Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Design of protocols.

Zeitschriftenartikel zum Thema „Design of protocols“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Design of protocols" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Yao, Wenbing, Sheng-Uei Guan, Zhiqiang Jiang und Ilias Kiourktsidis. „Self-Evolvable Protocol Design Using Genetic Algorithms“. International Journal of Applied Evolutionary Computation 1, Nr. 1 (Januar 2010): 36–56. http://dx.doi.org/10.4018/jaec.2010010103.

Der volle Inhalt der Quelle
Annotation:
Self-modifying protocols (SMP) are protocols that can be modified at run time by the computers using them. Such protocols can be modified at run time so that they can adapt to the changing communicating environment and user requirements on the fly. Evolvable protocols are SMP designed using Genetic Algorithms (GA). The purpose of this paper is to apply Genetic Algorithms (GA) to design an evolvable protocol in order to equip communication peers with more autonomy and intelligence. The next-generation Internet will benefit from the concept of evolvable protocols. In this paper, we design a Self Evolvable Transaction Protocol (SETP) with a GA executor embedded. We then use the Network Simulator (NS2) to evaluate this evolvable protocol module to demonstrate the feasibility of our new design approach.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Yu, Song Sen, Yun Peng und Jia Jing Zhang. „A Lightweight RFID Mechanism Design“. Advanced Materials Research 216 (März 2011): 120–23. http://dx.doi.org/10.4028/www.scientific.net/amr.216.120.

Der volle Inhalt der Quelle
Annotation:
Based on the study of existing RFID security protocols and RFID anti-collision algorithms, this paper proposes a processing mechanism integrating lightweight random key double-authentication and dynamic slot-ALOHA protocol. The mechanism is simple, practical, and compatible with EPC Gen2 standards. Research shows that comparing with the other security protocols and anti-collision protocols, the new mechanism has a little complexity and tag-cost.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Turilli, Matteo. „Ethical protocols design“. Ethics and Information Technology 9, Nr. 1 (08.02.2007): 49–62. http://dx.doi.org/10.1007/s10676-006-9128-9.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Song, Jiali, Zhiwei Rong, Xinwen Zhong, Yuhong Lu, Jike Huang, Yipei Yu, Zhilin Liu et al. „Practice and Consideration of Master Protocol in Clinical Trials“. Tumor Discovery 2, Nr. 2 (28.04.2023): 342. http://dx.doi.org/10.36922/td.342.

Der volle Inhalt der Quelle
Annotation:
There is great interest in accelerating late-stage therapy development by efficiently performing a trial design with multiple therapies or multiple subpopulations simultaneously under a single protocol. The master protocols are termed to describe the design of such trials, with a variety of terms such as umbrella, basket, or platform describing specific designs, which are, in contrast to the traditional trial designs, full of complexity. What should we consider in designing a trial ensuring the safety of human subjects and demonstrating the efficacy of new therapy? This paper overviews the master protocol framework, comprehensively unifies the definitions and illustrates essential design elements of representative example trials conducted in drugs and medical devices. Besides, to understand the master protocols deeply, it is also a need to summarize the commonly-used types of master protocols in various disease and treatment fields, along with the reasons for these phenomena by analyzing the characteristics of the diseases, the mechanism of therapeutic products, and the principles of various types of master protocols. Finally, we also propose practical considerations, including the design, ethical, statistics, and funding considerations that arise from implementing complex master protocols to help practitioners better design and identify potential valuable therapies.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Nguyen, Philon, Thanh An Nguyen und Yong Zeng. „Segmentation of design protocol using EEG“. Artificial Intelligence for Engineering Design, Analysis and Manufacturing 33, Nr. 1 (03.04.2018): 11–23. http://dx.doi.org/10.1017/s0890060417000622.

Der volle Inhalt der Quelle
Annotation:
AbstractDesign protocol data analysis methods form a well-known set of techniques used by design researchers to further understand the conceptual design process. Verbal protocols are a popular technique used to analyze design activities. However, verbal protocols are known to have some limitations. A recurring problem in design protocol analysis is to segment and code protocol data into logical and semantic units. This is usually a manual step and little work has been done on fully automated segmentation techniques. Physiological signals such as electroencephalograms (EEG) can provide assistance in solving this problem. Such problems are typical inverse problems that occur in the line of research. A thought process needs to be reconstructed from its output, an EEG signal. We propose an EEG-based method for design protocol coding and segmentation. We provide experimental validation of our methods and compare manual segmentation by domain experts to algorithmic segmentation using EEG. The best performing automated segmentation method (when manual segmentation is the baseline) is found to have an average deviation from manual segmentations of 2 s. Furthermore, EEG-based segmentation can identify cognitive structures that simple observation of design protocols cannot. EEG-based segmentation does not replace complex domain expert segmentation but rather complements it. Techniques such as verbal protocols are known to fail in some circumstances. EEG-based segmentation has the added feature that it is fully automated and can be readily integrated in engineering systems and subsystems. It is effectively a window into the mind.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

He, Jiayue, Jennifer Rexford und Mung Chiang. „Don't optimize existing protocols, design optimizable protocols“. ACM SIGCOMM Computer Communication Review 37, Nr. 3 (20.07.2007): 53–58. http://dx.doi.org/10.1145/1273445.1273452.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

N, Hemanthraju. „A Review on Design Implementation and Verification of AMBA AXI- 4 lite Protocol for SoC Integration“. International Journal for Research in Applied Science and Engineering Technology 10, Nr. 6 (30.06.2022): 2321–26. http://dx.doi.org/10.22214/ijraset.2022.44313.

Der volle Inhalt der Quelle
Annotation:
Abstract: The present modern bus protocols used for communication between different functional blocks on a System-on-Chip (Soc) designs face many different challenges among which complexity and communication management are the most important factors. These on-chip communications directly impact performance and functionality, hence depending on the application where the bus protocol is to be used, a perfect communication protocol is chosen. AMBA (Advanced Microcontroller Bus Architecture) provides various types of protocols to be used as IP, of which AXI4 (Advance Extensible Interface), is one of the widely used protocols for SoC designs. Out of its three different interconnect protocols: lite, stream and burst, AXI4-lite has the simplest architecture design that best suits to be used in applications where power, area and performance play a vital role. This paper briefs about using AMBA AXI4-lite bus protocol with more bus efficiency and performance in an SoC design for proper communication between various functional blocks present. The RTL is verified using UVM (Universal Verification Methodology) and various designing process is carried out using cadence tools.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Sari, Riri Fitri, Lukman Rosyidi, Bambang Susilo und Muhamad Asvial. „A Comprehensive Review on Network Protocol Design for Autonomic Internet of Things“. Information 12, Nr. 8 (22.07.2021): 292. http://dx.doi.org/10.3390/info12080292.

