Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: PROTOCOL ANALYSIS.

Artykuły w czasopismach na temat „PROTOCOL ANALYSIS”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „PROTOCOL ANALYSIS”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

S V Kharat, Gumaste. "Performance Analysis of DSR Protocol." International Journal of Scientific Engineering and Research 1, no. 3 (2013): 62–68. https://doi.org/10.70729/j201340.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Hussain, Kashif. "Comparative Analysis of DNA Extraction Protocols from Blood for Bovine Theileriosis." International Journal of Agriculture and Biology 34, no. 03 (2025): 340301. https://doi.org/10.17957/ijab/15.2361.

Pełny tekst źródła
Streszczenie:
Genomic DNA serves as the foundation for molecular research and advancements including disease sureveillance, biodiversity conservation and environmental monitoring etc. Cost-effectiveness coupled with DNA quality and quantity are prerequisites for molecular tools, which depend on extraction protocols. The current study compared four DNA extraction protocols to evaluate DNA quantity, integrity, purity, cost-effectiveness and suitability for detecting theileriosis. The DNA concentration with 100 µL of blood was highest for Tris-HCL EDTA protocol (A) 209.6 ng/µL, followed by phenol-chloroform pr
Style APA, Harvard, Vancouver, ISO itp.
3

Li, Fu Lin, Jie Yang, Hong Wei Zhou, and Ying Liu. "A New Dynamic Protocol Analysis Model." Advanced Materials Research 765-767 (September 2013): 1761–65. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1761.

Pełny tekst źródła
Streszczenie:
Traditional static analysis methods such as formal validation and theorem proving were used to analyze protocols security previously. These methods can not measure and evaluate actual security of protocols accurately for the setting and suppose are far from the actual conditions. This paper proposes a new dynamic protocol analysis model. The system based on the model can be used to active test in actual running conditions, analyze known protocols security, integrity, robustness, and analyze unknown protocols online, provide support for protocol designer. The systems structure, working flow and
Style APA, Harvard, Vancouver, ISO itp.
4

Zhao, Wen Hong. "Protocols Analysis by Base-Function." Applied Mechanics and Materials 530-531 (February 2014): 682–85. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.682.

Pełny tekst źródła
Streszczenie:
A new description method of protocol structure is presented by base-function firstly. Then, a protocol analysis method base on it is proposed. To analyses the private protocols, a new self-learning algorithm is discussed. Finally, the flow of protocol analysis based on base-function is given. Experiment results show the efficiency of presented method.
Style APA, Harvard, Vancouver, ISO itp.
5

Owen, Stephen, Pearl Brereton, and David Budgen. "Protocol analysis." Communications of the ACM 49, no. 2 (2006): 117–22. http://dx.doi.org/10.1145/1113034.1113039.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

KOVACIK, Cyril Filip, and Gabriel BUGAR. "ANALYSIS OF OPERATIONAL PROPERTIES OF VOIP NETWORK." Acta Electrotechnica et Informatica 1335-8243, no. 1338-3957 (2021): 30–34. http://dx.doi.org/10.15546/aeei-2021-0005.

Pełny tekst źródła
Streszczenie:
Voice transmission over the Internet network is now taken for granted. Many end-user applications address this issue. However, this paper focuses on the specific use of the SCCP protocol created by Cisco, its implementation in a computer network and end devices, determination of the operational properties of this implementation, and their comparison in different conditions. VoIP traffic is compared at different bandwidths and implemented by different configurations of IP protocols. By investigated implementations of IP protocols are meant IPv4, IPv6, and IPv4 protocol with applied NAT. As part
Style APA, Harvard, Vancouver, ISO itp.
7

Anggriani, Sufy, Rizki Savira Firdaus, and Windy Amanda Siwi Suherlan. "Analisis Penyimpanan Protokol Notaris Secara Elektronik." Notaire 6, no. 3 (2023): 437–48. http://dx.doi.org/10.20473/ntr.v6i3.50802.

Pełny tekst źródła
Streszczenie:
AbstractThe collapse of the efficiency of notary protocol storage that is carried out physically has resulted in the idea of developing a way for a notary to store the notary protocol, by transferring the storage media into electronic form. Thus, access in submitting notary protocols to the notary receiving the protocol is seen as more efficient because it involves technological advances. This research aims to analyze the importance of notary protocols being stored electronically and to analyze the criteria for notaries receiving electronic notary protocols. In this research, normative researc
Style APA, Harvard, Vancouver, ISO itp.
8

HU, YANJING, QINGQI PEI, and LIAOJUN PANG. "Instruction Clustering Analysis for Unknown Network Protocol's Abnormal Behavior." Journal of Interconnection Networks 15, no. 03n04 (2015): 1540002. http://dx.doi.org/10.1142/s0219265915400022.

