Academic literature on the topic 'RRC messages'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'RRC messages.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "RRC messages"

1

Park, Byungwoon, Jeonghan Kim, Changdon Kee, et al. "RRC unnecessary for DGPS messages." IEEE Transactions on Aerospace and Electronic Systems 42, no. 3 (2006): 1149–60. http://dx.doi.org/10.1109/taes.2006.248220.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pei, Lulu X., Tebogo T. Leepile, Kelsey M. Cochrane, et al. "Can Automated Hematology Analyzers Predict the Presence of a Genetic Hemoglobinopathy? An Analysis of Hematological Biomarkers in Cambodian Women." Diagnostics 11, no. 2 (2021): 228. http://dx.doi.org/10.3390/diagnostics11020228.

Full text
Abstract:
Genetic hemoglobinopathies are the most common single-gene disorder worldwide. Some automated hematology analyzers have the capability of flagging individuals who may have hematological disorders based on complete blood count (CBC) biomarkers. We aimed to evaluate the accuracy of a hematology analyzer in identifying genetic hemoglobinopathies in Cambodian women and to determine which hematological biomarkers are the best predictors. A CBC was completed using a Sysmex XN-1000 analyzer and hemoglobinopathies were determined with capillary hemoglobin electrophoresis for 808 nonpregnant Cambodian
APA, Harvard, Vancouver, ISO, and other styles
3

Farooq, Shaik Mullapathi, S. M. Suhail Hussain, and Taha Selim Ustun. "S-GoSV: Framework for Generating Secure IEC 61850 GOOSE and Sample Value Messages." Energies 12, no. 13 (2019): 2536. http://dx.doi.org/10.3390/en12132536.

Full text
Abstract:
Standardized communication plays an important role in substation automation system (SAS). IEC 61850 is a de-facto standard in SAS. It facilitates smooth communication between different devices located in the substation by achieving interoperability. Generic Object-Oriented Substation Event (GOOSE) and Sample Value (SV) messages developed according to IEC 61850 enable efficient monitoring and operation control of SAS. IEC 61850 is very popular due to its flexible and robust modeling. As the number of critical infrastructures that employed IEC 61850 increases, it is important to study cybersecur
APA, Harvard, Vancouver, ISO, and other styles
4

Boutinot, Nelly. "Un message de la ligue ROC." Les Cahiers de l'INSEP 37, no. 1 (2006): 55–57. http://dx.doi.org/10.3406/insep.2006.1917.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Fa Tang, and Na Na Han. "Analysis and Testing on Terminal RRC Connection Establishment Procedure in TD-LTE System Based on TTCN-3." Applied Mechanics and Materials 543-547 (March 2014): 2893–96. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.2893.

Full text
Abstract:
This paper focuses on the terminal RRC connection establishment procedure, designs its message sequence chart (MSC), then write abstract test suits in TTCN-3 core language on TTworkbench test platform, generate GFT figure and compare it with the protocol specification, and complete conformance testing of RRC connection establishment procedure. At present, this scheme has been effectively verified in the project of TD-LTE TTCN extended test suite instrument development.
APA, Harvard, Vancouver, ISO, and other styles
6

Faro, Jamie M., Catherine S. Nagawa, Jeroan A. Allison, et al. "Comparison of a Collective Intelligence Tailored Messaging System on Smoking Cessation Between African American and White People Who Smoke: Quasi-Experimental Design." JMIR mHealth and uHealth 8, no. 4 (2020): e18064. http://dx.doi.org/10.2196/18064.

Full text
Abstract:
Background The Patient Experience Recommender System for Persuasive Communication Tailoring (PERSPeCT) is a machine learning recommender system with a database of messages to motivate smoking cessation. PERSPeCT uses the collective intelligence of users (ie, preferences and feedback) and demographic and smoking profiles to select motivating messages. PERSPeCT may be more beneficial for tailoring content to minority groups influenced by complex, personally relevant factors. Objective The objective of this study was to describe and evaluate the use of PERSPeCT in African American people who smok
APA, Harvard, Vancouver, ISO, and other styles
7

Baothman, Fatmah Abdulrahman, and Budoor Salem Edhah. "Toward agent-based LSB image steganography system." Journal of Intelligent Systems 30, no. 1 (2021): 903–19. http://dx.doi.org/10.1515/jisys-2021-0044.