Der volle Inhalt der Quelle
Annotation:
The autonomic Internet of Things is the creation of self-management capability in the Internet of Things system by embedding some autonomic properties, with the goal of freeing humans from all detail of the operation and management of the system. At same time, this provides a system to always operate on the best performance. This paper presents a review of the recent studies related to the design of network communication protocol, which can support autonomic Internet of Things. Many of the studies come from the research and development in Wireless Sensor Network protocols, as it becomes one of the key technologies for the Internet of Things. The identified autonomic properties are self-organization, self-optimization, and self-protection. We review some protocols with the objective of energy consumption reduction and energy harvesting awareness, as it can support the self-energy-awareness property. As the result, the protocol designs are mapped according to each autonomic property supported, including protocols for MAC layer, protocols for clustering, protocols for routing, and protocols for security. This can be used to map the advances of communication protocol research for the autonomic Internet of Things and to identify the opportunities for future research.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Alfouzan, Faisal Abdulaziz. „Energy-Efficient Collision Avoidance MAC Protocols for Underwater Sensor Networks: Survey and Challenges“. Journal of Marine Science and Engineering 9, Nr. 7 (04.07.2021): 741. http://dx.doi.org/10.3390/jmse9070741.

Der volle Inhalt der Quelle
Annotation:
The Medium Access Control (MAC) layer protocol is the most important part of any network, and is considered to be a fundamental protocol that aids in enhancing the performance of networks and communications. However, the MAC protocol’s design for underwater sensor networks (UWSNs) has introduced various challenges. This is due to long underwater acoustic propagation delay, high mobility, low available bandwidth, and high error probability. These unique acoustic channel characteristics make contention-based MAC protocols significantly more expensive than other protocol contentions. Therefore, re-transmission and collisions should effectively be managed at the MAC layer to decrease the energy cost and to enhance the network’s throughput. Consequently, handshake-based and random access-based MAC protocols do not perform as efficiently as their achieved performance in terrestrial networks. To tackle this complicated problem, this paper surveys the current collision-free MAC protocols proposed in the literature for UWSNs. We first review the unique characteristic of underwater sensor networks and its negative impact on the MAC layer. It is then followed by a discussion about the problem definition, challenges, and features associated with the design of MAC protocols in UWANs. Afterwards, currently available collision-free MAC design strategies in UWSNs are classified and investigated. The advantages and disadvantages of each design strategy along with the recent advances are then presented. Finally, we present a qualitative comparison of these strategies and also discuss some possible future directions.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Hayam A. Al-Yasiri und Nyan D. Sallman. „Design and Implementation of Mobile Computing Simulator“. Diyala Journal of Engineering Sciences 7, Nr. 4 (01.12.2014): 1–23. http://dx.doi.org/10.24237/djes.2014.07401.

Der volle Inhalt der Quelle
Annotation:
The Rapid progress in communications and wireless technology, especially in mobile computing, resulted in wide area of development in design, control and simulation of protocols that manage the wireless network. In this paper, a software simulator package has been designed, implemented and analyzed to simulate Internet Mobile Host Protocol (IMHP), Multicast Routing Protocol (MRP) and Handoff operation, which feature both route optimization and integrated authentication of all management packets.The simulator coverage area includes three extendable subnets (LANs) with ten mobile hosts moving either randomly or manually over the network. The moving hosts have the ability of entering or leaving the network at any time. The designed simulator simulates all the predicted events that practically associated with mobile computing operation. In addition, the simulator stands for other events such as the rebooting or crashing in the network elements.The simulated protocols are tested in terms of the speed of implementation, which computed throughout the designed simulator operation for both IMHP and MRP protocols. Also the effect of Handoff process on the mobile protocols implementation has been tested. The obtained results showed that the short cut route exhibits the fastest speed of implementation. Visual Basic programming language has been used in the design of this simulator.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Wytrębowicz, Jacek, Krzysztof Cabaj und Jerzy Krawiec. „Messaging Protocols for IoT Systems—A Pragmatic Comparison“. Sensors 21, Nr. 20 (18.10.2021): 6904. http://dx.doi.org/10.3390/s21206904.

Der volle Inhalt der Quelle
Annotation:
There are a dozen messaging protocols proposed for IoT systems. Choosing one for a new design is complicated, and a non-optimal selection can result in slower development and higher design costs. This paper aims to help select appropriate protocols, considering IoT applications’ specificity and communication requirements. We have identified the protocol features that are significant for the design and operation of IoT systems. This paper gives a substantial comparison of the protocols using the features and is based on a thorough analysis of the protocol specifications. The results contain an assessment of the suitability of the protocols for the defined types of IoT devices and the identified communication purposes. We conclude the comparison with some recommendations of the protocol selection and usage.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Syahputra, Ramdhani, Rahmadi Kurnia und Rian Ferdian. „Analysis of FHRP Design and Implementation in RIPv2 and OSPF Routing Protocols“. Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 4, Nr. 1 (08.02.2020): 102–8. http://dx.doi.org/10.29207/resti.v4i1.1490.

Der volle Inhalt der Quelle
Annotation:
The high reliability of data access has become a problem faced by many companies, institutions, and universities. For this reason, a protocol required that can protect the network from a communication breakdown. One method used to maintain communication is by implementing a protocol redundancy system. One or more routers will act as the primary router for load balancing, and some routers are in standby mode if one main router is down. First hop redundancy protocols (FHRP) is a protocol that implements redundancy and load balancing systems. This protocol can transfer access data traffic if one of the routers on the network is down. FHRP divided into virtual router redundancy protocol (VRRP) and gateway load balancing Protocol (GLBP). This research analyzes the design and implementation to provide information about the quality of VRRP and GLBP services on the main router and the backup router, by using an application graphical network simulator (GNS) simulation 3. In the GNS3 application, a LAN network topology is designed with eight router devices in the form of a ring topology using RIPv2 and OSPF routing protocols, then implemented in protocols VRRP and GLBP. The analysis results show that GLBP can back up the network faster than VRRP when the primary router is down. If implemented into a LAN network with RIPv2 and OSPF routing protocols, VRRP has better service quality than GLBP.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Choi, Sangil, Wooksik Lee, Teukseob Song und Jong-Hoon Youn. „Block Design-Based Asynchronous Neighbor Discovery Protocol for Wireless Sensor Networks“. Journal of Sensors 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/951652.