Pełny tekst źródła
Streszczenie:
Protocol's abnormal behavior analysis is an important task in protocol reverse analysis. Traditional protocol reverse analysis focus on the protocol message format, but protocol behavior especially the abnormal behavior is rare studied. In this paper, protocol behavior is represented by the labeled behavior instruction sequences. Similar behavior instruction sequences mean the similar protocol behavior. Using our developed virtual analysis platform HiddenDisc, we can capture a variety of known or unknown protocols' behavior instruction sequences. All kinds of executed or unexecuted instruction
Style APA, Harvard, Vancouver, ISO itp.
9

Neeru Kumari and Dr. Tilak Raj. "OSPF Metric Convergence and Variation Analysis During Redistribution with Routing Information Protocol." International Research Journal on Advanced Engineering and Management (IRJAEM) 2, no. 06 (2024): 1985–91. http://dx.doi.org/10.47392/irjaem.2024.0293.

Pełny tekst źródła
Streszczenie:
Open Shortest Path First networking protocol falls under the category of Interior gateway routing protocols and is multi-vendor supported. The task of OSPF like any other routing protocol is to calculate the best path between source IP address and destination IP address within the organisation computer network. There are various other routing protocols like Routing Information Protocol, Border Gateway Protocol, Intermediate System - Intermediate System (IS-IS), Enhanced Interior Gateway Routing Protocol, etc. which are used in computer network. Routing protocols have different algorithms throu
Style APA, Harvard, Vancouver, ISO itp.
10

Muhammad Farhan, Muhammad Asif, Maaz Bin Ahmad, and Khalid Maqsood. "A Comparative Analysis of Unicast Routing Protocols for MPLS-VPN." Lahore Garrison University Research Journal of Computer Science and Information Technology 3, no. 1 (2019): 43–49. http://dx.doi.org/10.54692/lgurjcsit.2019.030167.

Pełny tekst źródła
Streszczenie:
MPLS-VPN technology is introduced to provide secure transmission with minimum propagation delay. This paper presents a comparative analysis of unicast routing protocols for MPLSVPN enabled networks. The motive behind this analysis is to observe the consequence of unicast routing protocols on the performance of MPLS-VPN enabled networks and to choose most suitable routing protocol for such type of networks. To conduct the analysis, a test bed is established in GNS3 simulator. Three main unicast routing protocols i.e. Enhanced Interior Gateway Routing Protocol (EIGRP), Open Shortest Path First (
Style APA, Harvard, Vancouver, ISO itp.
11

Zhao, Wen Hong. "Protocols Analysis Based on the Combination Mode of Walsh Function." Applied Mechanics and Materials 543-547 (March 2014): 3482–85. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3482.

Pełny tekst źródła
Streszczenie:
To analyses networks, technologies of network protocol analysis are usually used. A new approach of protocols analysis is presented based on the combination mode of walsh function. It consists of three parts, such as the protocol structure characterization method, the hierarchical protocol analysis and the self-learning combination modes. After discussing the analysis process, an experiment shows the efficiency of presented approach.
Style APA, Harvard, Vancouver, ISO itp.
12

Yongming Yao, Yongming Yao, Yulin Wang Yongming Yao, Weiyi Jiang Yulin Wang, Ziyuan Wang Weiyi Jiang, and Song Huang Ziyuan Wang. "PPAdroid: An Approach to Android Privacy Protocol Analysis." 網際網路技術學刊 23, no. 3 (2022): 561–71. http://dx.doi.org/10.53106/160792642022052303014.

Pełny tekst źródła
Streszczenie:
<p>With the continuous growth of the number of mobile applications, users may provide personal information to applications consciously or unconsciously. Privacy protocol could help users understand the privacy behavior of applications. However, users usually ignore the content of the privacy protocol due to the length of their context. To solve such a problem, we conduct an empirical study on privacy protocols of Android applications and propose a method to detect sentences related to personal information operations in privacy protocol documents. In our proposed method, a verb list, a ne
Style APA, Harvard, Vancouver, ISO itp.
13

Lu, Siqi, Qingdi Han, Xuyang Miao, and Yubo Liu. "Research on Security Protocol Analysis Tool SmartVerif." Journal of Physics: Conference Series 2132, no. 1 (2021): 012022. http://dx.doi.org/10.1088/1742-6596/2132/1/012022.