Full text
Abstract:
Abstract In a digital communication environment, information security is mandatory. Three essential parameters used in the design process of a steganography algorithm are Payload, security, and fidelity. However, several methods are implemented in information hiding, such as Least Significant Bit (LBS), Discrete Wavelet Transform, Masking, and Discrete Cosine Transform. The paper aims to investigate novel steganography techniques based on agent technology. It proposes a Framework of Steganography based on agent for secret communication using LSB. The most common image steganography databases a
APA, Harvard, Vancouver, ISO, and other styles
8

Free, Caroline, Ona L. McCarthy, Melissa J. Palmer, et al. "Safetxt: a safer sex intervention delivered by mobile phone messaging on sexually transmitted infections (STI) among young people in the UK - protocol for a randomised controlled trial." BMJ Open 10, no. 3 (2020): e031635. http://dx.doi.org/10.1136/bmjopen-2019-031635.

Full text
Abstract:
IntroductionYoung people aged 16 to 24 have the highest prevalence of genital chlamydia and gonorrhoea compared with other age groups and re-infection rates following treatment are high. Long-term adverse health effects include subfertility and ectopic pregnancy, particularly among those with repeated infections. We developed the safetxt intervention delivered by text message to reduce sexually transmitted infection (STI) by increasing partner notification, condom use and (STI) testing among young people in the UK.Methods and analysisA single-blind randomised trial to reliably establish the ef
APA, Harvard, Vancouver, ISO, and other styles
9

Bermon, Anderson, Ana Fernanda Uribe, Paula Fernanda Pérez-Rivero, et al. "Efficacy and Safety of Text Messages Targeting Adherence to Cardiovascular Medications in Secondary Prevention: TXT2HEART Colombia Randomized Controlled Trial." JMIR mHealth and uHealth 9, no. 7 (2021): e25548. http://dx.doi.org/10.2196/25548.

Full text
Abstract:
Background Atherosclerotic cardiovascular disease (ASCVD) is the leading cause of mortality worldwide, with a prevalence of approximately 100 million patients. There is evidence that antiplatelet agents and antihypertensive medications could reduce the risk of new vascular events in this population; however, treatment adherence is very low. An SMS text messaging intervention was recently developed based on behavior change techniques to increase adherence to pharmacological treatment among patients with a history of ASCVD. Objective This study aims to evaluate the efficacy and safety of an SMS
APA, Harvard, Vancouver, ISO, and other styles
10

Kemp, P. S. "Meta-analyses, Metrics and Motivation: Mixed Messages in the Fish Passage Debate." River Research and Applications 32, no. 10 (2016): 2116–24. http://dx.doi.org/10.1002/rra.3082.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "RRC messages"

1

Kříž, Jakub. "Získávání servisních informací ze současných terminálů mobilních sítí GSM a UMTS, postupy servisu mobilních terminálů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217449.

Full text
Abstract:
This thesis concentrates on the UMTS cellular network and the possibilities of its monitoring. There are several methods of monitoring the UMTS. The technique used in this project is based on monitoring through a cellular terminal. The theoretical part is devoted to the description of the UMTS system and the WCDMA technique. The practical part then deals with the method of UMTS monitoring through a cellular terminal and describes in detail individual screens of the FTD (Field Test Display) program, the Netmonitor functions and their parameters. The next part of this thesis analyses the RRC mes
APA, Harvard, Vancouver, ISO, and other styles
2

Potnuru, Srinath. "Fuzzing Radio Resource Control messages in 5G and LTE systems : To test telecommunication systems with ASN.1 grammar rules based adaptive fuzzer." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-294140.

Full text
Abstract:
5G telecommunication systems must be ultra-reliable to meet the needs of the next evolution in communication. The systems deployed must be thoroughly tested and must conform to their standards. Software and network protocols are commonly tested with techniques like fuzzing, penetration testing, code review, conformance testing. With fuzzing, testers can send crafted inputs to monitor the System Under Test (SUT) for a response. 3GPP, the standardization body for the telecom system, produces new versions of specifications as part of continuously evolving features and enhancements. This leads to
APA, Harvard, Vancouver, ISO, and other styles
3

Bosilca, George. "Contribution à l'étude des environnements d'exécution parallèle fortement dynamiques à passage de messages." Paris 11, 2004. http://www.theses.fr/2004PA112316.

