Segui questo link per vedere altri tipi di pubblicazioni sul tema: Design of protocols.

Articoli di riviste sul tema "Design of protocols"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Design of protocols".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.

1

Yao, Wenbing, Sheng-Uei Guan, Zhiqiang Jiang, and Ilias Kiourktsidis. "Self-Evolvable Protocol Design Using Genetic Algorithms." International Journal of Applied Evolutionary Computation 1, no. 1 (2010): 36–56. http://dx.doi.org/10.4018/jaec.2010010103.

Testo completo
Abstract (sommario):
Self-modifying protocols (SMP) are protocols that can be modified at run time by the computers using them. Such protocols can be modified at run time so that they can adapt to the changing communicating environment and user requirements on the fly. Evolvable protocols are SMP designed using Genetic Algorithms (GA). The purpose of this paper is to apply Genetic Algorithms (GA) to design an evolvable protocol in order to equip communication peers with more autonomy and intelligence. The next-generation Internet will benefit from the concept of evolvable protocols. In this paper, we design a Self
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Yu, Song Sen, Yun Peng, and Jia Jing Zhang. "A Lightweight RFID Mechanism Design." Advanced Materials Research 216 (March 2011): 120–23. http://dx.doi.org/10.4028/www.scientific.net/amr.216.120.

Testo completo
Abstract (sommario):
Based on the study of existing RFID security protocols and RFID anti-collision algorithms, this paper proposes a processing mechanism integrating lightweight random key double-authentication and dynamic slot-ALOHA protocol. The mechanism is simple, practical, and compatible with EPC Gen2 standards. Research shows that comparing with the other security protocols and anti-collision protocols, the new mechanism has a little complexity and tag-cost.
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Song, Jiali, Zhiwei Rong, Xinwen Zhong, et al. "Practice and Consideration of Master Protocol in Clinical Trials." Tumor Discovery 2, no. 2 (2023): 342. http://dx.doi.org/10.36922/td.342.

Testo completo
Abstract (sommario):
There is great interest in accelerating late-stage therapy development by efficiently performing a trial design with multiple therapies or multiple subpopulations simultaneously under a single protocol. The master protocols are termed to describe the design of such trials, with a variety of terms such as umbrella, basket, or platform describing specific designs, which are, in contrast to the traditional trial designs, full of complexity. What should we consider in designing a trial ensuring the safety of human subjects and demonstrating the efficacy of new therapy? This paper overviews the mas
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Turilli, Matteo. "Ethical protocols design." Ethics and Information Technology 9, no. 1 (2007): 49–62. http://dx.doi.org/10.1007/s10676-006-9128-9.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Nguyen, Philon, Thanh An Nguyen, and Yong Zeng. "Segmentation of design protocol using EEG." Artificial Intelligence for Engineering Design, Analysis and Manufacturing 33, no. 1 (2018): 11–23. http://dx.doi.org/10.1017/s0890060417000622.

Testo completo
Abstract (sommario):
AbstractDesign protocol data analysis methods form a well-known set of techniques used by design researchers to further understand the conceptual design process. Verbal protocols are a popular technique used to analyze design activities. However, verbal protocols are known to have some limitations. A recurring problem in design protocol analysis is to segment and code protocol data into logical and semantic units. This is usually a manual step and little work has been done on fully automated segmentation techniques. Physiological signals such as electroencephalograms (EEG) can provide assistan
Gli stili APA, Harvard, Vancouver, ISO e altri
6

He, Jiayue, Jennifer Rexford, and Mung Chiang. "Don't optimize existing protocols, design optimizable protocols." ACM SIGCOMM Computer Communication Review 37, no. 3 (2007): 53–58. http://dx.doi.org/10.1145/1273445.1273452.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

N, Hemanthraju. "A Review on Design Implementation and Verification of AMBA AXI- 4 lite Protocol for SoC Integration." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 2321–26. http://dx.doi.org/10.22214/ijraset.2022.44313.

Testo completo
Abstract (sommario):
Abstract: The present modern bus protocols used for communication between different functional blocks on a System-on-Chip (Soc) designs face many different challenges among which complexity and communication management are the most important factors. These on-chip communications directly impact performance and functionality, hence depending on the application where the bus protocol is to be used, a perfect communication protocol is chosen. AMBA (Advanced Microcontroller Bus Architecture) provides various types of protocols to be used as IP, of which AXI4 (Advance Extensible Interface), is one
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Alfouzan, Faisal Abdulaziz. "Energy-Efficient Collision Avoidance MAC Protocols for Underwater Sensor Networks: Survey and Challenges." Journal of Marine Science and Engineering 9, no. 7 (2021): 741. http://dx.doi.org/10.3390/jmse9070741.