Pełny tekst źródła
Streszczenie:
Abstract Security protocols have been designed to protect the security of the network. However, many security protocols cannot guarantee absolute security in real applications. Therefore, security tests of the network protocol become particularly important. In this paper, firstly, we introduce SmartVerif, which is the first formal analysis tool to automatically verify the security of protocols through dynamic strategies. And then, we use SmartVerif to verify the pseudo-randomness of the encapsulated key of the Two-Pass AKE protocol, which was proposed by Liu’s in ASIACRYPT in 2020. Finally, we
Style APA, Harvard, Vancouver, ISO itp.
14

Smith, John, Dana Kay Smith, and Eileen Kupstas. "Automated Protocol Analysis." Human-Computer Interaction 8, no. 2 (1993): 101–45. http://dx.doi.org/10.1207/s15327051hci0802_2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
15

Rekhter, Yakov. "IDRP protocol analysis." ACM SIGCOMM Computer Communication Review 22, no. 2 (1992): 17–28. http://dx.doi.org/10.1145/141800.141802.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
16

Grossman, Stephen. "Khandwalla's protocol analysis." Creativity Research Journal 7, no. 1 (1994): 93–95. http://dx.doi.org/10.1080/10400419409534515.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
17

Sedgwick, P. "Per protocol analysis." BMJ 340, apr07 1 (2010): c1825. http://dx.doi.org/10.1136/bmj.c1825.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

Gurtov, Andrei. "Performance analysis of general backoff protocols." Journal of Communications Software and Systems 4, no. 1 (2008): 13. http://dx.doi.org/10.24138/jcomss.v4i1.233.

Pełny tekst źródła
Streszczenie:
In this paper, we analyze backoff protocols, such as the one used in Ethernet. We examine a general backoff function(GBF) rather than just the binary exponential backoff (BEB) used by Ethernet. Under some mild assumptions we find stability and optimality conditions for a wide class of backoff protocols with GBF. In particular, it is proved that the maximal throughput rate over the class of backoff protocols is a fixed function of the number of stations (N) and the optimal average service time is about Ne for large N. The reasons of the instability of the BEB protocol (for a big enough input ra
Style APA, Harvard, Vancouver, ISO itp.
19

Xiao, Meihua, Weiwei Song, Ke Yang, Ri OuYang, and Hanyu Zhao. "Formal Analysis of the Security Protocol with Timestamp Using SPIN." Computational Intelligence and Neuroscience 2022 (August 23, 2022): 1–11. http://dx.doi.org/10.1155/2022/2420590.

Pełny tekst źródła
Streszczenie:
The verification of security protocols is an important basis for network security. Now, some security protocols add timestamps to messages to defend against replay attacks by network intruders. Therefore, verifying the security properties of protocols with timestamps is of great significance to ensure network security. However, previous formal analysis method of such protocols often extracted timestamps into random numbers in order to simplify the model before modeling and verification, which probably cause time-dependent security properties that are ignored. To solve this problem, a method fo
Style APA, Harvard, Vancouver, ISO itp.
20

Byun, Ilmu. "Cooperative Hybrid-ARQ Protocols: Unified Frameworks for Protocol Analysis." ETRI Journal 33, no. 5 (2011): 759–69. http://dx.doi.org/10.4218/etrij.11.0110.0630.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
21

Syahputra, Ramdhani, Rahmadi Kurnia, and Rian Ferdian. "Analysis of FHRP Design and Implementation in RIPv2 and OSPF Routing Protocols." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 4, no. 1 (2020): 102–8. http://dx.doi.org/10.29207/resti.v4i1.1490.

Pełny tekst źródła
Streszczenie:
The high reliability of data access has become a problem faced by many companies, institutions, and universities. For this reason, a protocol required that can protect the network from a communication breakdown. One method used to maintain communication is by implementing a protocol redundancy system. One or more routers will act as the primary router for load balancing, and some routers are in standby mode if one main router is down. First hop redundancy protocols (FHRP) is a protocol that implements redundancy and load balancing systems. This protocol can transfer access data traffic if one
Style APA, Harvard, Vancouver, ISO itp.
22

Zheng, Mingwei, Qingkai Shi, Xuwei Liu, et al. "ParDiff: Practical Static Differential Analysis of Network Protocol Parsers." Proceedings of the ACM on Programming Languages 8, OOPSLA1 (2024): 1208–34. http://dx.doi.org/10.1145/3649854.

Pełny tekst źródła
Streszczenie:
Countless devices all over the world are connected by networks and communicated via network protocols. Just like common software, protocol implementations suffer from bugs, many of which only cause silent data corruption instead of crashes. Hence, existing automated bug-finding techniques focused on memory safety, such as fuzzing, can hardly detect them. In this work, we propose a static differential analysis called ParDiff to find protocol implementation bugs, especially silent ones hidden in message parsers. Our key observation is that a network protocol often has multiple implementations an
Style APA, Harvard, Vancouver, ISO itp.
23

Mehri-Toonabi, Ali, Mahdi Davoudi Darareh, and Shahrooz Janbaz. "High-dimensional quantum key distribution using polarization-phase encoding: security analysis." International Journal of Quantum Information 18, no. 06 (2020): 2050031. http://dx.doi.org/10.1142/s0219749920500318.

