Zhiwei Zhang. "An Unknown Protocol Identification Method for Industrial Internet." Wireless Communications and Mobile Computing 2022 (September 5, 2022): 1–14. http://dx.doi.org/10.1155/2022/3792205.
Full textSalkica, Nusret, Amela Begić, Adnan Beganović, et al. "Optimisation of the bone single photon emission computed tomography in oncology patients." Journal of Health Sciences 13, no. 3 (Suplement 1) (2024): 209–12. http://dx.doi.org/10.17532/jhs.2023.2596.
Full textAlfouzan, Faisal Abdulaziz. "Energy-Efficient Collision Avoidance MAC Protocols for Underwater Sensor Networks: Survey and Challenges." Journal of Marine Science and Engineering 9, no. 7 (2021): 741. http://dx.doi.org/10.3390/jmse9070741.
Full textSabor, Nabil, Shigenobu Sasaki, Mohammed Abo-Zahhad, and Sabah M. Ahmed. "A Comprehensive Survey on Hierarchical-Based Routing Protocols for Mobile Wireless Sensor Networks: Review, Taxonomy, and Future Directions." Wireless Communications and Mobile Computing 2017 (2017): 1–23. http://dx.doi.org/10.1155/2017/2818542.
Full textZhang, Bo, Wei-Xu Shi, Jian Wang, and Chao-Jing Tang. "Quantum direct communication protocol strengthening against Pavičić’s attack." International Journal of Quantum Information 13, no. 07 (2015): 1550052. http://dx.doi.org/10.1142/s0219749915500525.
Full textMarimpoong, Monalyn A., and Emma K. Sales. "Evaluation of USM Biotech DNA extraction method for selected agricultural crops in comparison with existing methods." Evaluation of USM Biotech DNA extraction method for selected agricultural crops in comparison with existing methods 1, no. 1 (2019): 31–38. https://doi.org/10.5281/zenodo.8245205.
Full textRong, Zhenbang, Daowen Qiu, and Xiangfu Zou. "Two single-state semi-quantum secure direct communication protocols based on single photons." International Journal of Modern Physics B 34, no. 11 (2020): 2050106. http://dx.doi.org/10.1142/s0217979220501064.
Full textCai, Jianfei, Guozheng Yang, Jingju Liu, and Yi Xie. "FastCAT: A framework for fast routing table calculation incorporating multiple protocols." Mathematical Biosciences and Engineering 20, no. 9 (2023): 16528–50. http://dx.doi.org/10.3934/mbe.2023737.
Full textTaha AL-Dhief, Fahad, Naseer Sabri, N. M. Abdul Latiff, et al. "Performance Comparison between TCP and UDP Protocols in Different Simulation Scenarios." International Journal of Engineering & Technology 7, no. 4.36 (2018): 172–76. http://dx.doi.org/10.14419/ijet.v7i4.36.23739.
Full textToprak, Talip, Doğuş Bakici, Ayşenur Turgut Kaymakçi, and Ertuğrul Gelen. "Effects of Static and Dynamic Post-Activation Potentiation Protocols on Change of Direction Performance in Adolescent Soccer Players." Acta Facultatis Educationis Physicae Universitatis Comenianae 62, no. 2 (2022): 96–108. http://dx.doi.org/10.2478/afepuc-2022-0009.
Full textInchara G. P. "Energy-Efficient Clustering Routing Protocol using Quad-Tree Divide and Conquer with Dynamic Multihop LEACH for Enhanced IoT Network Lifetime (EECR-IoT)." Journal of Electrical Systems 20, no. 11s (2024): 1166–81. https://doi.org/10.52783/jes.7398.
Full textGoyal, Dinesh, Anil Kumar, Yatin Gandhi, and Vinit Khetani. "Securing wireless sensor networks with novel hybrid lightweight cryptographic protocols." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 2-B (2024): 703–14. http://dx.doi.org/10.47974/jdmsc-1921.
Full textBhat, Lateef Ahmad, Vishal Sudan, and Kirat Pal Singh. "Review: Interior Gateway Protocols." International Journal of Electronics & Communication Technology 4, no. 3 (2013): 75–78. https://doi.org/10.5281/zenodo.32398.
Full textMidha, Surabhi, and Anand Nayyar. "A Survey of Wireless Sensor Network Routing Protocols based on SPIN." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 6 (2014): 4583–92. http://dx.doi.org/10.24297/ijct.v13i6.2521.
Full textDíaz Gómez, María Angustias, and Elicio Díaz Gómez. "Reflexiones sobre el Real Decreto español 171/2007, de 9 de febrero, por el que se regula la publicidad de los protocolos familiares en las sociedades familiares." Pecvnia : Revista de la Facultad de Ciencias Económicas y Empresariales, Universidad de León, no. 12 (June 1, 2011): 91. http://dx.doi.org/10.18002/pec.v0i12.617.
Full textKing, Annabelle, Mark Hancock, and Joanne Munn. "The Reliability of the Lateral Step Test." Journal of Sport Rehabilitation 16, no. 2 (2007): 131–42. http://dx.doi.org/10.1123/jsr.16.2.131.
Full textLakum, Tarasvi, and Barige Thirumala Rao. "Mutual query data sharing protocol for public key encryption through chosen-ciphertext attack in cloud environment." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 1 (2022): 853. http://dx.doi.org/10.11591/ijece.v12i1.pp853-858.
Full textHarista, Dessy Rindiyanti, Akh Choirul Abdi, and Mohammad Shiddiq Suryadi. "RELATIONSHIP BETWEEN AGE AND COVID-19 HEALTH PROTOCOL COMPLIANCE IN SAMPANG COMMUNITY, INDONESIA." Proceeding of International Conference of Kerta Cendekia 2, no. 1 (2023): 199–202. http://dx.doi.org/10.36720/ickc.v2i1.521.
Full textSong, Jian, Guang-song Li, Bo-ru Xu, and Chuan-gui Ma. "A Novel Multiserver Authentication Protocol with Multifactors for Cloud Service." Security and Communication Networks 2018 (November 19, 2018): 1–13. http://dx.doi.org/10.1155/2018/5432960.
Full textLi, Quanrun, Ching-Fang Hsu, Kim-Kwang Raymond Choo, and Debiao He. "A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks." Security and Communication Networks 2019 (December 4, 2019): 1–13. http://dx.doi.org/10.1155/2019/7871067.
Full textZafeiridis, Andreas, Stylianos Rizos, Haralampos Sarivasiliou, Anastassios Kazias, Konstantina Dipla, and Ioannis S. Vrabas. "The extent of aerobic system activation during continuous and interval exercise protocols in young adolescents and men." Applied Physiology, Nutrition, and Metabolism 36, no. 1 (2011): 128–36. http://dx.doi.org/10.1139/h10-096.
Full textGerard, Ian J., Jeffery A. Hall, Kelvin Mok, and D. Louis Collins. "New Protocol for Skin Landmark Registration in Image-Guided Neurosurgery: Technical Note." Operative Neurosurgery 11, no. 3 (2015): 376–81. http://dx.doi.org/10.1227/neu.0000000000000868.
Full textGong, Wenjie, Lei Wang, Sophia Stock, et al. "Evaluation of Production Protocols for the Generation of NY-ESO-1-Specific T Cells." Cells 10, no. 1 (2021): 152. http://dx.doi.org/10.3390/cells10010152.
Full textHuang, Chung-Ming, and Shiun-Wei Lee. "Timed protocol verification for Estelle-specified protocols." ACM SIGCOMM Computer Communication Review 25, no. 3 (1995): 4–32. http://dx.doi.org/10.1145/214299.214300.
Full text