Testo completo
Abstract (sommario):
The Medium Access Control (MAC) layer protocol is the most important part of any network, and is considered to be a fundamental protocol that aids in enhancing the performance of networks and communications. However, the MAC protocol’s design for underwater sensor networks (UWSNs) has introduced various challenges. This is due to long underwater acoustic propagation delay, high mobility, low available bandwidth, and high error probability. These unique acoustic channel characteristics make contention-based MAC protocols significantly more expensive than other protocol contentions. Therefore, r
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Sari, Riri Fitri, Lukman Rosyidi, Bambang Susilo, and Muhamad Asvial. "A Comprehensive Review on Network Protocol Design for Autonomic Internet of Things." Information 12, no. 8 (2021): 292. http://dx.doi.org/10.3390/info12080292.

Testo completo
Abstract (sommario):
The autonomic Internet of Things is the creation of self-management capability in the Internet of Things system by embedding some autonomic properties, with the goal of freeing humans from all detail of the operation and management of the system. At same time, this provides a system to always operate on the best performance. This paper presents a review of the recent studies related to the design of network communication protocol, which can support autonomic Internet of Things. Many of the studies come from the research and development in Wireless Sensor Network protocols, as it becomes one of
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Hayam A. Al-Yasiri and Nyan D. Sallman. "Design and Implementation of Mobile Computing Simulator." Diyala Journal of Engineering Sciences 7, no. 4 (2014): 1–23. http://dx.doi.org/10.24237/djes.2014.07401.

Testo completo
Abstract (sommario):
The Rapid progress in communications and wireless technology, especially in mobile computing, resulted in wide area of development in design, control and simulation of protocols that manage the wireless network. In this paper, a software simulator package has been designed, implemented and analyzed to simulate Internet Mobile Host Protocol (IMHP), Multicast Routing Protocol (MRP) and Handoff operation, which feature both route optimization and integrated authentication of all management packets.The simulator coverage area includes three extendable subnets (LANs) with ten mobile hosts moving ei
Gli stili APA, Harvard, Vancouver, ISO e altri
11

Fathima, S., P.N. Kathiravan, and S. Sharmila. "Design of Protocol in Underwater Wireless Sensor Networks." COMPUSOFT: An International Journal of Advanced Computer Technology 04, no. 07 (2015): 1895–98. https://doi.org/10.5281/zenodo.14786446.

Testo completo
Abstract (sommario):
In this work we designed a routing protocol to overcome upcoming challenges in under water wireless sensor networks. The routing protocol designed for specific roles leads to issues in the network. The major issues for development of routing protocol for underwater sensor network are harsh deployment environment, low bandwidth, high propagation delay, low bandwidth, requires high bandwidth energy, temporary losses, fouling and corrosion and high bit error rates. In this project the certain issues to be rectified are low bandwidth, energy efficiency and data delivery. The limitations existing r
Gli stili APA, Harvard, Vancouver, ISO e altri
12

Wytrębowicz, Jacek, Krzysztof Cabaj, and Jerzy Krawiec. "Messaging Protocols for IoT Systems—A Pragmatic Comparison." Sensors 21, no. 20 (2021): 6904. http://dx.doi.org/10.3390/s21206904.

Testo completo
Abstract (sommario):
There are a dozen messaging protocols proposed for IoT systems. Choosing one for a new design is complicated, and a non-optimal selection can result in slower development and higher design costs. This paper aims to help select appropriate protocols, considering IoT applications’ specificity and communication requirements. We have identified the protocol features that are significant for the design and operation of IoT systems. This paper gives a substantial comparison of the protocols using the features and is based on a thorough analysis of the protocol specifications. The results contain an
Gli stili APA, Harvard, Vancouver, ISO e altri
13

Syahputra, Ramdhani, Rahmadi Kurnia, and Rian Ferdian. "Analysis of FHRP Design and Implementation in RIPv2 and OSPF Routing Protocols." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 4, no. 1 (2020): 102–8. http://dx.doi.org/10.29207/resti.v4i1.1490.

Testo completo
Abstract (sommario):
The high reliability of data access has become a problem faced by many companies, institutions, and universities. For this reason, a protocol required that can protect the network from a communication breakdown. One method used to maintain communication is by implementing a protocol redundancy system. One or more routers will act as the primary router for load balancing, and some routers are in standby mode if one main router is down. First hop redundancy protocols (FHRP) is a protocol that implements redundancy and load balancing systems. This protocol can transfer access data traffic if one
Gli stili APA, Harvard, Vancouver, ISO e altri
14

Choi, Sangil, Wooksik Lee, Teukseob Song, and Jong-Hoon Youn. "Block Design-Based Asynchronous Neighbor Discovery Protocol for Wireless Sensor Networks." Journal of Sensors 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/951652.