Der volle Inhalt der Quelle
Annotation:
Neighbor discovery is a significant research topic in wireless sensor networks. After wireless sensor devices are deployed in specific areas, they attempt to determine neighbors within their communication range. This paper proposes a new Block design-based Asynchronous Neighbor Discovery protocol for sensor networks calledBAND. We borrow the concept of combinatorial block designs for neighbor discovery. First, we summarize a practical challenge and difficulty of using the original block designs. To address this challenge, we create a new block generation technique for neighbor discovery schedules and provide a mathematical proof of the proposed concept. A key aspect of the proposed protocol is that it combines two block designs in order to construct a new block for neighbor discovery. We analyze the worst-case neighbor discovery latency numerically between our protocol and some well-known protocols in the literature. Our protocol reveals that the worst-case latency is much lower than others. Finally, we evaluate the performance ofBANDand existing representative protocols through the simulation study. The results of our simulation study show that the average and maximum latency ofBANDis about 40% lower than that of existing protocols. Furthermore,BANDspends approximately 30% less energy than others during the neighbor discovery process.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Zhang, Kai Lin, Da Hua Li, Shu Chen Shi, Xue Song Yang, Zhen Xiao und Qiang Gao. „Design and Implementation of Multi-Protocol Self-Adaptation Gateway“. Applied Mechanics and Materials 687-691 (November 2014): 2108–11. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2108.

Der volle Inhalt der Quelle
Annotation:
For the four kinds of network protocols which are common in industry :PROFIBUS-DP, DeviceNet, EtherNet/IP and Modbus-RTU, a gateway has been designed which could integrate the four protocols ,and have developed hardware and software program of the Multi-protocol self-adaptation gateway .It uses STM32F407ZGT6 as its major chip. A Modbus-RTU interface has been designed which depends on the UART interface of the main chip to send and receive packets in hardware. It use COMX as hardware interface of PROFIBUS-DP ,DeviceNet ,and EtherNet/IP to process their packets. It has achieved a function that the PROFIBUS-DP interface will change its address with the changing of the configuration of master .In addition, the multi-protocol self-adaptation gateway can integrate several masters which support different protocols in one network. The master controllers could communicate with each other in this network.After being tested and verified ,it has been used in the communication of DCS systems, and it has converted the packets of the four protocols which have been mentioned above and it has met the demands of designing a gateway.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Ideguchi, Tetsuo, Yuuji Koui, Nonmember, Mitsuru Tsuchida, Yukio Ushisako, Nonmember und Michihiro Ishizaka. „Design and implementation of protocol conversion equipment for layered protocols“. Electronics and Communications in Japan (Part I: Communications) 73, Nr. 3 (März 1990): 14–23. http://dx.doi.org/10.1002/ecja.4410730302.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Ko, Hoo Sang, und Shimon Y. Nof. „Design of Protocols for Task Administration in Collaborative Production Systems“. International Journal of Computers Communications & Control 5, Nr. 1 (01.03.2010): 91. http://dx.doi.org/10.15837/ijccc.2010.1.2466.

Der volle Inhalt der Quelle
Annotation:
Customer-focused and concurrent engineering service systems process tasks more effectively as a result of the power of collaboration among multiple participants. In such environments, however, complex situations might arise that require decisions beyond simple coordination.Task Administration Protocols (TAPs) are designed as a control mechanism to manage complex situations in collaborative task environments. This article presents the design of TAPs for collaborative production systems in which tasks are performed by the collaboration of multiple agents. Three component protocols are found to constitute TAPs and are triggered at appropriate stages in task administration: 1) Task Requirement Analysis Protocol, 2) Shared Resource Allocation Protocol, and 3) Synchronization & Time-Out Protocol. A case study with TAPs metrics for task allocation in a collaborative production system is investigated to compare performance under TAPs, and under a non-TAP coordination protocol (which is considered to be simpler). In terms of task allocation ratio, the case study indicates that performance under TAPs is significantly better (up to 10.6%) than under the non-TAP coordination protocol, especially under medium or high load conditions. The advantage of TAPs can be explained by their design with relatively higher level of collaborative intelligence, addressing more complex control logic compared with non-TAP coordination protocols.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Chen, Zhi, Ya Peng und Wenjing Yue. „Model-Checking Driven Design of QoS-Based Routing Protocol for Wireless Sensor Networks“. Journal of Sensors 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/716561.

Der volle Inhalt der Quelle
Annotation:
Accurate and reliable routing protocols with Quality of Service (QoS) support determine the mission-critical application efficiency in WSNs. This paper proposes a model-checking design driven framework for designing the QoS-based routing protocols of WSNs, which involves the light-weight design process, the timed automata model, and the alternative QoS verification properties. The accurate feedback of continually model checking in the iterative design process effectively stimulates the parameter tuning of the protocols. We demonstrate the straightforward and modular characteristics of the proposed framework in designing a prototype QoS-based routing protocol. The prototype study shows that the model-checking design framework may complement other design methods and ensure the QoS implementation of the QoS-based routing protocol design for WSNs.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Chuang, Yun-Hsin, Chin-Laung Lei und Hung-Jr Shiu. „How to Design a Secure Anonymous Authentication and Key Agreement Protocol for Multi-Server Environments and Prove Its Security“. Symmetry 13, Nr. 9 (04.09.2021): 1629. http://dx.doi.org/10.3390/sym13091629.

Der volle Inhalt der Quelle
Annotation:
An anonymous authentication and key agreement (AAKA) protocol provides anonymous members symmetric authentication and establishes a symmetric session key for secure communication in public networks. Today, numerous popular remote services are based on multi-server architecture, such as the internet of things (IoT), smart cities, cloud services, vehicular ad hoc networks (VANET), and telecare medicine information systems (TMIS). Many researchers have attempted to design AAKA protocols in multi-server environments for various applications. However, many of these have security defects, even if they have so-called “formal” security proofs. In this paper, we analyze related AAKA protocols to identify the common design defects, expound the process of designing secure AAKA protocols, and explain why the present AAKA protocols still suffer attacks, despite having security proofs. We instruct readers on how to design a secure AAKA protocol and how to prove the security. This paper will therefore be helpful for the design of new AAKA protocols, and for ensuring their security.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Qiao, Chengzhen, Yanzhi Qiu, Chunhui Yang und Shaozhe Zhang. „Design and Implementation of EMU On-board Data Protocol Management System“. Journal of Physics: Conference Series 2356, Nr. 1 (01.10.2022): 012022. http://dx.doi.org/10.1088/1742-6596/2356/1/012022.

Der volle Inhalt der Quelle
Annotation:
In view of the problems of various types, frequent upgrades and inconsistent standards of WTDS on-board protocols and fault dictionaries of EMU, sort out various on-board protocol documents and fault dictionaries of EMU on the whole railway. Analyse the differences of various on-board protocols and fault dictionaries of multiple units of different vehicle types and batches, and study the unified and standardized management method. Design a EMU on-board data protocol management system with complete business functions, standard specifications, safety and reliability, and realize the functions of structuring the content of the protocol file, version of the protocol file, process management, etc., so as to provide data support for EMU data mining and PHM application.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Deepak Malik und Dr. Bijendra Singh. „Optimizing OSPF Cost Value for Best Path Selection Using Metric-Type Variation“. International Research Journal on Advanced Engineering Hub (IRJAEH) 2, Nr. 06 (25.06.2024): 1845–54. http://dx.doi.org/10.47392/irjaeh.2024.0254.