Pełny tekst źródła
Streszczenie:
In this work, we introduce a high-dimensional polarization-phase (PoP)-based quantum key distribution protocol, briefly named PoP[Formula: see text], where [Formula: see text] is the dimension of a hybrid quantum state including polarization and phase degrees of freedom of the same photon, and [Formula: see text] is the number of mutually unbiased bases. We present a detailed description of the PoP[Formula: see text] protocol as a special case, and evaluate its security against various individual and coherent eavesdropping strategies, and in each case, we compare it with the BB84 and the two-d
Style APA, Harvard, Vancouver, ISO itp.
24

Jin-Ze Du, Jin-Ze Du, Jun-Wei Liu Jin-Ze Du, Tao Feng Jun-Wei Liu, and Zhan-Ting Yuan Tao Feng. "Formal Analysis and Improvement of Z-Wave Protocol." 電腦學刊 34, no. 4 (2023): 025–39. http://dx.doi.org/10.53106/199115992023083404003.

Pełny tekst źródła
Streszczenie:
<p>In order to verify the security of the Z-Wave communication protocol, the possible attacks in the protocol are analyzed to reduce user privacy security vulnerabilities. For the communication process and key exchange process between the controller and the node, this paper uses CPN tools to model the Z-Wave S2 protocol, and introduces the Dolev-Yao attack model to verify the security behavior of the protocol. The results show that there is a man-in-the-middle attack when using S2 authentication for device inclusion. In response to this vulnerability, we propose a lightweight static auth
Style APA, Harvard, Vancouver, ISO itp.
25

Debuisschert, Thierry, and Simon Fossier. "Security analysis of the time-coding quantum key distribution protocols." Quantum Information and Computation 11, no. 11&12 (2011): 968–87. http://dx.doi.org/10.26421/qic11.11-12-7.

Pełny tekst źródła
Streszczenie:
We report the security analysis of time-coding quantum key distribution protocols. The protocols make use of coherent single-photon pulses. The key is encoded in the photon time-detection. The use of coherent superposition of states allows to detect eavesdropping of the key. We give a mathematical model of a first protocol from which we derive a second, simpler, protocol. We derive the security analysis of both protocols and find that the secure rates can be similar to those obtained with the BB84 protocol. We then calculate the secure distance for those protocols over standard fibre links. Wh
Style APA, Harvard, Vancouver, ISO itp.
26

Shadi, Nashwan, and M. Alshammari Bandar. "Formal Analysis of MCAP Protocol Against Replay Attack." British Journal of Mathematics & Computer Science 22, no. 1 (2017): 1–14. https://doi.org/10.9734/BJMCS/2017/32744.

Pełny tekst źródła
Streszczenie:
Replay attack is considered a common attacking technique that is used by adversaries to gain access to confidential information. Several approaches have been proposed to prevent replay attack in security-critical systems such as Automated Teller Machines (ATM) systems. Among those approaches is a recent one called the Mutual Chain Authentication Protocol for the Saudi Payments Network transactions (MCAP). This protocol aims to allow Saudi banking systems to overcome existing weaknesses in the currently used Two-Factor Authentication (2FA) protocols. In this paper, we analyze and verify the rec
Style APA, Harvard, Vancouver, ISO itp.
27

Lin, Wen Qi, Yi Liu, Li Meng Song, Yuan Jiao Zhang, and Fei Guo. "Comparison and Analysis of MAC Protocol in Multimedia Communications." Applied Mechanics and Materials 519-520 (February 2014): 496–99. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.496.

Pełny tekst źródła
Streszczenie:
MAC protocol analysis and comparison to the multimedia communication theory as the framework, firstly discusses the requirement of communication network in computer networks and multimedia applications. MAC protocols oriented to wireless sensor networks are compared and analyzed. Summary of CSMA/CA, CSMA/CD, S-MAC and basic principles and applicable occasions, main parameters is made. Properties of the three MAC protocols is compared. The results of this study provides reference for MAC protocol oriented to multimedia communications.
Style APA, Harvard, Vancouver, ISO itp.
28

Xiao, Meihua, Lina Chen, Ke Yang, and Zehuan Li. "Formal Analysis of Rational Exchange Protocols Based on the Improved Buttyan Model." Symmetry 17, no. 7 (2025): 1033. https://doi.org/10.3390/sym17071033.