Testo completo
Abstract (sommario):
Neighbor discovery is a significant research topic in wireless sensor networks. After wireless sensor devices are deployed in specific areas, they attempt to determine neighbors within their communication range. This paper proposes a new Block design-based Asynchronous Neighbor Discovery protocol for sensor networks calledBAND. We borrow the concept of combinatorial block designs for neighbor discovery. First, we summarize a practical challenge and difficulty of using the original block designs. To address this challenge, we create a new block generation technique for neighbor discovery schedu
Gli stili APA, Harvard, Vancouver, ISO e altri
15

Zhang, Kai Lin, Da Hua Li, Shu Chen Shi, Xue Song Yang, Zhen Xiao, and Qiang Gao. "Design and Implementation of Multi-Protocol Self-Adaptation Gateway." Applied Mechanics and Materials 687-691 (November 2014): 2108–11. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2108.

Testo completo
Abstract (sommario):
For the four kinds of network protocols which are common in industry :PROFIBUS-DP, DeviceNet, EtherNet/IP and Modbus-RTU, a gateway has been designed which could integrate the four protocols ,and have developed hardware and software program of the Multi-protocol self-adaptation gateway .It uses STM32F407ZGT6 as its major chip. A Modbus-RTU interface has been designed which depends on the UART interface of the main chip to send and receive packets in hardware. It use COMX as hardware interface of PROFIBUS-DP ,DeviceNet ,and EtherNet/IP to process their packets. It has achieved a function that t
Gli stili APA, Harvard, Vancouver, ISO e altri
16

Chen, Zhi, Ya Peng, and Wenjing Yue. "Model-Checking Driven Design of QoS-Based Routing Protocol for Wireless Sensor Networks." Journal of Sensors 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/716561.

Testo completo
Abstract (sommario):
Accurate and reliable routing protocols with Quality of Service (QoS) support determine the mission-critical application efficiency in WSNs. This paper proposes a model-checking design driven framework for designing the QoS-based routing protocols of WSNs, which involves the light-weight design process, the timed automata model, and the alternative QoS verification properties. The accurate feedback of continually model checking in the iterative design process effectively stimulates the parameter tuning of the protocols. We demonstrate the straightforward and modular characteristics of the prop
Gli stili APA, Harvard, Vancouver, ISO e altri
17

Ideguchi, Tetsuo, Yuuji Koui, Nonmember, Mitsuru Tsuchida, Yukio Ushisako, Nonmember, and Michihiro Ishizaka. "Design and implementation of protocol conversion equipment for layered protocols." Electronics and Communications in Japan (Part I: Communications) 73, no. 3 (1990): 14–23. http://dx.doi.org/10.1002/ecja.4410730302.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
18

Chuang, Yun-Hsin, Chin-Laung Lei, and Hung-Jr Shiu. "How to Design a Secure Anonymous Authentication and Key Agreement Protocol for Multi-Server Environments and Prove Its Security." Symmetry 13, no. 9 (2021): 1629. http://dx.doi.org/10.3390/sym13091629.

Testo completo
Abstract (sommario):
An anonymous authentication and key agreement (AAKA) protocol provides anonymous members symmetric authentication and establishes a symmetric session key for secure communication in public networks. Today, numerous popular remote services are based on multi-server architecture, such as the internet of things (IoT), smart cities, cloud services, vehicular ad hoc networks (VANET), and telecare medicine information systems (TMIS). Many researchers have attempted to design AAKA protocols in multi-server environments for various applications. However, many of these have security defects, even if th
Gli stili APA, Harvard, Vancouver, ISO e altri
19

Ko, Hoo Sang, and Shimon Y. Nof. "Design of Protocols for Task Administration in Collaborative Production Systems." International Journal of Computers Communications & Control 5, no. 1 (2010): 91. http://dx.doi.org/10.15837/ijccc.2010.1.2466.

Testo completo
Abstract (sommario):
Customer-focused and concurrent engineering service systems process tasks more effectively as a result of the power of collaboration among multiple participants. In such environments, however, complex situations might arise that require decisions beyond simple coordination.Task Administration Protocols (TAPs) are designed as a control mechanism to manage complex situations in collaborative task environments. This article presents the design of TAPs for collaborative production systems in which tasks are performed by the collaboration of multiple agents. Three component protocols are found to c
Gli stili APA, Harvard, Vancouver, ISO e altri
20

Deepak Malik and Dr. Bijendra Singh. "Optimizing OSPF Cost Value for Best Path Selection Using Metric-Type Variation." International Research Journal on Advanced Engineering Hub (IRJAEH) 2, no. 06 (2024): 1845–54. http://dx.doi.org/10.47392/irjaeh.2024.0254.