Der volle Inhalt der Quelle
Annotation:
Open Shortest Path First (OSPF) is a multi-vendor routing standard. Any routing protocol's goal is to discover the optimum path between source and destination addresses inside a computer network. Other routing protocols include Routing Information Protocol (RIP), Border Gateway Protocol (BGP), Enhanced Interior Gateway Routing Protocol (EIGRP), and IS-IS. which are also used in computer networking. Each routing protocol has different set of rules through which they calculate the best path selection. OSPF is often used with the combination of these routing protocol because of its flexible design. This research focuses on the implementation of OSPF network cost (metric) value for best path calculation using network simulation tool like GNS3 for getting correct outcome just like a real networking device working in a live production environment. This research would use the different combinations of OSPF cost calculation using metric-types for external routes learned from different routing protocols like RIP. Being able to accurately identify cost (metric) values obtain by testing for OSPF when used with other routing protocols, just like a real-world environment.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Liu, Wei Dong, Xiang Yu Li und Li'e Gao. „Design of a Gateway for Remotely Underwater Vehicles“. Applied Mechanics and Materials 209-211 (Oktober 2012): 2138–41. http://dx.doi.org/10.4028/www.scientific.net/amm.209-211.2138.

Der volle Inhalt der Quelle
Annotation:
A gateway based on ARM is presented to achieve mutil-protocol conversion among different electronic control units. To guarantee its real-time ability and stability, the μC/OS-II embedded operation system was adopted. The first-in-first-out data queue is used to balance the communication rate among the different communication protocols which consist of the Controller Area Network, TCP/IP and RS-232. The gateway can be used in remotely manipulation between the console with Ethernet and remote underwater vehicle with other serial communication protocols.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Hope, Emily S., Ben Filewod, Daniel W. McKenney und Tony C. Lemprière. „A financial analysis of four carbon offset accounting protocols for a representative afforestation project (southern Ontario, Canada)“. Canadian Journal of Forest Research 51, Nr. 7 (Juli 2021): 1015–28. http://dx.doi.org/10.1139/cjfr-2020-0183.

Der volle Inhalt der Quelle
Annotation:
Forestry projects participate in carbon markets by sequestering carbon dioxide equivalent (CO2e) and producing carbon offsets. The creation of forest-based offsets is guided by protocols that dictate how sequestered CO2e is converted into marketable offsets. Existing protocol designs aim to produce offsets that meet sustainability requirements, while providing financial incentives for landowner participation. However, limited Canadian uptake implies that current financial incentives are insufficient to encourage the production of carbon offsets via private landowners. Here we consider various design features of four protocols and their financial implications for an illustrative afforestation project in southern Ontario, Canada. We explore the protocols (two tonne–tonne protocols and two tonne–year protocols) under two afforestation project management systems (“no-harvest” and “harvest” management scenarios). Results indicate that a project that terminates in a harvest is not economically attractive at current CO2e prices under any protocol design at a scale likely to be undertaken in southern Ontario, Canada. Projects that do not conclude in harvest are generally more attractive. Tonne–tonne protocols that pay upfront for sequestered CO2e improve the economic attractiveness of afforestation projects, but the delayed realization of the value of offset credits under tonne–year protocols reduces the economic attractiveness of these projects. We discuss these results in light of the choices facing afforestation project proponents and offset protocol designers (including governments) in general, and provide detailed insights into the financial dynamics of the Canadian case.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Liu, Dong, und Huilin Cai. „Design of multi-protocol conversion module“. Journal of Physics: Conference Series 2303, Nr. 1 (01.07.2022): 012059. http://dx.doi.org/10.1088/1742-6596/2303/1/012059.

Der volle Inhalt der Quelle
Annotation:
Abstract In view of the communication difficulties of CNC machine tools with only RS232 and RS485 interfaces in industry, this paper studies DNC technology and multi-protocol conversion technology, proposes to use CAN bus to build DNC system, establish multi-protocol conversion module communication model, and build software and hardware platform based on STM32F103VCT6 MCU. The CAN bus protocol, RS232 bus protocol and RS485 bus protocol CAN be converted to each other. The experimental results verify the accuracy and reliability of the multi-protocol conversion module, realize the two-way transmission of data, and solve the problem of communication difficulties between different protocols.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Oh, Soo-Yeon, Yong-Joon Lee und Sung-Ho Hwang. „Design and Implementation of IoT Gateway with MQTT and IEC 61850 MMS Protocol“. International Journal of Membrane Science and Technology 10, Nr. 1 (22.06.2023): 64–71. http://dx.doi.org/10.15379/ijmst.v10i1.1430.

Der volle Inhalt der Quelle
Annotation:
With microgrids deployed in multiple areas, communication technologies that control devices and collect data play an important role. Microgrid environments are similar to the internet of things (IoT) environment, where multiple devices exchange information. Recent studies have attempted to utilize IoT protocols as communication protocols for microgrids. Studies have also begun on interworking IoT protocols with IEC 61850, an existing protocol for power utility. In this study, we designed an IoT gateway that maps message queuing telemetry transport (MQTT), an IoT protocol, to the IEC 61850 data model. We built a testbed and performed a verification using TShark to verify that MQTT and IEC 61850 MMS traffic are properly generated and mapped by the IoT gateway. We also used IEEE 1588 to perform time synchronization between Raspberry Pi units, which are IoT devices. Performance analysis was conducted by measuring the mean transfer time of the MQTT and IEC 61850 MMS traffic for various Ethernet speeds and Wi-Fi protocols.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Amin, Md Ruhul, Md Shohrab Hossain und Mohammed Atiquzzaman. „In-Band Full Duplex Wireless LANs: Medium Access Control Protocols, Design Issues and Their Challenges“. Information 11, Nr. 4 (16.04.2020): 216. http://dx.doi.org/10.3390/info11040216.