Pełny tekst źródła
Streszczenie:
A rational exchange protocol is a type of e-commerce protocol that aims to maximize the participants’ own interests. The Buttyan model is commonly used to analyze the security of such protocols. However, this model has limitations in dealing with uncertainties and false messages in rational exchanges. To address these shortcomings, this paper proposes a formal analysis method based on Bayesian games. By incorporating participants’ types and beliefs, the Buttyan model is extended to enhance its ability to express uncertainties. Additionally, attack messages are introduced to simulate the potent
Style APA, Harvard, Vancouver, ISO itp.
29

Kang, Baoyuan, Yanbao Han, Kun Qian, and Jianqi Du. "Analysis and Improvement on an Authentication Protocol for IoT-Enabled Devices in Distributed Cloud Computing Environment." Mathematical Problems in Engineering 2020 (June 23, 2020): 1–6. http://dx.doi.org/10.1155/2020/1970798.

Pełny tekst źródła
Streszczenie:
Recently, a number of authentication protocols integrated with the Internet of Things (IoT) and cloud computing have been proposed for secure access control on large-scale IoT networks. In this paper, we carefully analyze Amin et al.’s authentication protocol for IoT-enabled devices in distributed cloud computing environment and find that Amin et al.’s protocol is vulnerable to several weaknesses. The main shortcoming of Amin et al.’s protocol is in authentication phase; a malicious cloud server can counterfeit the cloud server chosen by a user, and the control server cannot find this counterf
Style APA, Harvard, Vancouver, ISO itp.
30

Shi, Lu-Feng, Karen A. Doherty, Tammy M. Kordas, and Joseph T. Pellegrino. "Short-Term and Long-Term Hearing Aid Benefit and User Satisfaction: A Comparison between Two Fitting Protocols." Journal of the American Academy of Audiology 18, no. 06 (2007): 482–95. http://dx.doi.org/10.3766/jaaa.18.6.3.

Pełny tekst źródła
Streszczenie:
Currently published hearing aid fitting protocols recommend speech-in-noise testing and loudness measures, but it remains unclear how these measures affect hearing aid benefit and user satisfaction. This study compared two protocols in their effects on benefit and satisfaction. Protocol A included an electroacoustic analysis, real-ear measures, and hearing aid adjustments based on users' comments. Protocol B included all of Protocol A and a speech-in-noise test, loudness discomfort levels, and aided loudness. Thirty-two participants completed the Abbreviated Profile of Hearing Aid Benefit (APH
Style APA, Harvard, Vancouver, ISO itp.
31

Dey, Tanay, M. M. A. Hashem, and Subroto Kumar Mondal. "ON PERFORMANCE ANALYSIS OF AMBR PROTOCOL IN MOBILE AD HOC NETWORKS." IIUM Engineering Journal 11, no. 2 (2010): 240–54. http://dx.doi.org/10.31436/iiumej.v11i2.28.

Pełny tekst źródła
Streszczenie:
Due to mobility of nodes in ad hoc networks, the most challenging issue is to design and to make sound analysis of a routing protocol that determines its robustness to deliver packets in low routing packet overhead. In this paper, we thoroughly analyzed the Adaptive Monitor Based Routing (AMBR) protocol by varying different parameters that affect a routing protocol to measure its performance. Analysis shows that it requires less routing control overhead comparing with other prevalent routing protocols. An improved analytical model is also presented in this paper. All these analyses firmly prov
Style APA, Harvard, Vancouver, ISO itp.
32

Sarvaiya, Ms Shilpa B. "Analysis of IoT Data Transfer Messaging Protocols on Application Layer." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (2022): 1812–19. http://dx.doi.org/10.22214/ijraset.2022.45604.

Pełny tekst źródła
Streszczenie:
Abstract: Now on a daily basis during a smarter embedded world, have Internet of Things. IoT have lot of things for the embedded systems, and it's the potential to remodel our world with the assistance of it. Internet of Things (IoT) or Web of Things (WoT) is emerging technology and it wireless network between two or more objects or smart things connect via Internet. IoT classified in two types first is within IoT and second side is outside of IoT. In inside IoT consider as protocols in IoT. In outside of IoT consider as sensor, actuators, etc., those are physically possible. In within IoT con
Style APA, Harvard, Vancouver, ISO itp.
33

Vasudha and Bhola Anoop. "Comprehensive Analysis on Cluster based Hierarchical Routing Protocols for Wireless Sensor Networks." Journal of Switching Hub 4, no. 1 (2019): 1–9. https://doi.org/10.5281/zenodo.2537434.

Pełny tekst źródła
Streszczenie:
<em>The most important key issuefor research purpose in WSN is the </em><em>Routing protocol. As indicated by organized network the routing protocols can be broadly described as flat and hierarchical routing protocol.The paper presents a few common progressive hierarchical routing protocols in detail and is investigated on their performance in network. Likewise, routing protocols share prominent role in terms of competence in WSN.Due to restrictions of resources in the sensors, it is difficult to plan an effective design of efficient routing protocol. The paper investigated Hierarchical based
Style APA, Harvard, Vancouver, ISO itp.
34

Rahul, Desai, P. Patil B, and Pal Sharma Davinder. "Routing Protocols for Mobile Ad Hoc Network: A Survey and Analysis." Indonesian Journal of Electrical Engineering and Computer Science 5, no. 1 (2017): 795–801. https://doi.org/10.11591/ijeecs.v7.i3.pp795-801.