Full text
Abstract:
Le calcul haute performance sur des architectures parallèles utilise différentes approches en fonction du modèle de mémoire de l'architecture, du niveau d'abstraction du langage de programmation et de la nature de l'application. La première partie de cette thèse est consacrée à la présentation d'un modèle d'exécution original basé sur l'appel de procédure à distance ou RPC (Remote Procedure Call), appelé Out-of-order execution parallel Virtual Machine (OVM). Le substrat a été construit suivant trois directions : portabilité via un modèle unique de mémoire, équilibrage de charge en utilisant un
APA, Harvard, Vancouver, ISO, and other styles
4

Rossi, Ferdinand. "Phosphorylation et activité des facteurs d'épissage à domaines RRM et RS : Mise en évidence de l'activité kinase de la DNA topoisomérase I." Montpellier 2, 1996. http://www.theses.fr/1996MON20210.

Full text
Abstract:
La selection des sites 5' et 3' est une etape decisive dans l'epissage des arn pre-messagers. Bon nombre de facteurs impliques dans cette selection sont des proteines constituees d'un domaine de liaison a l'arn (domaine rrm) et d'un domaine riche en residu arginine et serine (domaine rs). Ce sont des proteines phosphorylees sur les residus serine. Apres avoir note qu'au moins un de ces facteurs subit un cycle de phosphorylation-dephosphorylation au cours de l'assemblage du spliceosome et de l'epissage, nous avons etudie le role de certains d'entre eux et des proteines de la snrnp u1 dans la se
APA, Harvard, Vancouver, ISO, and other styles
5

Gallouzi, Imed Eddine. "Etude fonctionnelle de deux protéines à domaine RRM : G3BP une RNase interagissant avec RasGAP et RSF1, un répresseur de l'épissage." Montpellier 2, 1998. http://www.theses.fr/1998MON20068.

Full text
Abstract:
Les voies de transduction du signal mettent en jeu l'action coordonnees de plusieurs proteines caracterisees par la presence de domaines sh2 et sh3 (src homology domains), lesquels donnent lieu a des interactions proteine-proteine avec leurs effecteurs. L'une de ces proteines est g3bp, une proteine possedant les motifs rnp1 et rnp2 caracteristiques des proteines reconnaissant l'arn, qui interagit specifiquement avec le domaine sh3 de gap. Nos travaux montrent que g3bp est une endonuclease dont l'activite est regulee par les signaux membranaires. G3bp est exclusivement phosphorylee sur des resi
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "RRC messages"

1

Scholle, Carol Curio. Rapid Response Team Organization and Activation (DRAFT). Edited by Raghavan Murugan and Joseph M. Darby. Oxford University Press, 2018. http://dx.doi.org/10.1093/med/9780190612474.003.0002.

Full text
Abstract:
The Rapid Response System (RRS) is organized into four basic components. These components include an activation limb, a response limb, a quality assurance infrastructure, and an administrative component. These components remain consistent despite campus size, physical layout, patient population, available technical resources, and personnel. Oversight of the RRS is provided by the patient safety, risk management experts, as well as clinical experts to maintain high quality of care delivered to acutely ill patients. Administrative support in the development of policy, allocation of resources, an
APA, Harvard, Vancouver, ISO, and other styles
2

Le Congo nous appartient: L'église dans la transition : messages et textes de l'Episcopat de la RDC, juillet 2004-mars 2005. Bureau diocésain de catéchèse, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "RRC messages"

1

Wei, Yi-hsiu, and Chuan-lin Wu. "Integrating RPC and message passing for distributed programming." In DCE — The OSF Distributed Computing Environment Client/Server Model and Beyond. Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/3-540-57306-2_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Krantz, A. T., and V. S. Sunderam. "Client server computing on message passing systems: Experiences with PVM-RPC." In Euro-Par'97 Parallel Processing. Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0002723.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Akram, Asif, and David Meredith. "Approaches and Best Practices in Web Service Style, XML Data Binding and Validation – Implications to Securing Web Services." In Securing Web Services. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-639-6.ch013.