Der volle Inhalt der Quelle
Annotation:
In-band full duplex wireless medium access control (MAC) protocol is essential in order to enable higher layers of the protocol stack to exploit the maximum benefits from physical layer full duplex technology. Unlike half duplex wireless local area network, a full duplex MAC protocol has to deal with several unique issues and challenges that arise because of the dynamic nature of the wireless environment. In this paper, we have discussed several existing full duplex MAC protocols and have shown qualitative comparisons among these full duplex MAC protocols. Full duplex in-band wireless communication has the potential to double the capacity of wireless network. Inter-client Interference (ICI) is a hindrance in achieving double spectral efficiency of the in-band full-duplex wireless medium. In this paper, we have classified existing solutions to the ICI problem and compared the solutions with respect to the proposed approaches, their advantages and disadvantages.We have also identified and discussed several issues and challenges of designing a full duplex MAC protocol. Results of qualitative comparisons of various wireless full duplex MAC protocols may be applied to design new protocols as well as researchers may find the identified issues and challenges helpful to solve various problems of a full duplex MAC protocol.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Hao, Chen, John A. Clark und Jeremy L. Jacob. „Automated Design of Security Protocols“. Computational Intelligence 20, Nr. 3 (August 2004): 503–16. http://dx.doi.org/10.1111/j.0824-7935.2004.00249.x.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Ramarao, K. V. S. „Design of transaction commitment protocols“. Information Sciences 55, Nr. 1-3 (Juni 1991): 129–49. http://dx.doi.org/10.1016/0020-0255(91)90010-r.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Bunch, David S., David M. Rocke und Robert O. Harrison. „Statistical design of ELISA protocols“. Journal of Immunological Methods 132, Nr. 2 (September 1990): 247–54. http://dx.doi.org/10.1016/0022-1759(90)90036-u.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Kozak, P., und W. M. Wonham. „Design of transaction management protocols“. IEEE Transactions on Automatic Control 41, Nr. 9 (1996): 1330–35. http://dx.doi.org/10.1109/9.536503.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Gong, Wen Tao. „The Design of Multi-Protocol Network Based on Point-to-Point Protocol and Frame Relay“. Advanced Materials Research 936 (Juni 2014): 2293–97. http://dx.doi.org/10.4028/www.scientific.net/amr.936.2293.

Der volle Inhalt der Quelle
Annotation:
Local area network and wide area network are different network protocols, small and medium enterprises due to the geographical distribution of discrete and interface diversity, leading to its needs to be compatible with different network protocols, it is difficult to use a single network protocol to realize network architecture, and due to the ipv4 address scarcity, making its application or maintenance cost greatly increased, based on this, this paper presents the design of multi-protocol network architecture based on point-to-point protocol and frame relay, and with the advantages of the router is compatible with a variety of interfaces and protocols to connect different network interfaces, the paper also gives the configuration of routing information protocol and static routing through local area network, the paper presents the core information of frame relay and point-to-point protocol among the routers, and the paper gives the realization of the network address translation in the end.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Tsuneizumi, Isamu, Ailixier Aikebaier, Makoto Ikeda, Tomoya Enokido und Makoto Takizawa. „Design and Implementation of Hybrid Time (HT) Group Communication Protocol for Homogeneous Broadcast Groups“. International Journal of Distributed Systems and Technologies 2, Nr. 3 (Juli 2011): 37–48. http://dx.doi.org/10.4018/jdst.2011070103.

Der volle Inhalt der Quelle
Annotation:
To realize the cooperation of a group of multiple peer processes (peers), messages sent by peers must be causally delivered to every peer. In a scalable group, it is necessary to reduce the communication overhead to causally deliver messages. In this paper, the authors take advantage of the linear time (LT) and physical time (PT) protocols, as the message length is O(n) for the number n of peers. However, some pairs are unnecessarily ordered, that is, even if a pair of messages is ordered in the protocols, the messages may not be causally ordered. The greater the number of messages that are unnecessarily ordered, the larger the overhead is implied since the messages must be kept in a receipt queue if a message is lost or delayed. This paper discusses a hybrid time group communication (HT) protocol that reduces the number of messages unnecessarily ordered. The HT protocol is evaluated in terms of the number of unnecessarily ordered messages compared with the PT and LT protocols. It is demonstrated that the number of unnecessarily ordered messages can be reduced in the HT protocol compared with the LT and PT protocols.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Kristić, Ante, Julije Ožegović und Ivan Kedžo. „Design and Modeling of Self-Adapting MAC (SaMAC) Protocol with Inconstant Contention Loss Probabilities“. Wireless Communications and Mobile Computing 2018 (12.09.2018): 1–25. http://dx.doi.org/10.1155/2018/6375317.

Der volle Inhalt der Quelle
Annotation:
Networks based on IEEE 802.11 standard are one of the main options for deployment in industrial environment. Degradation of throughput in congested networks and short-term unfairness are well-known drawbacks of 802.11 DCF and similar MAC protocols. Those shortcomings represent significant limitation in forecasted growth of wireless usage. This is especially important in industrial wireless networks (IWN) where the scalability of wireless MAC is one of the main requirements. In this paper, a novel self-adapting MAC protocol (SaMAC) is defined and mathematically modeled. SaMAC employs constrained countdown freezing enhanced with shifted window mechanism. As a result, the protocol outperforms 802.11 DCF standard as well as shifted contention window (SCW) and constrained countdown freezing (CPCF) protocols in achieved throughput, fairness, and jitter, while keeping simple implementation. Despite protocol’s simple design, it is shown that its mathematical model is extremely complex. For proposed protocol, the assumption of constant contention loss probability, which is normally used for modeling of MAC schemes, does not hold. In the presented multidimensional Markov chain model, a unique iterative method for determining contention loss probability is developed as well as a method for throughput calculation based on such a chain. Accuracy of the presented model is verified in several network scenarios. Considering the performance of the proposed protocol, authors believe that it could be of benefit to deploy it in heavily loaded wireless networks with timing constraints, such as IWNs.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Almuhaideb, Abdullah M., und Huda A. Alghamdi. „Design of Inter-BAN Authentication Protocols for WBAN in a Cloud-Assisted Environment“. Big Data and Cognitive Computing 6, Nr. 4 (24.10.2022): 124. http://dx.doi.org/10.3390/bdcc6040124.

Der volle Inhalt der Quelle
Annotation:
The Telecare Medical Information System (TMIS) is a technology used in Wireless Body Area Networks (WBAN) that is used efficiently for remote healthcare services. TMIS services can be provided as cloud computing services for storage and processing purposes. TMIS uses wearable sensors to collect patient data and transmit it to the controller node over a public channel. The data is then obtained from the controller node by the medical server and stored in the database for analysis. However, an attacker can attempt to launch attacks on data transferred across an unsecured channel. Several schemes have therefore been proposed to provide mutual authentication however, there are security and performance problems. Therefore, the research aims to design two secure and efficient inter-BAN authentication protocols for WBAN: protocol-I (P-I) for emergency authentication and protocol-II (P-II) for periodic authentication. To analyze the proposed protocols, we conduct an informal security analysis, implement Burrows-Abadi-Needham (BAN) logic analysis, validate the proposed protocols using the Automated Validation of Internet Security Protocols and Applications (AVISPA) simulation tool, and conduct a performance analysis. Consequently, we show that the proposed protocols meet all the security requirements in this research, achieve mutual authentication, prevent passive and active attacks, and have suitable performance for WBAN.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

S, Arockiaraj, Krishnamoorthi Makkithaya und Harishchandra Hebbar N. „Quality of Service-Based Cross-Layer Protocol for Wireless Sensor Networks“. International Journal of Interactive Mobile Technologies (iJIM) 16, Nr. 20 (31.10.2022): 34–58. http://dx.doi.org/10.3991/ijim.v16i20.31111.