Testo completo
Abstract (sommario):
Open Shortest Path First (OSPF) is a multi-vendor routing standard. Any routing protocol's goal is to discover the optimum path between source and destination addresses inside a computer network. Other routing protocols include Routing Information Protocol (RIP), Border Gateway Protocol (BGP), Enhanced Interior Gateway Routing Protocol (EIGRP), and IS-IS. which are also used in computer networking. Each routing protocol has different set of rules through which they calculate the best path selection. OSPF is often used with the combination of these routing protocol because of its flexible desig
Gli stili APA, Harvard, Vancouver, ISO e altri
21

Qiao, Chengzhen, Yanzhi Qiu, Chunhui Yang, and Shaozhe Zhang. "Design and Implementation of EMU On-board Data Protocol Management System." Journal of Physics: Conference Series 2356, no. 1 (2022): 012022. http://dx.doi.org/10.1088/1742-6596/2356/1/012022.

Testo completo
Abstract (sommario):
In view of the problems of various types, frequent upgrades and inconsistent standards of WTDS on-board protocols and fault dictionaries of EMU, sort out various on-board protocol documents and fault dictionaries of EMU on the whole railway. Analyse the differences of various on-board protocols and fault dictionaries of multiple units of different vehicle types and batches, and study the unified and standardized management method. Design a EMU on-board data protocol management system with complete business functions, standard specifications, safety and reliability, and realize the functions of
Gli stili APA, Harvard, Vancouver, ISO e altri
22

Hope, Emily S., Ben Filewod, Daniel W. McKenney, and Tony C. Lemprière. "A financial analysis of four carbon offset accounting protocols for a representative afforestation project (southern Ontario, Canada)." Canadian Journal of Forest Research 51, no. 7 (2021): 1015–28. http://dx.doi.org/10.1139/cjfr-2020-0183.

Testo completo
Abstract (sommario):
Forestry projects participate in carbon markets by sequestering carbon dioxide equivalent (CO2e) and producing carbon offsets. The creation of forest-based offsets is guided by protocols that dictate how sequestered CO2e is converted into marketable offsets. Existing protocol designs aim to produce offsets that meet sustainability requirements, while providing financial incentives for landowner participation. However, limited Canadian uptake implies that current financial incentives are insufficient to encourage the production of carbon offsets via private landowners. Here we consider various
Gli stili APA, Harvard, Vancouver, ISO e altri
23

Rakesh, Kumar Saini. "EECLD: Energy Efficient Cross Layer Design for Wireless Sensor Networks." International Journal of Information Technology 2, no. 12 (2020): 1–6. https://doi.org/10.5281/zenodo.3684129.

Testo completo
Abstract (sommario):
In Wireless Sensor Network, Sensor nodes have limited energy efficiency. Energy efficient protocols are required to improve the network lifetime for the wireless sensor network. Conventional protocols design is very critical for energy efficiency. In this paper, we propose an energy efficient cross layer design (EECLD). Simulation results show that the proposed EECLD significantly improves energy efficiency compared to the design of the conventional protocol.
Gli stili APA, Harvard, Vancouver, ISO e altri
24

Liu, Wei Dong, Xiang Yu Li, and Li'e Gao. "Design of a Gateway for Remotely Underwater Vehicles." Applied Mechanics and Materials 209-211 (October 2012): 2138–41. http://dx.doi.org/10.4028/www.scientific.net/amm.209-211.2138.

Testo completo
Abstract (sommario):
A gateway based on ARM is presented to achieve mutil-protocol conversion among different electronic control units. To guarantee its real-time ability and stability, the μC/OS-II embedded operation system was adopted. The first-in-first-out data queue is used to balance the communication rate among the different communication protocols which consist of the Controller Area Network, TCP/IP and RS-232. The gateway can be used in remotely manipulation between the console with Ethernet and remote underwater vehicle with other serial communication protocols.
Gli stili APA, Harvard, Vancouver, ISO e altri
25

Liu, Dong, and Huilin Cai. "Design of multi-protocol conversion module." Journal of Physics: Conference Series 2303, no. 1 (2022): 012059. http://dx.doi.org/10.1088/1742-6596/2303/1/012059.