Full text
Abstract:
This chapter shows how the WSDL interface style (RPC / Document), strength of data typing and approach to data binding and validation have important implications on application security (and interoperability). This is because some (common) bad-practices and poor implementation choices can render a service vulnerable to the consequences of propagating loosely bound or poorly constrained data. The chosen Web service style and strength of data typing dictate how SOAP messages are constructed and serialized, and to what extent SOAP messages can be constrained and secured during validation. The chosen approach to binding and validation dictates how and where the SOAP-body and SOAP-header (which includes the security constructs) are handled in the application, and also determines the reliability of message parsing. The authors show how these Web service styles and implementation choices must be carefully considered and applied correctly by providing implementation examples and best practice recommendations.
APA, Harvard, Vancouver, ISO, and other styles
4

Santiago, Nestor Eduardo Araruna, and Ana Monica Anselmo Amorim. "Protection of the Communication and Digital Security of Mobile Phones as a Fundamental Right to Privacy." In Advances in Electronic Government, Digital Divide, and Regional Development. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8350-9.ch011.

Full text
Abstract:
The central idea of this chapter is to discuss the notion of privacy arising from the use and exchange of messages through the use of mobile phones and whether police officers in charge of patrolling and public security may have access to the messages contained therein without proper judicial authorization. The authors focused on the position of the Brazilian Superior Court of Justice (STJ) on the subject, based on the decision rendered in the Appeal in Habeas Corpus (RHC) n. 51.531/RO. At this trial, protection was given to the new forms of communication and data contained in mobile phones under the constitutional terms of protection of privacy and non-unlawful obtaining of evidence, so that it will be necessary to issue a court order to get any informational elements found in messaging applications installed on a smartphone.
APA, Harvard, Vancouver, ISO, and other styles
5

Santiago, Nestor Eduardo Araruna, and Ana Monica Anselmo Amorim. "Protection of the Communication and Digital Security of Mobile Phones as a Fundamental Right to Privacy." In Research Anthology on Securing Mobile Technologies and Applications. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8545-0.ch020.

Full text
Abstract:
The central idea of this chapter is to discuss the notion of privacy arising from the use and exchange of messages through the use of mobile phones and whether police officers in charge of patrolling and public security may have access to the messages contained therein without proper judicial authorization. The authors focused on the position of the Brazilian Superior Court of Justice (STJ) on the subject, based on the decision rendered in the Appeal in Habeas Corpus (RHC) n. 51.531/RO. At this trial, protection was given to the new forms of communication and data contained in mobile phones under the constitutional terms of protection of privacy and non-unlawful obtaining of evidence, so that it will be necessary to issue a court order to get any informational elements found in messaging applications installed on a smartphone.
APA, Harvard, Vancouver, ISO, and other styles
6

Jeckle, Mario, and Ingo Melzer. "Seamlessly Securing Web Services by a Signing Proxy." In Information Security and Ethics. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch141.

Full text
Abstract:
Web services offer a way for very different systems to collaborate independent of the programming language used or the involved operating systems. Their basis is the XML-based SOAP protocol, which can be used over any protocol that is able to transport a byte stream. Due to the fact that Web services do not depend on any operating system and there is no burden of a underlying paradigm, they are ideal for the integration of even completely inhomogeneous systems. However, SOAP does not (and does not have to) deal with security issues, which is nevertheless important for the involved systems. This article describes an add-on for existing Internet proxies to achieve user and developer transparent security features for Web services. This approach allows corporate firewalls to handle authentication. A first step is to add corporate signatures to all outgoing SOAP messages to enable a corporate trust relationship. A second improvement is to use proxy authentication as defined in RFC 2616 and RFC 2617 to add personal signatures assuming that the proxy has access to some key management system.
APA, Harvard, Vancouver, ISO, and other styles
7

Karoui, Kamel. "Interaction between Mobile Agents and Web Services." In Encyclopedia of Multimedia Technology and Networking, Second Edition. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch097.

Full text
Abstract:
With the interconnection of computers in networks, particularly through the Internet, it becomes possible to connect applications on distant computers. An application works perfectly whether it isdistant or local. Moreover, a distant applicationallows us to benefit from the following additional advantages: • Data and processes can be stored on a remote server that has a bigger storage capacity than the local host. Data can be shared between users using, for example, Remote Procedure Call (RPC), Remote Method Invocation (RMI), Java Message Service (JMS), and Enterprise JavaBeans (EJB) (Frénot, 2000): • Distant application can be used at the same time by several users; • Updating data and processes can be done only in one host; • Flexibility on distribution of the load: An application can be executed on the available machine; and • High availability: A faulty machine does not affect the others. Many approaches have been proposed and developed for communication between distant hosts on a network such as Message Passing (MP), Remote Evaluation (REV), Remote Object Invocation (ROI), Mobile Agents (MA), Common Object Request Broker Architecture (CORBA), Web Services (WS), RPC, and RMI (Dejan, LaForge, & Chauhan, 1998). In this article, we will focus on two particular paradigms: The Web Services and the Mobile Agents. WS defines a standard to invoke distant applications and to recover results across the Web. Its invocation is made in synchronous mode. MA has the faculty to move easily between a network’s hosts to execute user requests. MA communication is made in asynchronous mode. The fusion of these two complementary technologies will solve many problems. This article is composed of the following sections: In the first two sections, we introduce the concepts of WS and MA, their advantages and disadvantages. In the third section, we present different kinds of interaction between MA and WS. Finally, we study an example in the last section.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "RRC messages"

1

Wang Zhi and Luo Siqi. "Improved scheme of RRC message transmission in LTE system." In 2010 International Conference on Educational and Information Technology (ICEIT). IEEE, 2010. http://dx.doi.org/10.1109/iceit.2010.5608357.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Biery, Kurt, Glenn Cooper, Stephen Foulkes, Gerald Guglielmo, Luciano Piccoli, and Margaret Votava. "A System for Exchanging Control and Status Messages in the NOvA Data Acquisition." In 2007 15th IEEE-NPSS Real-Time Conference. IEEE, 2007. http://dx.doi.org/10.1109/rtc.2007.4382799.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

de la Pena, A., L. Pacios, F. Lapayese, and R. Carrasco. "New middleware software for message distribution in the TJ-II control environment." In 2010 17th Real-Time Conference - IEEE-NPSS Technical Committee on Computer Applications in Nuclear and Plasma Sciences (RT 2010). IEEE, 2010. http://dx.doi.org/10.1109/rtc.2010.5750465.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Qiyang, James Yao, and Rubin Xing. "Middleware Components for E-commerce Infrastructure: An Analytical Review." In InSITE 2006: Informing Science + IT Education Conference. Informing Science Institute, 2006. http://dx.doi.org/10.28945/2951.

Full text
Abstract:
Embracing inapt infrastructure technology is a major threat in developing extensive and efficient Web-based systems. The architectural strength of all business models demands an effective integration of various technological components. And middleware, the center of all applications, becomes the driver—everything works if middleware does. In the recent times, the client/server environment has experienced sweeping transformation and led to the notion of the “Object Web”. Web browser is viewed as a universal client that is capable of shifting flawlessly and effortlessly between various applicati
APA, Harvard, Vancouver, ISO, and other styles
5

Kazarov, Andrei, Mihai Caprini, Serguei Kolos, Giovanna Lehmann Miotto, and Igor Soloviev. "A scalable and reliable message transport service for the ATLAS Trigger and Data Acquisition system." In 2014 IEEE-NPSS Real Time Conference (RT). IEEE, 2014. http://dx.doi.org/10.1109/rtc.2014.7097447.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Barroso, V. Chibante, U. Fuchs, and A. Wegrzynek. "Benchmarking message queue libraries and network technologies to transport large data volume in the ALICE O system." In 2016 IEEE-NPSS Real Time Conference (RT). IEEE, 2016. http://dx.doi.org/10.1109/rtc.2016.7543162.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Iskhakova, Anastasia, and Roman Meshcheryakov. "Automatic search of the malicious messages in the internet of things systems on the example of an intelligent detection of the unnatural agents requests." In 2017 Second Russia and Pacific Conference on Computer Technology and Applications (RPC). IEEE, 2017. http://dx.doi.org/10.1109/rpc.2017.8168074.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "RRC messages"

1

Alvestrand, H., S. Kille, R. Miles, M. Rose, and S. Thompson. Mapping between X.400 and RFC-822 Message Bodies. RFC Editor, 1993. http://dx.doi.org/10.17487/rfc1495.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Alvestrand, H. Mapping between X.400 and RFC-822/MIME Message Bodies. RFC Editor, 1998. http://dx.doi.org/10.17487/rfc2157.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Alvestrand, H., and S. Thompson. Equivalences between 1988 X.400 and RFC-822 Message Bodies. RFC Editor, 1993. http://dx.doi.org/10.17487/rfc1494.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Clausen, T., C. Dearlove, U. Herberg, and H. Rogge. Rules for Designing Protocols Using the Generalized Packet/Message Format from RFC 5444. RFC Editor, 2017. http://dx.doi.org/10.17487/rfc8245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!