Pełny tekst źródła
Streszczenie:
Ad hoc networks are mobile wireless networks where each node is acting as a router. The existing routing protocols such as Destination sequences distance vector, Optimized list state routing protocols, Ad hoc on demand routing protocol, Ad hoc on demand multipath routing protocol, Dynamic source routing are optimized versions of distance vector or link state routing protocols. In this paper, existing protocols such as DSDV, AODV, AOMDV, OLSR and DSR are analyzed on 50 nodes Mobile Ad Hoc network with random mobility. Packet delivery ratio, delay, control overhead and throughput parameters are
Style APA, Harvard, Vancouver, ISO itp.
35

Abdulhameed, N. Hameed, Abdulghani Alabady Salah, and A. Thanoon Mohammad. "Performance analysis and evaluation of distance vector and link state routing protocols over a large area networks." TELKOMNIKA (Telecommunication, Computing, Electronics and Control) 20, no. 6 (2022): 1189–99. https://doi.org/10.12928/telkomnika.v20i6.22211.

Pełny tekst źródła
Streszczenie:
Routing protocols are extremely important incredibly significant in data communication and computer networks. The high performance, reliability, stability, and security of the networks depend primarily on choosing the best type of dynamic routing protocol. In this paper, we evaluate and investigate the network performance for routing information protocol (RIP), enhanced interior gateway routing protocol (EIGRP), open shortest path first (OSPF), and intermediate system-to-intermediate system (IS-IS) routing protocols with three different scenarios of routes failure using the optimized network e
Style APA, Harvard, Vancouver, ISO itp.
36

Ahsan, Usama, Muhammad Mubashir Khan, Asad Arfeen, and Khadija Azam. "Security analysis of KXB10 QKD protocol with higher-dimensional quantum states." International Journal of Quantum Information 18, no. 08 (2020): 2150005. http://dx.doi.org/10.1142/s0219749921500052.

Pełny tekst źródła
Streszczenie:
Quantum key distribution (QKD) is one of the exciting applications of quantum mechanics. It allows the sharing of secret keys between two communicating parties with unconditional security. A variety of QKD protocols have been proposed since the inception of the BB84 protocol. Among different implementation techniques of QKD protocols, there is a category which exploits higher dimensions qubit states to encode classical bits. In this paper, we focus on such a QKD protocol called KXB10, which uses three bases with higher dimensions. Analysis of the generalized dimension quantum states is perform
Style APA, Harvard, Vancouver, ISO itp.
37

Maurya, Indubala, and Rakesh Garg. "Systematic review meta-analysis protocol preparation and registration – A narrative review." Indian Journal of Anaesthesia 69, no. 1 (2025): 132–37. https://doi.org/10.4103/ija.ija_1165_24.

Pełny tekst źródła
Streszczenie:
Systematic reviews and meta-analyses (SRMAs) help in decision making, especially on conflicting publication findings and quality. SRMA identifies the source of heterogeneity, reduces subjectivity and identifies and fills gaps in existing knowledge. However, conducting an SRMA requires a well-written protocol, which acts as a clear roadmap for the researcher and defines objectives, methods and expected outcomes. Predefined research questions and methods minimise bias, thus increasing the reliability of the results. The protocol ensures that the study team stays consistent in data collection, sy
Style APA, Harvard, Vancouver, ISO itp.
38

Sabeeruddin, Shaik. "Comparative Analysis of Network Security Controls in the Modern Era." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 8, no. 6 (2022): 1–7. https://doi.org/10.5281/zenodo.14866540.

Pełny tekst źródła
Streszczenie:
In the current Digital world, to protect Data and provide secure communication internally and externally, Network security Protocols like Transport Layer Security (TLS), Internet Security Protocol (IPsec), and Hypertext Transfer Protocol Secure (HTTPS) play a crucial role in maintaining Security. This Research paper analyses the comparison of these protocols and explains their Functions, Use cases, and Limitations. This case study provides insights and explains the importance of these protocols in maintaining Security and protecting confidentiality, Integrity, and Availability. By Evaluating e
Style APA, Harvard, Vancouver, ISO itp.
39

Zain, Alaa, Heba El-khobby, Hatem M. Abd Elkader, and Mostafa Abdelnaby. "MANETs performance analysis with dos attack at different routing protocols." International Journal of Engineering & Technology 4, no. 2 (2015): 390. http://dx.doi.org/10.14419/ijet.v4i2.4609.