Der volle Inhalt der Quelle
Annotation:
Sensor nodes in wireless sensor networks (WSN) are used for perceiving, monitoring, and controlling a wide range of applications. Owing to the small size of sensor nodes and limited power sources, energy saving is critical for ensuring network longevity. Protocols in different layers consume energy for their function. It is possible to significantly reduce energy usage by including energy-efficiency measures in the protocol design. Most protocols in the literature focus on the energy efficiency in individual layers. Recent studies have shown that cross-layer designs are more energy efficient than individual layer designs. Therefore, this study presents a cross-layer protocol design that combines network and data link layers to minimize energy consumption. This article proposes a novel "Quality of Service Based Cross-layer (QSCL) Protocol" by combining the IEEE 802.15.4-based MAC protocol and the LEACH-based routing protocol. The dynamic duty cycle of the IEEE 802.15.4 protocol was modified based on the amount of data present in the node, which minimized the energy consumption of the data-transfer mechanism. The cluster head (CH) selection of the LEACH-based protocol was modified to consider the average residual energy (RE) of the nodes and their distance from the sink. This helps preserve the energy in the CH, thereby extending the network lifetime. Simulation studies demonstrated that the proposed QSCL outperformed the existing protocols by prolonging the network lifetime.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Wei, Jun Chao, Guo Yuan Zhang, Yao Chen und Xiu Tian Yan. „Design of a Communication Interface between the Controller and the Galvanometer“. Applied Mechanics and Materials 527 (Februar 2014): 269–72. http://dx.doi.org/10.4028/www.scientific.net/amm.527.269.

Der volle Inhalt der Quelle
Annotation:
In a laser marking system, a laser marking controller should be designed to control several galvanometers through a certain interface using a certain protocol, such as the XY2-100 or SPI. The selection of the protocol depends on the configuration of the laser marking system. Using different protocols makes the controller design provide two types of interfaces. If different protocols have their own physical interfaces, the circuit becomes more complicated. In order to decrease the number of physical interfaces and ensure the protocol compatibility at the same time, two protocol signal generator modules based on FPGA are provided and the output signals of the two modules share the same physical interface, and only one of them can be chosen according to a flag set by users. This design makes the circuit simpler and decreases the design cost.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Longo, Bernadette, Craig Weinert und T. Kenny Fountain. „Implementation of Medical Research Findings through Insulin Protocols: Initial Findings from an Ongoing Study of Document Design and Visual Display“. Journal of Technical Writing and Communication 37, Nr. 4 (Oktober 2007): 435–52. http://dx.doi.org/10.2190/v986-k02v-519t-721j.

Der volle Inhalt der Quelle
Annotation:
Medical personnel in hospital intensive care units routinely rely on protocols to deliver some types of patient care. These protocol documents are developed by hospital physicians and staff to ensure that standards of care are followed. Thus, the protocol document becomes a de facto standing order, standing in for the physician's judgment in routine situations. This article reports findings from Phase I of an ongoing study exploring how insulin protocols are designed and used in intensive care units to transfer medical research findings into patient care “best practices.” We developed a taxonomy of document design elements and analyzed 29 insulin protocols to determine their use of these elements. We found that 93% of the protocols used tables to communicate procedures for measuring glucose levels and administering insulin. We further found that the protocols did not adhere well to principles for designing instructions and hypothesized that this finding reflected different purposes for instructions (training) and protocols (standardizing practice).
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Liu, Hai Yan, Yue Zhao und Rui Huang. „Study and Design on Vulnerability Discovering of Network Protocols“. Applied Mechanics and Materials 556-562 (Mai 2014): 5526–30. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5526.

Der volle Inhalt der Quelle
Annotation:
Discovering the vulnerabilities in network protocols is the key for network attacks and defenses. Basing on the analysis of some currently used vulnerability discovering methods, a method combining reverse engineering and fuzzy testing is put forward for vulnerability discovering of network protocols, where reverse engineering method is first used to analyze the details of the communication protocol, then fuzzy testing is used to test the target software. This combination can promote the efficiency of the fuzzy testing. By using this method to test a real network application, several vulnerabilities are discovered, which verifies the validity of this method.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Singh, Kamred Udham. „Design Of Energy Efficient and Secure Routing Protocol for Wsn in Iot“. Mathematical Statistician and Engineering Applications 70, Nr. 2 (26.02.2021): 1434–41. http://dx.doi.org/10.17762/msea.v70i2.2336.

Der volle Inhalt der Quelle
Annotation:
Abstract This paper proposes an energy-efficient and secure routing system for wireless sensor networks (WSNs) in the Internet of Things (IoT). The proposed routing protocol improves packet delivery ratio, end-to-end latency, and network lifetime over existing protocols. The protocol under consideration reduces node energy consumption, increasing the network's lifetime, while ensuring data security. Simulation studies using several metrics evaluate the proposed procedure. The recommended protocol outperforms existing protocols in energy efficiency and security. The protocol under discussion has several IoT applications, including smart agriculture, healthcare monitoring, and environmental monitoring. It ensures reliable and secure data transfer. This paper introduces a novel routing system that addresses energy saving and security in wireless sensor networks and the Internet of Things (IoT).
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Srivastava, Pallavi, Edwin Chung und Stepan Ozana. „Asynchronous Floating-Point Adders and Communication Protocols: A Survey“. Electronics 9, Nr. 10 (15.10.2020): 1687. http://dx.doi.org/10.3390/electronics9101687.

Der volle Inhalt der Quelle
Annotation:
Addition is the key operation in digital systems, and floating-point adder (FPA) is frequently used for real number addition because floating-point representation provides a large dynamic range. Most of the existing FPA designs are synchronous and their activities are coordinated by clock signal(s). However, technology scaling has imposed several challenges like clock skew, clock distribution, etc., on synchronous design due to presence of clock signal(s). Asynchronous design is an alternate approach to eliminate these challenges imposed by the clock, as it replaces the global clock with handshaking signals and utilizes a communication protocol to indicate the completion of activities. Bundled data and dual-rail coding are the most common communication protocols used in asynchronous design. All existing asynchronous floating-point adder (AFPA) designs utilize dual-rail coding for completion detection, as it allows the circuit to acknowledge as soon as the computation is done; while bundled data and synchronous designs utilizing single-rail encoding will have to wait for the worst-case delay irrespective of the actual completion time. This paper reviews all the existing AFPA designs and examines the effects of the selected communication protocol on its performance. It also discusses the probable outcome of AFPA designed using protocols other than dual-rail coding.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

ZUO, JING, XUEFEN CHI, LIN GUAN, HONGXIA LI und IRFAN AWAN. „DESIGN OF FUZZY BASED MULTI-CONSTRAINED ROUTING PROTOCOL AND THE PERFORMANCE EVALUATION“. Journal of Interconnection Networks 09, Nr. 04 (Dezember 2008): 369–87. http://dx.doi.org/10.1142/s0219265908002333.