Testo completo
Abstract (sommario):
Abstract In view of the communication difficulties of CNC machine tools with only RS232 and RS485 interfaces in industry, this paper studies DNC technology and multi-protocol conversion technology, proposes to use CAN bus to build DNC system, establish multi-protocol conversion module communication model, and build software and hardware platform based on STM32F103VCT6 MCU. The CAN bus protocol, RS232 bus protocol and RS485 bus protocol CAN be converted to each other. The experimental results verify the accuracy and reliability of the multi-protocol conversion module, realize the two-way transm
Gli stili APA, Harvard, Vancouver, ISO e altri
26

Oh, Soo-Yeon, Yong-Joon Lee, and Sung-Ho Hwang. "Design and Implementation of IoT Gateway with MQTT and IEC 61850 MMS Protocol." International Journal of Membrane Science and Technology 10, no. 1 (2023): 64–71. http://dx.doi.org/10.15379/ijmst.v10i1.1430.

Testo completo
Abstract (sommario):
With microgrids deployed in multiple areas, communication technologies that control devices and collect data play an important role. Microgrid environments are similar to the internet of things (IoT) environment, where multiple devices exchange information. Recent studies have attempted to utilize IoT protocols as communication protocols for microgrids. Studies have also begun on interworking IoT protocols with IEC 61850, an existing protocol for power utility. In this study, we designed an IoT gateway that maps message queuing telemetry transport (MQTT), an IoT protocol, to the IEC 61850 data
Gli stili APA, Harvard, Vancouver, ISO e altri
27

Amin, Md Ruhul, Md Shohrab Hossain, and Mohammed Atiquzzaman. "In-Band Full Duplex Wireless LANs: Medium Access Control Protocols, Design Issues and Their Challenges." Information 11, no. 4 (2020): 216. http://dx.doi.org/10.3390/info11040216.

Testo completo
Abstract (sommario):
In-band full duplex wireless medium access control (MAC) protocol is essential in order to enable higher layers of the protocol stack to exploit the maximum benefits from physical layer full duplex technology. Unlike half duplex wireless local area network, a full duplex MAC protocol has to deal with several unique issues and challenges that arise because of the dynamic nature of the wireless environment. In this paper, we have discussed several existing full duplex MAC protocols and have shown qualitative comparisons among these full duplex MAC protocols. Full duplex in-band wireless communic
Gli stili APA, Harvard, Vancouver, ISO e altri
28

Gong, Wen Tao. "The Design of Multi-Protocol Network Based on Point-to-Point Protocol and Frame Relay." Advanced Materials Research 936 (June 2014): 2293–97. http://dx.doi.org/10.4028/www.scientific.net/amr.936.2293.

Testo completo
Abstract (sommario):
Local area network and wide area network are different network protocols, small and medium enterprises due to the geographical distribution of discrete and interface diversity, leading to its needs to be compatible with different network protocols, it is difficult to use a single network protocol to realize network architecture, and due to the ipv4 address scarcity, making its application or maintenance cost greatly increased, based on this, this paper presents the design of multi-protocol network architecture based on point-to-point protocol and frame relay, and with the advantages of the rou
Gli stili APA, Harvard, Vancouver, ISO e altri
29

Pasupuleti, Murali Krishna. "Algebraic Geometry Methods in Cryptographic Protocol Design." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 04 (2025): 296–304. https://doi.org/10.62311/nesx/rp2525.

Testo completo
Abstract (sommario):
Abstract: Algebraic geometry offers a powerful and elegant mathematical framework for the design and analysis of modern cryptographic protocols. This research paper investigates the application of algebraic geometry methods—such as elliptic curves, abelian varieties, and projective algebraic structures—in enhancing the security, efficiency, and scalability of cryptographic systems. By bridging advanced algebraic structures with cryptographic primitives, the study demonstrates how algebraic geometry enables the construction of secure public key protocols, zero-knowledge proofs, and post-quantum
Gli stili APA, Harvard, Vancouver, ISO e altri
30

Tsuneizumi, Isamu, Ailixier Aikebaier, Makoto Ikeda, Tomoya Enokido, and Makoto Takizawa. "Design and Implementation of Hybrid Time (HT) Group Communication Protocol for Homogeneous Broadcast Groups." International Journal of Distributed Systems and Technologies 2, no. 3 (2011): 37–48. http://dx.doi.org/10.4018/jdst.2011070103.

Testo completo
Abstract (sommario):
To realize the cooperation of a group of multiple peer processes (peers), messages sent by peers must be causally delivered to every peer. In a scalable group, it is necessary to reduce the communication overhead to causally deliver messages. In this paper, the authors take advantage of the linear time (LT) and physical time (PT) protocols, as the message length is O(n) for the number n of peers. However, some pairs are unnecessarily ordered, that is, even if a pair of messages is ordered in the protocols, the messages may not be causally ordered. The greater the number of messages that are un
Gli stili APA, Harvard, Vancouver, ISO e altri
31

Almuhaideb, Abdullah M., and Huda A. Alghamdi. "Design of Inter-BAN Authentication Protocols for WBAN in a Cloud-Assisted Environment." Big Data and Cognitive Computing 6, no. 4 (2022): 124. http://dx.doi.org/10.3390/bdcc6040124.

Testo completo
Abstract (sommario):
The Telecare Medical Information System (TMIS) is a technology used in Wireless Body Area Networks (WBAN) that is used efficiently for remote healthcare services. TMIS services can be provided as cloud computing services for storage and processing purposes. TMIS uses wearable sensors to collect patient data and transmit it to the controller node over a public channel. The data is then obtained from the controller node by the medical server and stored in the database for analysis. However, an attacker can attempt to launch attacks on data transferred across an unsecured channel. Several schemes
Gli stili APA, Harvard, Vancouver, ISO e altri
32

Kristić, Ante, Julije Ožegović, and Ivan Kedžo. "Design and Modeling of Self-Adapting MAC (SaMAC) Protocol with Inconstant Contention Loss Probabilities." Wireless Communications and Mobile Computing 2018 (September 12, 2018): 1–25. http://dx.doi.org/10.1155/2018/6375317.

Testo completo
Abstract (sommario):
Networks based on IEEE 802.11 standard are one of the main options for deployment in industrial environment. Degradation of throughput in congested networks and short-term unfairness are well-known drawbacks of 802.11 DCF and similar MAC protocols. Those shortcomings represent significant limitation in forecasted growth of wireless usage. This is especially important in industrial wireless networks (IWN) where the scalability of wireless MAC is one of the main requirements. In this paper, a novel self-adapting MAC protocol (SaMAC) is defined and mathematically modeled. SaMAC employs constraine
Gli stili APA, Harvard, Vancouver, ISO e altri
33

S, Arockiaraj, Krishnamoorthi Makkithaya, and Harishchandra Hebbar N. "Quality of Service-Based Cross-Layer Protocol for Wireless Sensor Networks." International Journal of Interactive Mobile Technologies (iJIM) 16, no. 20 (2022): 34–58. http://dx.doi.org/10.3991/ijim.v16i20.31111.

Testo completo
Abstract (sommario):
Sensor nodes in wireless sensor networks (WSN) are used for perceiving, monitoring, and controlling a wide range of applications. Owing to the small size of sensor nodes and limited power sources, energy saving is critical for ensuring network longevity. Protocols in different layers consume energy for their function. It is possible to significantly reduce energy usage by including energy-efficiency measures in the protocol design. Most protocols in the literature focus on the energy efficiency in individual layers. Recent studies have shown that cross-layer designs are more energy efficient t
Gli stili APA, Harvard, Vancouver, ISO e altri
34

Hao, Chen, John A. Clark, and Jeremy L. Jacob. "Automated Design of Security Protocols." Computational Intelligence 20, no. 3 (2004): 503–16. http://dx.doi.org/10.1111/j.0824-7935.2004.00249.x.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
35

Ramarao, K. V. S. "Design of transaction commitment protocols." Information Sciences 55, no. 1-3 (1991): 129–49. http://dx.doi.org/10.1016/0020-0255(91)90010-r.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
36

Bunch, David S., David M. Rocke, and Robert O. Harrison. "Statistical design of ELISA protocols." Journal of Immunological Methods 132, no. 2 (1990): 247–54. http://dx.doi.org/10.1016/0022-1759(90)90036-u.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
37

Kozak, P., and W. M. Wonham. "Design of transaction management protocols." IEEE Transactions on Automatic Control 41, no. 9 (1996): 1330–35. http://dx.doi.org/10.1109/9.536503.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
38

Longo, Bernadette, Craig Weinert, and T. Kenny Fountain. "Implementation of Medical Research Findings through Insulin Protocols: Initial Findings from an Ongoing Study of Document Design and Visual Display." Journal of Technical Writing and Communication 37, no. 4 (2007): 435–52. http://dx.doi.org/10.2190/v986-k02v-519t-721j.

Testo completo
Abstract (sommario):
Medical personnel in hospital intensive care units routinely rely on protocols to deliver some types of patient care. These protocol documents are developed by hospital physicians and staff to ensure that standards of care are followed. Thus, the protocol document becomes a de facto standing order, standing in for the physician's judgment in routine situations. This article reports findings from Phase I of an ongoing study exploring how insulin protocols are designed and used in intensive care units to transfer medical research findings into patient care “best practices.” We developed a taxono
Gli stili APA, Harvard, Vancouver, ISO e altri
39

Wei, Jun Chao, Guo Yuan Zhang, Yao Chen, and Xiu Tian Yan. "Design of a Communication Interface between the Controller and the Galvanometer." Applied Mechanics and Materials 527 (February 2014): 269–72. http://dx.doi.org/10.4028/www.scientific.net/amm.527.269.

Testo completo
Abstract (sommario):
In a laser marking system, a laser marking controller should be designed to control several galvanometers through a certain interface using a certain protocol, such as the XY2-100 or SPI. The selection of the protocol depends on the configuration of the laser marking system. Using different protocols makes the controller design provide two types of interfaces. If different protocols have their own physical interfaces, the circuit becomes more complicated. In order to decrease the number of physical interfaces and ensure the protocol compatibility at the same time, two protocol signal generator
Gli stili APA, Harvard, Vancouver, ISO e altri
40

Singh, Kamred Udham. "Design Of Energy Efficient and Secure Routing Protocol for Wsn in Iot." Mathematical Statistician and Engineering Applications 70, no. 2 (2021): 1434–41. http://dx.doi.org/10.17762/msea.v70i2.2336.

Testo completo
Abstract (sommario):

 
 
 
 Abstract
 This paper proposes an energy-efficient and secure routing system for wireless sensor networks (WSNs) in the Internet of Things (IoT). The proposed routing protocol improves packet delivery ratio, end-to-end latency, and network lifetime over existing protocols. The protocol under consideration reduces node energy consumption, increasing the network's lifetime, while ensuring data security. Simulation studies using several metrics evaluate the proposed procedure. The recommended protocol outperforms existing protocols in energy efficiency and security
Gli stili APA, Harvard, Vancouver, ISO e altri
41

ZUO, JING, XUEFEN CHI, LIN GUAN, HONGXIA LI, and IRFAN AWAN. "DESIGN OF FUZZY BASED MULTI-CONSTRAINED ROUTING PROTOCOL AND THE PERFORMANCE EVALUATION." Journal of Interconnection Networks 09, no. 04 (2008): 369–87. http://dx.doi.org/10.1142/s0219265908002333.

Testo completo
Abstract (sommario):
Single-constrained QoS routing protocols have inherent defects when applied into wireless ad hoc networks. Due to a single constraint parameter is only considered, they can't always cope with the problems caused by the uncertainty of ad hoc networks well. They are not robust enough. In order to overcome the drawbacks of single-constrained QoS routing protocols and improve the Quality of Service (QoS) of ad hoc networks, this paper proposed a multi-constrained QoS routing protocol based on fuzzy logic. It is developed from Dynamic Source Routing (DSR). The proposed protocol is service-aware in
Gli stili APA, Harvard, Vancouver, ISO e altri
42

Shirpurkar, Vrushali, Pravin Mawale, and Suvarna Gosavi. "Design of a MANET using AODV and AOMDV Routing Protocols." International Journal of Scientific Engineering and Research 4, no. 10 (2016): 105–7. https://doi.org/10.70729/ijser151028.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
43

Srivastava, Pallavi, Edwin Chung, and Stepan Ozana. "Asynchronous Floating-Point Adders and Communication Protocols: A Survey." Electronics 9, no. 10 (2020): 1687. http://dx.doi.org/10.3390/electronics9101687.

Testo completo
Abstract (sommario):
Addition is the key operation in digital systems, and floating-point adder (FPA) is frequently used for real number addition because floating-point representation provides a large dynamic range. Most of the existing FPA designs are synchronous and their activities are coordinated by clock signal(s). However, technology scaling has imposed several challenges like clock skew, clock distribution, etc., on synchronous design due to presence of clock signal(s). Asynchronous design is an alternate approach to eliminate these challenges imposed by the clock, as it replaces the global clock with hands
Gli stili APA, Harvard, Vancouver, ISO e altri
44

Sankhyan, Bhanu, Anupam Baliyan, and Abhishek Kumar. "Design of a Hybrid Security Protocol based on Cryptographic Algorithms." International Journal for Research in Applied Science and Engineering Technology 12, no. 3 (2024): 2240–47. http://dx.doi.org/10.22214/ijraset.2024.59335.

Testo completo
Abstract (sommario):
Abstract: With increase in the use of the internet, the need to secure data is also increased. The present symmetric and asymmetric algorithms provide secure systems, but with many limitations. In the emerging world need for rapid accessing the data is increasing, a blend of both efficiency and security is required to cater the day-to-day needs. To ensure efficiency and security of the message hybrid security protocols are developed. Hybrid security protocol combines the advantages of traditional algorithms, such that more secure and efficient systems can be developed. A new hybrid protocol is
Gli stili APA, Harvard, Vancouver, ISO e altri
45

Liu, Hai Yan, Yue Zhao, and Rui Huang. "Study and Design on Vulnerability Discovering of Network Protocols." Applied Mechanics and Materials 556-562 (May 2014): 5526–30. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5526.

Testo completo
Abstract (sommario):
Discovering the vulnerabilities in network protocols is the key for network attacks and defenses. Basing on the analysis of some currently used vulnerability discovering methods, a method combining reverse engineering and fuzzy testing is put forward for vulnerability discovering of network protocols, where reverse engineering method is first used to analyze the details of the communication protocol, then fuzzy testing is used to test the target software. This combination can promote the efficiency of the fuzzy testing. By using this method to test a real network application, several vulnerabi
Gli stili APA, Harvard, Vancouver, ISO e altri
46

AYE, THANDAR SWE, and KHAT KHAT KHIN. "Design and Formal Analysis of E-cash System." International Journal of Scientific Engineering and Technology Research Vol. 03, Issue. 16 (2014): pp. 3318–3321. https://doi.org/10.5281/zenodo.3133029.

Testo completo
Abstract (sommario):
E-cash system is one of the most popular e-commerce applications. Many researchers tried to improve security such as secrecy, non-repudiation, anonymity, and fairness. Although many researchers have proposed the E-cash payment protocols to the literature, there are few papers that analyze formally those protocols. The current e-cash protocols still need to check whether they meet fairness property. This paper will focus on analyzing non-repudiation, anonymity and fairness properties in e-cash payment protocol by using AVISPA tool. The proposed e-cash system consists of three parties: merchant,
Gli stili APA, Harvard, Vancouver, ISO e altri
47

Deeptha, R. "Survey on Opportunistic Routing Protocols in Multihop Wireless Networks." Webology 18, Special Issue 04 (2021): 752–64. http://dx.doi.org/10.14704/web/v18si04/web18162.

Testo completo
Abstract (sommario):
Routing is portrayed as one of the most important prevailing challenges in research with reference to multi-hop networks in a wireless environment. Opportunistic routing (OR) protocol is an emerging area related to research, due to the improvement in communication reliability, compared to the traditional routing models. The major perception related to OR is to determine a group of neighboring node candidates, named as a candidate set using the advantages of broadcast capability of the wireless medium thereby to collaboratively transmit data packets towards the destination using the coordinatio
Gli stili APA, Harvard, Vancouver, ISO e altri
48

Paul, Surjit, Sanjay Kumar, and Rajiv Ranjan Suman. "A Quantum Secure Entity Authentication Protocol Design for Network Security." International Journal of Information Security and Privacy 13, no. 4 (2019): 1–11. http://dx.doi.org/10.4018/ijisp.2019100101.

Testo completo
Abstract (sommario):
Authentication is one of the significant issues for all kinds of network communications. Most of the authentication protocols designed and implemented so far for entity authentication are based on classical cryptographic techniques to prevent themselves from different types of attacks. These protocols use either password or challenge for authentication. In this article, the design of the proposed quantum secure entity authentication protocol is shown. The proposed protocol is based on the challenge response method. Due to quantum computer capability to break mathematical complexity-based crypt
Gli stili APA, Harvard, Vancouver, ISO e altri
49

Patel, Ahmed, Kenan Kalajdzic, Laleh Golafshan, and Mona Taghavi. "Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card." International Journal of Information Security and Privacy 5, no. 3 (2011): 1–18. http://dx.doi.org/10.4018/ijisp.2011070101.

Testo completo
Abstract (sommario):
Zero-knowledge authentication protocols are an alternative to authentication protocols based on public key cryptography. Low processing and memory consumption make them especially suitable for implementation in smart card microprocessors, which are severely limited in processing power and memory space. This paper describes a design and implementation of a software library providing smart card application developers with a reliable authentication mechanism based on well-known zero-knowledge authentication schemes. Java Card is used as the target smart card platform implementation based on the e
Gli stili APA, Harvard, Vancouver, ISO e altri
50

Vasudha and Bhola Anoop. "Comprehensive Analysis on Cluster based Hierarchical Routing Protocols for Wireless Sensor Networks." Journal of Switching Hub 4, no. 1 (2019): 1–9. https://doi.org/10.5281/zenodo.2537434.

Testo completo
Abstract (sommario):
<em>The most important key issuefor research purpose in WSN is the </em><em>Routing protocol. As indicated by organized network the routing protocols can be broadly described as flat and hierarchical routing protocol.The paper presents a few common progressive hierarchical routing protocols in detail and is investigated on their performance in network. Likewise, routing protocols share prominent role in terms of competence in WSN.Due to restrictions of resources in the sensors, it is difficult to plan an effective design of efficient routing protocol. The paper investigated Hierarchical based
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!