Pełny tekst źródła
Streszczenie:
A Mobile Ad-Hoc Networks (MANET) is widely used in many industrial and people's life applications, such as earth monitoring, natural disaster prevention, agriculture biomedical related applications, and many other areas. Security threat is one of the major aspects of MANET, as it is one of the basic requirements of wireless sensor network, yet this problem has not been sufficiently explored. The main purpose of this paper is to study different MANETs routing protocols with three scenarios of Denial of Service (DoS) attacks on network layer using proactive routing protocol i.e. Optimized Link S
Style APA, Harvard, Vancouver, ISO itp.
40

Wang, Wei, and Qing Feng Cheng. "Analysis of Two ID-Based Key Exchange Protocols." Applied Mechanics and Materials 135-136 (October 2011): 289–93. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.289.

Pełny tekst źródła
Streszczenie:
In this paper, we analyze two ID-based authenticated key exchange (AKE) protocols in the eCK model. One is a two-party AKE protocol between members of distinct domains proposed by Xia et al. in 2009. The other is a dynamic group AKE protocol proposed by Xie et al. in 2010. The results of analysis show that both of them are insecure in the eCK model.
Style APA, Harvard, Vancouver, ISO itp.
41

Feng, Tao, and Yi Wu. "Formal Security Analysis and Improvement Based on LonTalk Authentication Protocol." Security and Communication Networks 2022 (July 12, 2022): 1–19. http://dx.doi.org/10.1155/2022/8104884.

Pełny tekst źródła
Streszczenie:
Security analysis of security protocol can be used to ensure communication security in the network. The process of security protocol analysis using the formal analysis method is simple and standardized, which is a research hotspot in the field of information security. In this study, a formal analysis method based on colored Petri net theory and Dolev-Yao attacker model is adopted to analyze LonTalk authentication protocol, and three types of attackable vulnerabilities including replay, tamper, and spoofing are found in LonTalk authentication protocol; thus, a secure LonTalk-SA authentication p
Style APA, Harvard, Vancouver, ISO itp.
42

Flinn, Barry, Savanah Dale, Andrew Disharoon, and Stephen Kresovich. "Comparative Analysis of In Vitro Responses and Regeneration between Diverse Bioenergy Sorghum Genotypes." Plants 9, no. 2 (2020): 248. http://dx.doi.org/10.3390/plants9020248.

Pełny tekst źródła
Streszczenie:
Sorghum has been considered a recalcitrant plant in vitro and suffers from a lack of regeneration protocols that function broadly and efficiently across a range of genotypes. This study was initiated to identify differential genotype-in vitro protocol responses across a range of bioenergy sorghum parental lines and the common grain sorghum genotype Tx430 in order to characterize response profiles for use in future genetic studies. Two different in vitro protocols, LG and WU, were used for comparisons. Distinct genotype-protocol responses were observed, and the WU protocol performed significant
Style APA, Harvard, Vancouver, ISO itp.
43

Shaefer, Jeffry R., Cara Joy Riley, Paul Caruso, and David Keith. "Analysis of Criteria for MRI Diagnosis of TMJ Disc Displacement and Arthralgia." International Journal of Dentistry 2012 (2012): 1–8. http://dx.doi.org/10.1155/2012/283163.

Pełny tekst źródła
Streszczenie:
Aims. To improve diagnostic criteria for TMJ disc displacement (DD).Methods. The standard protocol for MRI diagnosis of DD, using a 12 o’clock reference position, was compared to an alternative protocol. The alternative protocol involves the functional relationship between the condyle and articular eminence, using a line perpendicular to the posterior slope of the eminence as a reference for disc position. The disc location was examined using both protocols, and disc diagnoses were compared in their relationship with joint pain. Statistical analyses includedPvalue, sensitivity, specificity, od
Style APA, Harvard, Vancouver, ISO itp.
44

Feng, Tao, Taining Chen, and Xiang Gong. "Formal Security Analysis of ISA100.11a Standard Protocol Based on Colored Petri Net Tool." Information 15, no. 2 (2024): 118. http://dx.doi.org/10.3390/info15020118.

Pełny tekst źródła
Streszczenie:
This paper presents a formal security analysis of the ISA100.11a standard protocol using the Colored Petri Net (CPN) modeling approach. Firstly, we establish a security threat model for the ISA100.11a protocol and provide a detailed description and analysis of the identified security threats. Secondly, we use the CPN tool to model the protocol formally and conduct model checking and security analysis. Finally, we analyze and discuss the results of the model checking, which demonstrate that the ISA100.11a standard protocol may have vulnerabilities when certain security threats exist, and provid
Style APA, Harvard, Vancouver, ISO itp.
45

Kaur, Arshdeep, Sandeep Kumar Arora, and Mahedi Masud. "Comparative Analysis of Clustering using AODV DSDV and CBRP." International Journal of Engineering & Technology 7, no. 3.8 (2018): 131. http://dx.doi.org/10.14419/ijet.v7i3.8.16847.

Pełny tekst źródła
Streszczenie:
In a network whether wireless or wired, a set of protocols which are used to distribute the information through various routes between the nodes are said to be the routing protocols which serves as a majorly vital part of the computer networks. They specify the particular and specific path of information exchange by the sending and receiving of packets. Vehicular ad- hoc networks are quite emerging technologies of today’s era presenting the provision of seamless and uninterrupted communication in the network of mobile nodes in dynamic environment. Routing itself proves to be quite a considerab
Style APA, Harvard, Vancouver, ISO itp.
46

Desai, Rahul M., B. P. Patil, and Davinder Pal Sharma. "Routing Protocols for Mobile Ad Hoc Network - A Survey and Analysis." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 3 (2017): 795. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp795-801.

Pełny tekst źródła
Streszczenie:
&lt;p class="Default"&gt;Ad hoc networks are mobile wireless networks where each node is acting as a router. The existing routing protocols such as Destination sequences distance vector, Optimized list state routing protocols, Ad hoc on demand routing protocol, Ad hoc on demand multipath routing protocol, Dynamic source routing are optimized versions of distance vector or link state routing protocols. In this paper, existing protocols such as DSDV, AODV, AOMDV, OLSR and DSR are analyzed on 50 nodes Mobile Ad Hoc network with random mobility. Packet delivery ratio, delay, control overhead and t
Style APA, Harvard, Vancouver, ISO itp.
47

Wang, Qun, Zhonghao Sun, Zhangquan Wang, et al. "A Practical Format and Semantic Reverse Analysis Approach for Industrial Control Protocols." Security and Communication Networks 2021 (March 12, 2021): 1–11. http://dx.doi.org/10.1155/2021/6690988.

Pełny tekst źródła
Streszczenie:
Industrial control protocol is the basis of communication and interaction of industrial control system, and its security is related to the whole industrial infrastructure. Because many industrial control systems use proprietary protocols, it is necessary to adopt protocol reverse analysis technology to parse them and then detect whether there are secure vulnerabilities in the protocols by means of fuzzy testing. However, most of the existing technologies are designed for common network protocols, and there is no improvement for industrial control protocol. Therefore, we propose a multistage en
Style APA, Harvard, Vancouver, ISO itp.
48

Karanasiou, A., E. Diapouli, M. Viana, et al. "On the quantification of atmospheric carbonate carbon by thermal/optical analysis protocols." Atmospheric Measurement Techniques Discussions 3, no. 6 (2010): 5375–409. http://dx.doi.org/10.5194/amtd-3-5375-2010.

Pełny tekst źródła
Streszczenie:
Abstract. Carbonaceous species, usually classified into two categories, organic carbon (OC) and elemental carbon (EC), constitute an important component of the atmospheric aerosol. Carbonate carbon (CC), or inorganic carbon, another constituent of carbonaceous material, is often not considered in many atmospheric chemistry studies. The reason for this may be its low contribution to fine particle mass in most areas studied, along with the difficulties in its analytical determination in atmospheric aerosols. The objective of this study was the quantification of atmospheric carbonate concentratio
Style APA, Harvard, Vancouver, ISO itp.
49

Song, Daegene. "Numerical Analysis in Entanglement Swapping Protocols." NeuroQuantology 20, no. 2 (2022): 153–57. http://dx.doi.org/10.14704/nq.2022.20.2.nq22083.

Pełny tekst źródła
Streszczenie:
Entanglement has recently been one of the most essential elements in the development of various quantum technologies. In fact, a swapping protocol was introduced to create a long-distance entanglement from multiple shorter ones. Extending the previous work, this paper provides a more detailed numerical analysis to help create long-distance entanglement out of the two non-maximal three-level states. Specifically, it shows that while the protocol does not always yield optimal results, namely, the weaker link, there is a substantial number of states that yield an optimal result. Moreover, we disc
Style APA, Harvard, Vancouver, ISO itp.
50

K.Thamizhmaran. "Optimization Link Sate Routing Analysis with Destination Sequenced Distance Vector for MANET." Journal of Research in Electrical Power System 1, no. 1 (2025): 31–37. https://doi.org/10.5281/zenodo.15210274.

Pełny tekst źródła
Streszczenie:
<em>Every node functions as a router, finding and maintaining routes to other nodes in the network to let them know about their benefits. However, security, energy, and transmission are still disadvantages.&nbsp; In a mobile setting, routing is handled via a variety of protocols.&nbsp; Routing protocol performance is a critical issue due to its extremely dynamic nature.&nbsp; The two well-known protocols that will be the subject of this study are the Optimized Link State Routing (OLSR) and Destination Sequenced Distance Vector (DSDV) protocols. When the routing protocols are built using NS2.34
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!