Der volle Inhalt der Quelle
Annotation:
Single-constrained QoS routing protocols have inherent defects when applied into wireless ad hoc networks. Due to a single constraint parameter is only considered, they can't always cope with the problems caused by the uncertainty of ad hoc networks well. They are not robust enough. In order to overcome the drawbacks of single-constrained QoS routing protocols and improve the Quality of Service (QoS) of ad hoc networks, this paper proposed a multi-constrained QoS routing protocol based on fuzzy logic. It is developed from Dynamic Source Routing (DSR). The proposed protocol is service-aware in the sense that it considers the QoS required by different types of services and takes different network state parameters as the constraint conditions for fuzzy based routing system. New route discovery procedure and novel route maintenance mechanism are designed to support corresponding QoS requirements. Speed of packets sending is also adjusted adaptively referring to the outputs of the proposed fuzzy system. Performance of the fuzzy based DSR protocol is measured and evaluated under different conditions. Simulation results show that the improved protocol has better QoS guarantee capabilities compared to single-constrained QoS routing protocols for large-scale networks in terms of lower delay, smoother delay variation and lower packet loss rate.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Sankhyan, Bhanu, Anupam Baliyan und Abhishek Kumar. „Design of a Hybrid Security Protocol based on Cryptographic Algorithms“. International Journal for Research in Applied Science and Engineering Technology 12, Nr. 3 (31.03.2024): 2240–47. http://dx.doi.org/10.22214/ijraset.2024.59335.

Der volle Inhalt der Quelle
Annotation:
Abstract: With increase in the use of the internet, the need to secure data is also increased. The present symmetric and asymmetric algorithms provide secure systems, but with many limitations. In the emerging world need for rapid accessing the data is increasing, a blend of both efficiency and security is required to cater the day-to-day needs. To ensure efficiency and security of the message hybrid security protocols are developed. Hybrid security protocol combines the advantages of traditional algorithms, such that more secure and efficient systems can be developed. A new hybrid protocol is developed using AES, ECC and ECDH, which in terms increase efficiency of existing protocols and provide a better security by adding an extra layer of security to the traditional AES algorithm.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Paul, Surjit, Sanjay Kumar und Rajiv Ranjan Suman. „A Quantum Secure Entity Authentication Protocol Design for Network Security“. International Journal of Information Security and Privacy 13, Nr. 4 (Oktober 2019): 1–11. http://dx.doi.org/10.4018/ijisp.2019100101.

Der volle Inhalt der Quelle
Annotation:
Authentication is one of the significant issues for all kinds of network communications. Most of the authentication protocols designed and implemented so far for entity authentication are based on classical cryptographic techniques to prevent themselves from different types of attacks. These protocols use either password or challenge for authentication. In this article, the design of the proposed quantum secure entity authentication protocol is shown. The proposed protocol is based on the challenge response method. Due to quantum computer capability to break mathematical complexity-based cryptographic techniques, the proposed protocol uses the one-time pad (OTP) to secure itself from attacks, i.e., eavesdropping, reply attack, password guessing attack, man-in-the-middle attack, brute-force attack, quantum computer attack, etc. Security of the proposed protocol was analyzed, and it shows that the proposed protocol may prevent itself from different types of attacks. Further, analysis for quantum Secure was carried out. From the analysis, it is found that if the OTP key is truly random and cannot be reused, then a computer with infinite capacity or quantum computer cannot break the encrypted challenge and response. The proposed protocol may be used for entity authentication for the client, server, process, and user.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Patel, Ahmed, Kenan Kalajdzic, Laleh Golafshan und Mona Taghavi. „Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card“. International Journal of Information Security and Privacy 5, Nr. 3 (Juli 2011): 1–18. http://dx.doi.org/10.4018/ijisp.2011070101.

Der volle Inhalt der Quelle
Annotation:
Zero-knowledge authentication protocols are an alternative to authentication protocols based on public key cryptography. Low processing and memory consumption make them especially suitable for implementation in smart card microprocessors, which are severely limited in processing power and memory space. This paper describes a design and implementation of a software library providing smart card application developers with a reliable authentication mechanism based on well-known zero-knowledge authentication schemes. Java Card is used as the target smart card platform implementation based on the evaluation of the Fiat-Shamir (F-S) and Guillou-Quisquater (G-Q) protocols under various performance criteria are presented to show the effectiveness of the implementation and that G-Q is a more efficient protocol.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Wang, Wei, Long Qing Zou, Hua Xu, You Wei An, Pei Fa Jia, Bo Li und Yuan Luo. „A Design Method of Multiple Protocols Communication Module in Semiconductor Equipment Simulation Platform“. Advanced Materials Research 462 (Februar 2012): 516–23. http://dx.doi.org/10.4028/www.scientific.net/amr.462.516.

Der volle Inhalt der Quelle
Annotation:
This paper presents a design method for communication module design in semiconductor equipment simulation platform. There are several kinds of standardized protocols in semiconductor equipments intra communication, the method with which these standardized protocols can be configured and integrated in single simulation platform. These protocols can be configured statically and dynamically respectively. In static state, protocol configuration provides various protocols for chosen and edit. In the dynamic state, the virtual devices can be communicated with control system with communication module. As a case study, a process chamber system simulator with designed the communication module has been illustrated. The designed communication module accomplishes the data transmission between control system and the chamber simulation system. The devices in chamber system receive the instruction form control system and execute the required actions. The experiment results show that the simulation platform is feasible and effective.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Müller-Török, Robert, Domenica Bagnato und Alexander Prosser. „Council of Europe Recommendation CM/Rec(2017)5 and e-Voting Protocol Design“. Masaryk University Journal of Law and Technology 14, Nr. 2 (23.09.2020): 275–302. http://dx.doi.org/10.5817/mujlt2020-2-6.

Der volle Inhalt der Quelle
Annotation:
The Corona pandemic has created a push towards digitization in a number of fields, not least in the public sector including democratic processes. This of course includes an increased interest in e-voting via the Internet. The Council of Europe has a long-standing history of work in the field including two Recommendations – (2004)11 and (2017)5 – which have become the de facto yardstick against which every e-voting system is measured. Rec(2017)5 builds on a decade of experience with e-voting and particularly strengthens two concepts important in any electronic voting system: Voting secrecy and auditability/verifiability. This has distinct implications for the design of e-voting protocols. The aim of this paper is to analyse the impact on what arguably are the most popular voting protocol families, envelope and token protocols. How does the modified Recommendation impact on the viability of protocols and protocol design? The paper first presents the Council of Europe Recommendation and the technical issues it addresses. Then a model is introduced to assess a voting protocol against the Recommendation; a typical envelope and a token protocol are assessed in view of the model and finally the two assessments are compared including policy recommendations for a path to e-voting implementation.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Deeptha, R. „Survey on Opportunistic Routing Protocols in Multihop Wireless Networks“. Webology 18, Special Issue 04 (30.09.2021): 752–64. http://dx.doi.org/10.14704/web/v18si04/web18162.

Der volle Inhalt der Quelle
Annotation:
Routing is portrayed as one of the most important prevailing challenges in research with reference to multi-hop networks in a wireless environment. Opportunistic routing (OR) protocol is an emerging area related to research, due to the improvement in communication reliability, compared to the traditional routing models. The major perception related to OR is to determine a group of neighboring node candidates, named as a candidate set using the advantages of broadcast capability of the wireless medium thereby to collaboratively transmit data packets towards the destination using the coordination of the forwarded candidate set. The design and performance of OR protocols over multi-hop wireless networks mainly depend on the processes of forwarding selection of candidates and assignment of priorities. Therefore, the researchers have designed and developed several different algorithms for those OR processes. In this paper, following a short outline on traditional routing and OR protocols, metrics involved in the design of existing OR protocols, classification of OR based protocols, and hurdles in the design of OR protocols over multi-hop wireless networks are examined. More precisely, the OR protocols are divided into two categories, based on the forwarding candidate set selection and forwarding candidate coordination methods. Furthermore, the most significant challenges of OR protocol design, such as prioritization of forwarding candidates, utilizing the cross-layer approach for candidate coordination, and achieving the quality of service also investigated.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Stamps, Arthur E. „Evaluating Architectural Design Review“. Perceptual and Motor Skills 90, Nr. 1 (Februar 2000): 265–71. http://dx.doi.org/10.2466/pms.2000.90.1.265.

Der volle Inhalt der Quelle
Annotation:
Architectural design review is a method of environmental management which is widely used bv governmental agencies in both the United States and in Great Britain. Because design review is a governmental function, there is a major need to assess how well it works Research covering over 29,000 respondents and 5,600 environmental scenes suggests that scientific protocols can be adapted to provide an accurate and efficient design review protocol. The protocol uses preference experiments to find the standardized mean difference ([Formula: see text]) between a proposed project and a random sample of existing projects. Values of d will indicate whether the project will increase, maintain, or diminish the aesthetic merit of the sampled area. The protocol is illustrated by applying it to the case of design review for a single residence. Implications for further implementations are discussed.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Kaminska, Olena, und Peter Lynn. „The Implications of Alternative Allocation Criteria in Adaptive Design for Panel Surveys“. Journal of Official Statistics 33, Nr. 3 (01.09.2017): 781–99. http://dx.doi.org/10.1515/jos-2017-0036.

Der volle Inhalt der Quelle
Annotation:
AbstractAdaptive survey designs can be used to allocate sample elements to alternative data collection protocols in order to achieve a desired balance between some quality measure and survey costs. We compare four alternative methods for allocating sample elements to one of two data collection protocols. The methods differ in terms of the quality measure that they aim to optimize: response rate, R-indicator, coefficient of variation of the participation propensities, or effective sample size. Costs are also compared for a range of sample sizes. The data collection protocols considered are CAPI single-mode and web-CAPI sequential mixed-mode. We use data from a large experiment with random allocation to one of these two protocols. For each allocation method we predict outcomes in terms of several quality measures and costs. Although allocating the whole sample to single-mode CAPI produces a higher response rate than allocating the whole sample to the mixed-mode protocol, we find that two of the targeted allocations achieve a better response rate than single-mode CAPI at a lower cost. We also find that all four of the targeted designs out-perform both single-protocol designs in terms of representativity and effective sample size. For all but the smallest sample sizes, the adaptive designs bring cost savings relative to CAPI-only, though these are fairly modest in magnitude.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Günther, Felix. „Modeling advanced security aspects of key exchange and secure channel protocols“. it - Information Technology 62, Nr. 5-6 (16.12.2020): 287–93. http://dx.doi.org/10.1515/itit-2020-0029.

Der volle Inhalt der Quelle
Annotation:
AbstractSecure connections are at the heart of today’s Internet infrastructure, protecting the confidentiality, authenticity, and integrity of communication. Achieving these security goals is the responsibility of cryptographic schemes, more specifically two main building blocks of secure connections. First, a key exchange protocol is run to establish a shared secret key between two parties over a, potentially, insecure connection. Then, a secure channel protocol uses that shared key to securely transport the actual data to be exchanged. While security notions for classical designs of these components are well-established, recently developed and standardized major Internet security protocols like Google’s QUIC protocol and the Transport Layer Security (TLS) protocol version 1.3 introduce novel features for which supporting security theory is lacking.In my dissertation [20], which this article summarizes, I studied these novel and advanced design aspects, introducing enhanced security models and analyzing the security of deployed protocols. For key exchange protocols, my thesis introduces a new model for multi-stage key exchange to capture that recent designs for secure connections establish several cryptographic keys for various purposes and with differing levels of security. It further introduces a formalism for key confirmation, reflecting a long-established practical design criteria which however was lacking a comprehensive formal treatment so far. For secure channels, my thesis captures the cryptographic subtleties of streaming data transmission through a revised security model and approaches novel concepts to frequently update key material for enhanced security through a multi-key channel notion. These models are then applied to study (and confirm) the security of the QUIC and TLS 1.3 protocol designs.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Zhou, Qi Shu, Jie Luo und Yan Lin Ji. „Design of DC Motor Speed Control System Based on FlexRay Network“. Applied Mechanics and Materials 543-547 (März 2014): 1373–76. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.1373.

Der volle Inhalt der Quelle
Annotation:
Nowadays, communication protocols are used in safety-critical automotive applications. Among the communication protocols, FlexRay, with real-time and reliable characters, is expected to become the communication backbone for future automotive systems. Therefore, a DC motor speed control system based on FlexRay network is presented in this paper to verify these characters. The following works have been done in this paper: study the FlexRay protocol specification, design the structure, programming, analyze the test results to get transmission delay time. Using the test system, FlexRay network was verified that message can be transferred quickly and correctly.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie