To see the other types of publications on this topic, follow the link: Analysis protocol.

Journal articles on the topic 'Analysis protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Analysis protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

HU, YANJING, QINGQI PEI, and LIAOJUN PANG. "Instruction Clustering Analysis for Unknown Network Protocol's Abnormal Behavior." Journal of Interconnection Networks 15, no. 03n04 (September 2015): 1540002. http://dx.doi.org/10.1142/s0219265915400022.

Full text
Abstract:
Protocol's abnormal behavior analysis is an important task in protocol reverse analysis. Traditional protocol reverse analysis focus on the protocol message format, but protocol behavior especially the abnormal behavior is rare studied. In this paper, protocol behavior is represented by the labeled behavior instruction sequences. Similar behavior instruction sequences mean the similar protocol behavior. Using our developed virtual analysis platform HiddenDisc, we can capture a variety of known or unknown protocols' behavior instruction sequences. All kinds of executed or unexecuted instruction sequences can automatic clustering by our designed instruction clustering algorithm. Thereby we can distinguish and mine the unknown protocols' potential abnormal behavior. The mined potential abnormal behavior instruction sequences are executed, monitored and analyzed on HiddenDisc to determine whether it is an abnormal behavior and what is the behavior's nature. Using the instruction clustering algorithm, we have analyzed 1297 protocol samples, mined 193 potential abnormal instruction sequences, and determined 187 malicious abnormal behaviors by regression testing. Experimental results show that our proposed instruction clustering algorithm has high efficiency and accuracy, can mine unknown protocols' abnormal behaviors effectively, and enhance the initiative defense capability of network security.
APA, Harvard, Vancouver, ISO, and other styles
2

Owen, Stephen, Pearl Brereton, and David Budgen. "Protocol analysis." Communications of the ACM 49, no. 2 (February 2006): 117–22. http://dx.doi.org/10.1145/1113034.1113039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Fu Lin, Jie Yang, Hong Wei Zhou, and Ying Liu. "A New Dynamic Protocol Analysis Model." Advanced Materials Research 765-767 (September 2013): 1761–65. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1761.

Full text
Abstract:
Traditional static analysis methods such as formal validation and theorem proving were used to analyze protocols security previously. These methods can not measure and evaluate actual security of protocols accurately for the setting and suppose are far from the actual conditions. This paper proposes a new dynamic protocol analysis model. The system based on the model can be used to active test in actual running conditions, analyze known protocols security, integrity, robustness, and analyze unknown protocols online, provide support for protocol designer. The systems structure, working flow and implementation of key modules are described. The experimental results validate the validity of the models design.
APA, Harvard, Vancouver, ISO, and other styles
4

Zhao, Wen Hong. "Protocols Analysis by Base-Function." Applied Mechanics and Materials 530-531 (February 2014): 682–85. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.682.

Full text
Abstract:
A new description method of protocol structure is presented by base-function firstly. Then, a protocol analysis method base on it is proposed. To analyses the private protocols, a new self-learning algorithm is discussed. Finally, the flow of protocol analysis based on base-function is given. Experiment results show the efficiency of presented method.
APA, Harvard, Vancouver, ISO, and other styles
5

KOVACIK, Cyril Filip, and Gabriel BUGAR. "ANALYSIS OF OPERATIONAL PROPERTIES OF VOIP NETWORK." Acta Electrotechnica et Informatica 1335-8243, no. 1338-3957 (June 9, 2021): 30–34. http://dx.doi.org/10.15546/aeei-2021-0005.

Full text
Abstract:
Voice transmission over the Internet network is now taken for granted. Many end-user applications address this issue. However, this paper focuses on the specific use of the SCCP protocol created by Cisco, its implementation in a computer network and end devices, determination of the operational properties of this implementation, and their comparison in different conditions. VoIP traffic is compared at different bandwidths and implemented by different configurations of IP protocols. By investigated implementations of IP protocols are meant IPv4, IPv6, and IPv4 protocol with applied NAT. As part of the application of various IP protocols is also compared VoIP communication with a video stream on a local basis. The conclusion of the paper is devoted to the graphical evaluation of these observations and to draw conclusions based on them.
APA, Harvard, Vancouver, ISO, and other styles
6

Yongming Yao, Yongming Yao, Yulin Wang Yongming Yao, Weiyi Jiang Yulin Wang, Ziyuan Wang Weiyi Jiang, and Song Huang Ziyuan Wang. "PPAdroid: An Approach to Android Privacy Protocol Analysis." 網際網路技術學刊 23, no. 3 (May 2022): 561–71. http://dx.doi.org/10.53106/160792642022052303014.

Full text
Abstract:
<p>With the continuous growth of the number of mobile applications, users may provide personal information to applications consciously or unconsciously. Privacy protocol could help users understand the privacy behavior of applications. However, users usually ignore the content of the privacy protocol due to the length of their context. To solve such a problem, we conduct an empirical study on privacy protocols of Android applications and propose a method to detect sentences related to personal information operations in privacy protocol documents. In our proposed method, a verb list, a negation list, and a noun list related to user information operations are created and utilized to detect sentences related to user personal information by the Stanford CoreNLP technique. The experimental results show that our proposed method is better than state-of-art keyword-based methods. Furthermore, our proposed method can help users understand the contents of privacy protocol documents in a limited way.</p> <p>&nbsp;</p>
APA, Harvard, Vancouver, ISO, and other styles
7

Anggriani, Sufy, Rizki Savira Firdaus, and Windy Amanda Siwi Suherlan. "Analisis Penyimpanan Protokol Notaris Secara Elektronik." Notaire 6, no. 3 (December 4, 2023): 437–48. http://dx.doi.org/10.20473/ntr.v6i3.50802.

Full text
Abstract:
AbstractThe collapse of the efficiency of notary protocol storage that is carried out physically has resulted in the idea of developing a way for a notary to store the notary protocol, by transferring the storage media into electronic form. Thus, access in submitting notary protocols to the notary receiving the protocol is seen as more efficient because it involves technological advances. This research aims to analyze the importance of notary protocols being stored electronically and to analyze the criteria for notaries receiving electronic notary protocols. In this research, normative research methods were used. The analysis in this research was carried out using a deductive method, namely drawing on general propositions to create specific propositions. The results of this research are (1) by storing notary protocols electronically, the notary’s duties in carrying out his obligations and authority will become more efficient and economical. (2) by storing the protocol electronically, the notary appointed to hold the notarial protocol who has retired, only needs to hand over the access rights in the electronic storage used by the previous notary.Keywords: Storage; Notary Protocol; Electronic. AbstrakRuntuhnya efisiensi penyimpanan protokol notaris yang dilakukan secara fisik, mengakibatkan timbulnya buah pikiran untuk mengembangkan cara notaris menyimpan protokol notaris tersebut, dengan melakukan pengalihan media penyimpanan kedalam bentuk elektronik. Sehingga, akses dalam melakukan penyerahan protokol notaris kepada notaris penerima protokol dipandang lebih efisien karena melibatkan kemajuan teknologi. Penelitian ini bertujuan untuk menganalisa pentingnya protokol notaris agar disimpan secara elektronik serta menganalisa kriteria notaris penerima protokol notaris secara elektronik. Dalam penelitian ini digunakan metode penelitian normatif. Analisis dalam penelitian ini dilakukan dengan menggunakan metode deduktif yaitu yaitu menarik proposisi yang umum untuk membuat proposisi yang bersifat khusus. Hasil penelitian ini adalah (1) dilakukannya penyimpanan protokol notaris secara elektronik, maka tugas notaris dalam menjalankan kewajiban serta wewenangnya akan menjadi lebih efisien dan ekonomis. (2) dengan dilakukannya penyimpanan protokol secara elektronik, maka notaris yang ditunjuk untuk memegang protokol notaris yang telah purna tugas, hanya perlu melakukan serah terima yang berupa hak akses dalam penyimpanan elektronik yang digunakan oleh notaris sebelumnya. Kata Kunci: Penyimpanan; Protokol Notaris; Elektronik.
APA, Harvard, Vancouver, ISO, and other styles
8

Muhammad Farhan, Muhammad Asif, Maaz Bin Ahmad, and Khalid Maqsood. "A Comparative Analysis of Unicast Routing Protocols for MPLS-VPN." Lahore Garrison University Research Journal of Computer Science and Information Technology 3, no. 1 (March 29, 2019): 43–49. http://dx.doi.org/10.54692/lgurjcsit.2019.030167.

Full text
Abstract:
MPLS-VPN technology is introduced to provide secure transmission with minimum propagation delay. This paper presents a comparative analysis of unicast routing protocols for MPLSVPN enabled networks. The motive behind this analysis is to observe the consequence of unicast routing protocols on the performance of MPLS-VPN enabled networks and to choose most suitable routing protocol for such type of networks. To conduct the analysis, a test bed is established in GNS3 simulator. Three main unicast routing protocols i.e. Enhanced Interior Gateway Routing Protocol (EIGRP), Open Shortest Path First (OSPF) and Routing Information Protocol (RIP) has been considered in this work. Round-Trip-Time, Jitter and Administrative-distance are used as performance measure metrics. The experimental analysis indicates that EIGRP is the most suitable protocol among the aforementioned protocols for MPLS-VPN.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhao, Wen Hong. "Protocols Analysis Based on the Combination Mode of Walsh Function." Applied Mechanics and Materials 543-547 (March 2014): 3482–85. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3482.

Full text
Abstract:
To analyses networks, technologies of network protocol analysis are usually used. A new approach of protocols analysis is presented based on the combination mode of walsh function. It consists of three parts, such as the protocol structure characterization method, the hierarchical protocol analysis and the self-learning combination modes. After discussing the analysis process, an experiment shows the efficiency of presented approach.
APA, Harvard, Vancouver, ISO, and other styles
10

Lu, Siqi, Qingdi Han, Xuyang Miao, and Yubo Liu. "Research on Security Protocol Analysis Tool SmartVerif." Journal of Physics: Conference Series 2132, no. 1 (December 1, 2021): 012022. http://dx.doi.org/10.1088/1742-6596/2132/1/012022.

Full text
Abstract:
Abstract Security protocols have been designed to protect the security of the network. However, many security protocols cannot guarantee absolute security in real applications. Therefore, security tests of the network protocol become particularly important. In this paper, firstly, we introduce SmartVerif, which is the first formal analysis tool to automatically verify the security of protocols through dynamic strategies. And then, we use SmartVerif to verify the pseudo-randomness of the encapsulated key of the Two-Pass AKE protocol, which was proposed by Liu’s in ASIACRYPT in 2020. Finally, we summary our work and show some limitations of SmartVerif. At the same time, we also point out the direction for future improvement of SmartVerif.
APA, Harvard, Vancouver, ISO, and other styles
11

Smith, John, Dana Kay Smith, and Eileen Kupstas. "Automated Protocol Analysis." Human-Computer Interaction 8, no. 2 (June 1, 1993): 101–45. http://dx.doi.org/10.1207/s15327051hci0802_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Rekhter, Yakov. "IDRP protocol analysis." ACM SIGCOMM Computer Communication Review 22, no. 2 (April 1992): 17–28. http://dx.doi.org/10.1145/141800.141802.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Grossman, Stephen. "Khandwalla's protocol analysis." Creativity Research Journal 7, no. 1 (January 1994): 93–95. http://dx.doi.org/10.1080/10400419409534515.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Sedgwick, P. "Per protocol analysis." BMJ 340, apr07 1 (April 7, 2010): c1825. http://dx.doi.org/10.1136/bmj.c1825.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Jin-Ze Du, Jin-Ze Du, Jun-Wei Liu Jin-Ze Du, Tao Feng Jun-Wei Liu, and Zhan-Ting Yuan Tao Feng. "Formal Analysis and Improvement of Z-Wave Protocol." 電腦學刊 34, no. 4 (August 2023): 025–39. http://dx.doi.org/10.53106/199115992023083404003.

Full text
Abstract:
<p>In order to verify the security of the Z-Wave communication protocol, the possible attacks in the protocol are analyzed to reduce user privacy security vulnerabilities. For the communication process and key exchange process between the controller and the node, this paper uses CPN tools to model the Z-Wave S2 protocol, and introduces the Dolev-Yao attack model to verify the security behavior of the protocol. The results show that there is a man-in-the-middle attack when using S2 authentication for device inclusion. In response to this vulnerability, we propose a lightweight static authentication scheme based on HKDF function and XOR operation, which performs authentication between Z-Wave controller and slave device. Secondly, we formally verify the security objectives of the improved scheme, and prove that the optimization scheme can effectively prevent man-in-the-middle attacks in the S2 security mode. </p> <p>&nbsp;</p>
APA, Harvard, Vancouver, ISO, and other styles
16

Byun, Ilmu. "Cooperative Hybrid-ARQ Protocols: Unified Frameworks for Protocol Analysis." ETRI Journal 33, no. 5 (October 4, 2011): 759–69. http://dx.doi.org/10.4218/etrij.11.0110.0630.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Huang, Kai Yin, Yan Xia Xu, Li Juan Wen, and Bao Jun Gao. "Performance Analysis of OLSR Routing Protocol Based on IPv6." Advanced Materials Research 268-270 (July 2011): 1940–42. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.1940.

Full text
Abstract:
This paper introduces the OLSR routing protocol,IPv4 and IPv6 address protocol's characteristics and internal mechanism.Through simulation, we will see the performance of OLSR routing protocol based on IPv4 and IPv6 address protocol.Experiments show that less HELLO message and TC message will need and smaller jitter will get while using the OLSR routing protocol based on IPv6.But bigger delay and smaller throughput will appear compared with OLSR routing protocol based on IPv4 address protocol.
APA, Harvard, Vancouver, ISO, and other styles
18

Gurtov, Andrei. "Performance analysis of general backoff protocols." Journal of Communications Software and Systems 4, no. 1 (March 20, 2008): 13. http://dx.doi.org/10.24138/jcomss.v4i1.233.

Full text
Abstract:
In this paper, we analyze backoff protocols, such as the one used in Ethernet. We examine a general backoff function(GBF) rather than just the binary exponential backoff (BEB) used by Ethernet. Under some mild assumptions we find stability and optimality conditions for a wide class of backoff protocols with GBF. In particular, it is proved that the maximal throughput rate over the class of backoff protocols is a fixed function of the number of stations (N) and the optimal average service time is about Ne for large N. The reasons of the instability of the BEB protocol (for a big enough input rate) are explained. Additionally, the paper introduces novel procedure for analyzing bounded backoff protocols, which is useful for creating new protocols or improving existing, as no protocol can use unbounded counters.
APA, Harvard, Vancouver, ISO, and other styles
19

Zebrack, Brad, Karen Kayser, Laura Sundstrom, Sue Ann Savas, Chris Henrickson, Chiara Acquati, and Rebecca L. Tamas. "Psychosocial Distress Screening Implementation in Cancer Care: An Analysis of Adherence, Responsiveness, and Acceptability." Journal of Clinical Oncology 33, no. 10 (April 1, 2015): 1165–70. http://dx.doi.org/10.1200/jco.2014.57.4020.

Full text
Abstract:
Purpose The American College of Surgeons Commission on Cancer has mandated implementation of a systematic protocol for psychosocial distress screening and referral as a condition for cancer center accreditation beginning in 2015. Compliance with standards requires evidence that distress screening protocols are carried out as intended and result in appropriate referral and follow-up when indicated. The purpose of this study was to examine the fidelity of distress screening protocols at two tertiary cancer treatment centers. Methods A retrospective review and analysis of electronic medical records over a 12-week period examined clinic adherence to a prescribed distress screening protocol and responsiveness to patients whose scores on the National Comprehensive Cancer Network Distress Thermometer (DT) indicated clinically significant levels of distress requiring subsequent psychosocial contact. A weekly online survey assessed clinician perspectives on the acceptability of the protocol. Results Across clinics, rates of adherence to the distress screening protocol ranged from 47% to 73% of eligible patients. For patients indicating clinically significant distress (DT score ≥ 4), documentation of psychosocial contact or referral occurred, on average, 50% to 63% of the time, and was more likely to occur at one of two participating institutions when DT scores were high (DT score of 8 to 10). Clinician assessments of the protocol's utility in addressing patient concerns and responding to patient needs were generally positive. Conclusion Systematic tracking of distress screening protocols is needed to demonstrate compliance with new standards of care and to demonstrate how well institutions are responding to their clinical obligation to address cancer patients' emotional and psychosocial needs.
APA, Harvard, Vancouver, ISO, and other styles
20

Xiao, Meihua, Weiwei Song, Ke Yang, Ri OuYang, and Hanyu Zhao. "Formal Analysis of the Security Protocol with Timestamp Using SPIN." Computational Intelligence and Neuroscience 2022 (August 23, 2022): 1–11. http://dx.doi.org/10.1155/2022/2420590.

Full text
Abstract:
The verification of security protocols is an important basis for network security. Now, some security protocols add timestamps to messages to defend against replay attacks by network intruders. Therefore, verifying the security properties of protocols with timestamps is of great significance to ensure network security. However, previous formal analysis method of such protocols often extracted timestamps into random numbers in order to simplify the model before modeling and verification, which probably cause time-dependent security properties that are ignored. To solve this problem, a method for verifying security protocols with timestamps using model checking technique is proposed in this paper. To preserve the time-dependent properties of the protocol, Promela (process meta language) is utilized to define global clock representing the protocol system time, timer representing message transmission time, and the clock function representing the passage of time; in addition, a mechanism for checking timestamps in messages is built using Promela. To mitigate state space explosion in model checking, we propose a vulnerable channel priority method of using Promela to build intruder model. We take the famous WMF protocol as an example by modeling it with Promela and verifying it with model checker SPIN (Simple Promela Interpreter), and we have successfully found two attacks in the protocol. The results of our work can make some security schemes based on WMF protocol used in the Internet of things or other fields get security alerts. The results also show that our method is effective, and it can provide a direction for the analysis of other security protocols with timestamp in many fields.
APA, Harvard, Vancouver, ISO, and other styles
21

Hu, Yanjing, and Qingqi Pei. "Dynamic Combined with Static Analysis for Mining Network Protocol's Hidden Behavior." International Journal of Business Data Communications and Networking 13, no. 2 (July 2017): 1–14. http://dx.doi.org/10.4018/ijbdcn.2017070101.

Full text
Abstract:
Unknown protocol's hidden behavior is becoming a new challenge in network security. This paper takes the captured messages and the binary code that implement the protocol both as the studied object. Dynamic Taint Analysis combined with Static Analysis is used for protocol analyzing. Firstly, monitor and analyze the process of protocol program parses the message in the virtual platform HiddenDisc prototype system developed by the authors, record the protocol's public behavior, then based on the authors' proposed Hidden Behavior Perception and Mining algorithm, static analyze the protocol's hidden behavior trigger conditions and hidden behavior instruction sequences. According to the hidden behavior trigger conditions, new protocol messages with the sensitive information are generated, and the hidden behaviors are executed by dynamic triggering. HiddenDisc prototype system can sense, trigger and analyze the protocol's hidden behaviors. According to the statistical analysis results, the authors propose the evaluation method of Protocol Execution Security. The experimental results show that the present method can accurately mining the protocol's hidden behaviors, and can evaluate unknown protocol's execution security.
APA, Harvard, Vancouver, ISO, and other styles
22

Syahputra, Ramdhani, Rahmadi Kurnia, and Rian Ferdian. "Analysis of FHRP Design and Implementation in RIPv2 and OSPF Routing Protocols." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 4, no. 1 (February 8, 2020): 102–8. http://dx.doi.org/10.29207/resti.v4i1.1490.

Full text
Abstract:
The high reliability of data access has become a problem faced by many companies, institutions, and universities. For this reason, a protocol required that can protect the network from a communication breakdown. One method used to maintain communication is by implementing a protocol redundancy system. One or more routers will act as the primary router for load balancing, and some routers are in standby mode if one main router is down. First hop redundancy protocols (FHRP) is a protocol that implements redundancy and load balancing systems. This protocol can transfer access data traffic if one of the routers on the network is down. FHRP divided into virtual router redundancy protocol (VRRP) and gateway load balancing Protocol (GLBP). This research analyzes the design and implementation to provide information about the quality of VRRP and GLBP services on the main router and the backup router, by using an application graphical network simulator (GNS) simulation 3. In the GNS3 application, a LAN network topology is designed with eight router devices in the form of a ring topology using RIPv2 and OSPF routing protocols, then implemented in protocols VRRP and GLBP. The analysis results show that GLBP can back up the network faster than VRRP when the primary router is down. If implemented into a LAN network with RIPv2 and OSPF routing protocols, VRRP has better service quality than GLBP.
APA, Harvard, Vancouver, ISO, and other styles
23

Zheng, Mingwei, Qingkai Shi, Xuwei Liu, Xiangzhe Xu, Le Yu, Congyu Liu, Guannan Wei, and Xiangyu Zhang. "ParDiff: Practical Static Differential Analysis of Network Protocol Parsers." Proceedings of the ACM on Programming Languages 8, OOPSLA1 (April 29, 2024): 1208–34. http://dx.doi.org/10.1145/3649854.

Full text
Abstract:
Countless devices all over the world are connected by networks and communicated via network protocols. Just like common software, protocol implementations suffer from bugs, many of which only cause silent data corruption instead of crashes. Hence, existing automated bug-finding techniques focused on memory safety, such as fuzzing, can hardly detect them. In this work, we propose a static differential analysis called ParDiff to find protocol implementation bugs, especially silent ones hidden in message parsers. Our key observation is that a network protocol often has multiple implementations and any semantic discrepancy between them may indicate bugs. However, different implementations are often written in disparate styles, e.g., using different data structures or written with different control structures, making it challenging to directly compare two implementations of even the same protocol. To exploit this observation and effectively compare multiple protocol implementations, ParDiff (1) automatically extracts finite state machines from programs to represent protocol format specifications, and (2) then leverages bisimulation and SMT solvers to find fine-grained and semantic inconsistencies between them. We have extensively evaluated ParDiff using 14 network protocols. The results show that ParDiff outperforms both differential symbolic execution and differential fuzzing tools. To date, we have detected 41 bugs with 25 confirmed by developers.
APA, Harvard, Vancouver, ISO, and other styles
24

Mehri-Toonabi, Ali, Mahdi Davoudi Darareh, and Shahrooz Janbaz. "High-dimensional quantum key distribution using polarization-phase encoding: security analysis." International Journal of Quantum Information 18, no. 06 (September 2020): 2050031. http://dx.doi.org/10.1142/s0219749920500318.

Full text
Abstract:
In this work, we introduce a high-dimensional polarization-phase (PoP)-based quantum key distribution protocol, briefly named PoP[Formula: see text], where [Formula: see text] is the dimension of a hybrid quantum state including polarization and phase degrees of freedom of the same photon, and [Formula: see text] is the number of mutually unbiased bases. We present a detailed description of the PoP[Formula: see text] protocol as a special case, and evaluate its security against various individual and coherent eavesdropping strategies, and in each case, we compare it with the BB84 and the two-dimensional (TD)-PoP protocols. In all the strategies, the error threshold and the effective transmission rate of the PoP[Formula: see text] protocol are far greater than the other two protocols. Unlike most high-dimensional protocols, the simplicity of producing and detecting the qudits and the use of conventional components (such as traditional single-photon sources and quantum channels) are among the features of the PoP[Formula: see text] protocol.
APA, Harvard, Vancouver, ISO, and other styles
25

Lin, Wen Qi, Yi Liu, Li Meng Song, Yuan Jiao Zhang, and Fei Guo. "Comparison and Analysis of MAC Protocol in Multimedia Communications." Applied Mechanics and Materials 519-520 (February 2014): 496–99. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.496.

Full text
Abstract:
MAC protocol analysis and comparison to the multimedia communication theory as the framework, firstly discusses the requirement of communication network in computer networks and multimedia applications. MAC protocols oriented to wireless sensor networks are compared and analyzed. Summary of CSMA/CA, CSMA/CD, S-MAC and basic principles and applicable occasions, main parameters is made. Properties of the three MAC protocols is compared. The results of this study provides reference for MAC protocol oriented to multimedia communications.
APA, Harvard, Vancouver, ISO, and other styles
26

Debuisschert, Thierry, and Simon Fossier. "Security analysis of the time-coding quantum key distribution protocols." Quantum Information and Computation 11, no. 11&12 (November 2011): 968–87. http://dx.doi.org/10.26421/qic11.11-12-7.

Full text
Abstract:
We report the security analysis of time-coding quantum key distribution protocols. The protocols make use of coherent single-photon pulses. The key is encoded in the photon time-detection. The use of coherent superposition of states allows to detect eavesdropping of the key. We give a mathematical model of a first protocol from which we derive a second, simpler, protocol. We derive the security analysis of both protocols and find that the secure rates can be similar to those obtained with the BB84 protocol. We then calculate the secure distance for those protocols over standard fibre links. When using low-noise superconducting single photon detectors, secure distances over 200 km can be foreseen. Finally, we analyse the consequences of photon-number splitting attacks when faint pulses are used instead of single photon pulses. A decoy states technique can be used to prevent such attacks.
APA, Harvard, Vancouver, ISO, and other styles
27

Song, Daegene. "Numerical Analysis in Entanglement Swapping Protocols." NeuroQuantology 20, no. 2 (April 1, 2022): 153–57. http://dx.doi.org/10.14704/nq.2022.20.2.nq22083.

Full text
Abstract:
Entanglement has recently been one of the most essential elements in the development of various quantum technologies. In fact, a swapping protocol was introduced to create a long-distance entanglement from multiple shorter ones. Extending the previous work, this paper provides a more detailed numerical analysis to help create long-distance entanglement out of the two non-maximal three-level states. Specifically, it shows that while the protocol does not always yield optimal results, namely, the weaker link, there is a substantial number of states that yield an optimal result. Moreover, we discuss the numerical approach in showing the existence of states that provide a result close to the optimal outcome, which may be useful in realizing the long-distance entanglement used in quantum technology.
APA, Harvard, Vancouver, ISO, and other styles
28

Kang, Baoyuan, Yanbao Han, Kun Qian, and Jianqi Du. "Analysis and Improvement on an Authentication Protocol for IoT-Enabled Devices in Distributed Cloud Computing Environment." Mathematical Problems in Engineering 2020 (June 23, 2020): 1–6. http://dx.doi.org/10.1155/2020/1970798.

Full text
Abstract:
Recently, a number of authentication protocols integrated with the Internet of Things (IoT) and cloud computing have been proposed for secure access control on large-scale IoT networks. In this paper, we carefully analyze Amin et al.’s authentication protocol for IoT-enabled devices in distributed cloud computing environment and find that Amin et al.’s protocol is vulnerable to several weaknesses. The main shortcoming of Amin et al.’s protocol is in authentication phase; a malicious cloud server can counterfeit the cloud server chosen by a user, and the control server cannot find this counterfeit. To overcome the shortcomings of Amin et al.’s protocol, we propose an improved protocol. In the registration phase of the improved protocol, the pseudoidentity and real identity of a user or a cloud server are bundled up with the control server’s secret numbers. This measure can effectively prevent impersonation attack. We also compare the improved protocol with several existing authentication protocols in security and computational efficiency.
APA, Harvard, Vancouver, ISO, and other styles
29

Dey, Tanay, M. M. A. Hashem, and Subroto Kumar Mondal. "ON PERFORMANCE ANALYSIS OF AMBR PROTOCOL IN MOBILE AD HOC NETWORKS." IIUM Engineering Journal 11, no. 2 (November 19, 2010): 240–54. http://dx.doi.org/10.31436/iiumej.v11i2.28.

Full text
Abstract:
Due to mobility of nodes in ad hoc networks, the most challenging issue is to design and to make sound analysis of a routing protocol that determines its robustness to deliver packets in low routing packet overhead. In this paper, we thoroughly analyzed the Adaptive Monitor Based Routing (AMBR) protocol by varying different parameters that affect a routing protocol to measure its performance. Analysis shows that it requires less routing control overhead comparing with other prevalent routing protocols. An improved analytical model is also presented in this paper. All these analyses firmly prove that AMBR is a sound and robust protocol in terms of flooding, routing overhead and hence, enhances reliability
APA, Harvard, Vancouver, ISO, and other styles
30

H. Ripon, Shamim, Syed Fahin Ahmed, Afroza Yasmin, Yeaminar Rashid, and K. M. Imtiaz-Ud-Din. "Formal Analysis of a Ranked Neighbour MANET Protocol Suite." International Journal of Future Computer and Communication 3, no. 5 (October 2014): 325–30. http://dx.doi.org/10.7763/ijfcc.2014.v3.320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Khare, Surbhi, and Ritesh Shrivastav. "Analysis of Performance Quality of Next Generation Protocol: IPv6." International Journal of Trend in Scientific Research and Development Volume-2, Issue-2 (February 28, 2018): 314–18. http://dx.doi.org/10.31142/ijtsrd8386.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Sarvaiya, Ms Shilpa B. "Analysis of IoT Data Transfer Messaging Protocols on Application Layer." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (July 31, 2022): 1812–19. http://dx.doi.org/10.22214/ijraset.2022.45604.

Full text
Abstract:
Abstract: Now on a daily basis during a smarter embedded world, have Internet of Things. IoT have lot of things for the embedded systems, and it's the potential to remodel our world with the assistance of it. Internet of Things (IoT) or Web of Things (WoT) is emerging technology and it wireless network between two or more objects or smart things connect via Internet. IoT classified in two types first is within IoT and second side is outside of IoT. In inside IoT consider as protocols in IoT. In outside of IoT consider as sensor, actuators, etc., those are physically possible. In within IoT consider as protocol and IoT have own Protocol Stack. Protocol Stack has different layer like Application Layer, Transport Layer, Internet Layer and Physical/Link Layer. The judgmental role goal of IoT is to confirm effectual communication between two objects and build a sustained bond among them using different application. The application Layer liable for providing services and determining a group of protocol for message passing at the application Layer. This paper understands Application Layer Data Transfer Messaging Protocol like MQTT, AMQT, COAP, XMPP, DDS, HTTP, RESTFULL, and WEB-SOCKET. Also describe which sort of architecture (like Request/Response, Client/Server and Publish/Subscribe) and security (like DTLS, TCL/SSL and HTTPS) support in those protocols that decide upon appropriate protocol supported application needs.
APA, Harvard, Vancouver, ISO, and other styles
33

Ahsan, Usama, Muhammad Mubashir Khan, Asad Arfeen, and Khadija Azam. "Security analysis of KXB10 QKD protocol with higher-dimensional quantum states." International Journal of Quantum Information 18, no. 08 (December 2020): 2150005. http://dx.doi.org/10.1142/s0219749921500052.

Full text
Abstract:
Quantum key distribution (QKD) is one of the exciting applications of quantum mechanics. It allows the sharing of secret keys between two communicating parties with unconditional security. A variety of QKD protocols have been proposed since the inception of the BB84 protocol. Among different implementation techniques of QKD protocols, there is a category which exploits higher dimensions qubit states to encode classical bits. In this paper, we focus on such a QKD protocol called KXB10, which uses three bases with higher dimensions. Analysis of the generalized dimension quantum states is performed by evaluating it based on the index transmission error rate ITER. We find that there is a direct relationship between qubit dimensions and ITER for the KXB10 protocol.
APA, Harvard, Vancouver, ISO, and other styles
34

Takkouche, Bahi, and Guy Norman. "Meta-analysis Protocol Registration." Epidemiology 21, no. 5 (September 2010): 614–15. http://dx.doi.org/10.1097/ede.0b013e3181e9bbbd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Sedgwick, P. "Analysis by per protocol." BMJ 342, apr18 2 (April 18, 2011): d2330. http://dx.doi.org/10.1136/bmj.d2330.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Rodríguez, Raúl G. "The ethical analysis protocol." New Directions for Institutional Research 1992, no. 73 (1992): 57–66. http://dx.doi.org/10.1002/ir.37019927307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Shi, Lu-Feng, Karen A. Doherty, Tammy M. Kordas, and Joseph T. Pellegrino. "Short-Term and Long-Term Hearing Aid Benefit and User Satisfaction: A Comparison between Two Fitting Protocols." Journal of the American Academy of Audiology 18, no. 06 (June 2007): 482–95. http://dx.doi.org/10.3766/jaaa.18.6.3.

Full text
Abstract:
Currently published hearing aid fitting protocols recommend speech-in-noise testing and loudness measures, but it remains unclear how these measures affect hearing aid benefit and user satisfaction. This study compared two protocols in their effects on benefit and satisfaction. Protocol A included an electroacoustic analysis, real-ear measures, and hearing aid adjustments based on users' comments. Protocol B included all of Protocol A and a speech-in-noise test, loudness discomfort levels, and aided loudness. Thirty-two participants completed the Abbreviated Profile of Hearing Aid Benefit (APHAB) and the Satisfaction with Amplification in Daily Life (SADL) at 45 days and three months post–initial fitting. Fewer hearing aid adjustments were made to the hearing aids for participants fitted with Protocol B than participants fitted with Protocol A, but final gains were similar for both groups. Although similar APHAB scores were obtained for both protocols, SADL scores decreased between 45 days and three months for Protocol A. Los protocoles de amplificación de auxiliares auditivo actualmente publicados recomiendan pruebas de lenguaje en ruido y mediciones de apreciación subjetiva de la intensidad (sonoridad), pero no está claro cómo estas mediciones afectan el beneficio de un auxiliar auditivo y la satisfacción del usuario. El estudio comparó dos protocolos en cuanto a sus efectos sobre beneficio y satisfacción. El Protocolo A incluyó un análisis electroacústico, mediciones de oído real y ajuste en el auxiliar auditivo basados en los comentarios del usuario. El Protocolo B incluyó todas las pruebas del Protocolo A, además de una prueba de audición en ruido, de niveles de molestia en la apreciación subjetiva de la intensidad y de sonoridad amplificada. Treinta y dos participantes completaron el Perfil Abreviado de Beneficio del Auxiliar Auditivo (APHAB) y la prueba de Satisfacción con la Amplificación en la Vida Diaria (SADL) a los 45 días y a los tres meses de la adaptación inicial. Tuvieron que hacerse menos ajustes en el audífono en los auxiliares auditivos de participantes adaptados con el Protocolo B, que en los participantes adaptados con el Protocolo A, pero las ganancias finales fueron similares en ambos grupos. Aunque se obtuvieron puntajes APHAB similares en ambos protocolos, los puntajes SADL disminuyeron entre los 45 días y los tres meses para el Protocolo A.
APA, Harvard, Vancouver, ISO, and other styles
38

Zain, Alaa, Heba El-khobby, Hatem M. Abd Elkader, and Mostafa Abdelnaby. "MANETs performance analysis with dos attack at different routing protocols." International Journal of Engineering & Technology 4, no. 2 (May 17, 2015): 390. http://dx.doi.org/10.14419/ijet.v4i2.4609.

Full text
Abstract:
A Mobile Ad-Hoc Networks (MANET) is widely used in many industrial and people's life applications, such as earth monitoring, natural disaster prevention, agriculture biomedical related applications, and many other areas. Security threat is one of the major aspects of MANET, as it is one of the basic requirements of wireless sensor network, yet this problem has not been sufficiently explored. The main purpose of this paper is to study different MANETs routing protocols with three scenarios of Denial of Service (DoS) attacks on network layer using proactive routing protocol i.e. Optimized Link State Routing (OLSR) and Reactive routing protocols like Ad hoc On-Demand Distance Vector (AODV), Hybrid routing protocols like Geographic Routing Protocol (GRP). Moreover, a comparative analysis of DoS attacks for throughput, Data loss, delay and network load is taken into account. The performance of MANET under the attack is studied to find out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. The simulation is done using OPNET 17.
APA, Harvard, Vancouver, ISO, and other styles
39

Wei, Da Wei, Wei Liu, and Xiu Feng Zhao. "The Deniability Analysis for a Deniable Authentication Protocol." Applied Mechanics and Materials 195-196 (August 2012): 992–97. http://dx.doi.org/10.4028/www.scientific.net/amm.195-196.992.

Full text
Abstract:
The notion of deniable authentication is introduced by Dwork et al., deniable authentication protocols allow a sender to authenticate a message for receiver, in a way that the receiver cannot convince a third party that such authentication ever took place. Raimondo et al. present authentication protocol λProj and deniable version Den-λProj by adding challenge-response mechanism. In this paper we prove the protocol λProj without challenge-response is deniable against malicious verifier under subset witness assumption.
APA, Harvard, Vancouver, ISO, and other styles
40

Wang, Wei, and Qing Feng Cheng. "Analysis of Two ID-Based Key Exchange Protocols." Applied Mechanics and Materials 135-136 (October 2011): 289–93. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.289.

Full text
Abstract:
In this paper, we analyze two ID-based authenticated key exchange (AKE) protocols in the eCK model. One is a two-party AKE protocol between members of distinct domains proposed by Xia et al. in 2009. The other is a dynamic group AKE protocol proposed by Xie et al. in 2010. The results of analysis show that both of them are insecure in the eCK model.
APA, Harvard, Vancouver, ISO, and other styles
41

Kaur, Arshdeep, Sandeep Kumar Arora, and Mahedi Masud. "Comparative Analysis of Clustering using AODV DSDV and CBRP." International Journal of Engineering & Technology 7, no. 3.8 (July 7, 2018): 131. http://dx.doi.org/10.14419/ijet.v7i3.8.16847.

Full text
Abstract:
In a network whether wireless or wired, a set of protocols which are used to distribute the information through various routes between the nodes are said to be the routing protocols which serves as a majorly vital part of the computer networks. They specify the particular and specific path of information exchange by the sending and receiving of packets. Vehicular ad- hoc networks are quite emerging technologies of today’s era presenting the provision of seamless and uninterrupted communication in the network of mobile nodes in dynamic environment. Routing itself proves to be quite a considerable and crucial challenge where the routing protocol named AODV performs its best by proving itself considerably more efficient. The stated paper focuses on the Performance comparison of the conventional protocols AODV and DSDV where AODV outperforms DSDV and offers better QoS but such conventional protocol proves to be inauspicious in VANET. This paper gives verification of better QoS of cluster based routing protocol CBR over the conventional routing protocols. The Simulation and comparison results have been carried out in Network Simulator NS-2 to briefly elaborate the impact of AODV DSDV and CBR routing protocols on the bases of Throughput, Normalized Routing Load, Control overheads, delay, Jitter and Packet drop ratio as performance metrics.
APA, Harvard, Vancouver, ISO, and other styles
42

Feng, Tao, and Yi Wu. "Formal Security Analysis and Improvement Based on LonTalk Authentication Protocol." Security and Communication Networks 2022 (July 12, 2022): 1–19. http://dx.doi.org/10.1155/2022/8104884.

Full text
Abstract:
Security analysis of security protocol can be used to ensure communication security in the network. The process of security protocol analysis using the formal analysis method is simple and standardized, which is a research hotspot in the field of information security. In this study, a formal analysis method based on colored Petri net theory and Dolev-Yao attacker model is adopted to analyze LonTalk authentication protocol, and three types of attackable vulnerabilities including replay, tamper, and spoofing are found in LonTalk authentication protocol; thus, a secure LonTalk-SA authentication protocol is proposed. The LonTalk-SA authentication protocol was added with a trusted third-party server, which authenticates the identity of the sender and receiver and generates session keys through XOR operations on random numbers. The formal analysis of the new scheme shows that the new scheme can effectively resist three types of attacks, provide bidirectional authentication of communication nodes, and ensure the confidentiality, integrity, and authentication of messages during transmission, thus improving the security of protocols.
APA, Harvard, Vancouver, ISO, and other styles
43

Shaefer, Jeffry R., Cara Joy Riley, Paul Caruso, and David Keith. "Analysis of Criteria for MRI Diagnosis of TMJ Disc Displacement and Arthralgia." International Journal of Dentistry 2012 (2012): 1–8. http://dx.doi.org/10.1155/2012/283163.

Full text
Abstract:
Aims. To improve diagnostic criteria for TMJ disc displacement (DD).Methods. The standard protocol for MRI diagnosis of DD, using a 12 o’clock reference position, was compared to an alternative protocol. The alternative protocol involves the functional relationship between the condyle and articular eminence, using a line perpendicular to the posterior slope of the eminence as a reference for disc position. The disc location was examined using both protocols, and disc diagnoses were compared in their relationship with joint pain. Statistical analyses includedPvalue, sensitivity, specificity, odds ratio, and kappa statistic.Results. 58 MRIs were interpreted. 36 subjects reported arthralgia; 22 did not. Both protocols demonstrated significance (standardP=0.004, alternativeP<0.001) for the ability to predict arthralgia. The odds of arthralgia increased in DD patients diagnosed by standard methods 9.71 times and in DD diagnosed by alternative means 37.15 times. The diagnostic sensitivity decreased 30% using the alternative versus the standard protocol (0.6389 versus 0.9444), while specificity increased 60% (0.9545 versus 0.3636).Conclusions. A stronger relationship occurs between DD and arthralgia when using a function-based protocol. The alternative protocol correctly identifies subjects without arthralgia, who by standard methods would be diagnosed with DD, as having nondisplaced discs, providing a more clinically relevant assessment of TMJ disc displacement.
APA, Harvard, Vancouver, ISO, and other styles
44

Flinn, Barry, Savanah Dale, Andrew Disharoon, and Stephen Kresovich. "Comparative Analysis of In Vitro Responses and Regeneration between Diverse Bioenergy Sorghum Genotypes." Plants 9, no. 2 (February 14, 2020): 248. http://dx.doi.org/10.3390/plants9020248.

Full text
Abstract:
Sorghum has been considered a recalcitrant plant in vitro and suffers from a lack of regeneration protocols that function broadly and efficiently across a range of genotypes. This study was initiated to identify differential genotype-in vitro protocol responses across a range of bioenergy sorghum parental lines and the common grain sorghum genotype Tx430 in order to characterize response profiles for use in future genetic studies. Two different in vitro protocols, LG and WU, were used for comparisons. Distinct genotype-protocol responses were observed, and the WU protocol performed significantly better for plantlet regeneration. Most bioenergy genotypes performed as well, if not better than Tx430, with Rio and PI329311 as the top regenerating lines. Genotypes displayed protocol-dependent, differential phenolic exudation responses, as indicated by medium browning. During the callus induction phase, genotypes prone to medium browning exhibited a response on WU medium which was either equal or greater than on LG medium. Genotype- and protocol-dependent albino plantlet regeneration was also noted, with three of the bioenergy genotypes showing albino plantlet regeneration. Grassl, Rio and Pink Kafir were susceptible to albino plantlet regeneration, with the response strongly associated with the WU protocol. These bioenergy parental genotypes, and their differential responses under two in vitro protocols, provide tools to further explore and assess the role of genetic loci, candidate genes, and allelic variants in the regulation of in vitro responsiveness in sorghum.
APA, Harvard, Vancouver, ISO, and other styles
45

Feng, Tao, Taining Chen, and Xiang Gong. "Formal Security Analysis of ISA100.11a Standard Protocol Based on Colored Petri Net Tool." Information 15, no. 2 (February 18, 2024): 118. http://dx.doi.org/10.3390/info15020118.

Full text
Abstract:
This paper presents a formal security analysis of the ISA100.11a standard protocol using the Colored Petri Net (CPN) modeling approach. Firstly, we establish a security threat model for the ISA100.11a protocol and provide a detailed description and analysis of the identified security threats. Secondly, we use the CPN tool to model the protocol formally and conduct model checking and security analysis. Finally, we analyze and discuss the results of the model checking, which demonstrate that the ISA100.11a standard protocol may have vulnerabilities when certain security threats exist, and provide some suggestions to enhance the security of the protocol. This research provides a certain level of security assurance for the ISA100.11a standard protocol and serves as a reference for similar security research on protocols.
APA, Harvard, Vancouver, ISO, and other styles
46

Desai, Rahul M., B. P. Patil, and Davinder Pal Sharma. "Routing Protocols for Mobile Ad Hoc Network - A Survey and Analysis." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 3 (September 1, 2017): 795. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp795-801.

Full text
Abstract:
<p class="Default">Ad hoc networks are mobile wireless networks where each node is acting as a router. The existing routing protocols such as Destination sequences distance vector, Optimized list state routing protocols, Ad hoc on demand routing protocol, Ad hoc on demand multipath routing protocol, Dynamic source routing are optimized versions of distance vector or link state routing protocols. In this paper, existing protocols such as DSDV, AODV, AOMDV, OLSR and DSR are analyzed on 50 nodes Mobile Ad Hoc network with random mobility. Packet delivery ratio, delay, control overhead and throughput parameters are used for performance analysis.</p>
APA, Harvard, Vancouver, ISO, and other styles
47

Wang, Qun, Zhonghao Sun, Zhangquan Wang, Shiping Ye, Ziyi Su, Hao Chen, and Chao Hu. "A Practical Format and Semantic Reverse Analysis Approach for Industrial Control Protocols." Security and Communication Networks 2021 (March 12, 2021): 1–11. http://dx.doi.org/10.1155/2021/6690988.

Full text
Abstract:
Industrial control protocol is the basis of communication and interaction of industrial control system, and its security is related to the whole industrial infrastructure. Because many industrial control systems use proprietary protocols, it is necessary to adopt protocol reverse analysis technology to parse them and then detect whether there are secure vulnerabilities in the protocols by means of fuzzy testing. However, most of the existing technologies are designed for common network protocols, and there is no improvement for industrial control protocol. Therefore, we propose a multistage ensemble reverse analysis method, namely, MSERA, which fully considers the design concept of industrial control protocols. MSERA divides the traditional reverse analysis process into three stages and identifies the fields with different semantic characteristics in different stages and combines with field rectification to effectively improve the results of reverse analysis of industrial control protocols. Through the experimental comparison of some public and proprietary industrial control protocols, it is found that MSERA not only outperforms Netzob in the accuracy of field split but also far exceeds Netzob in semantic recognition accuracy. The experimental results show that MSERA is very practical and suitable for reverse analysis of industrial control protocols.
APA, Harvard, Vancouver, ISO, and other styles
48

Karanasiou, A., E. Diapouli, M. Viana, A. Alastuey, X. Querol, C. Reche, and K. Eleftheriadis. "On the quantification of atmospheric carbonate carbon by thermal/optical analysis protocols." Atmospheric Measurement Techniques Discussions 3, no. 6 (November 25, 2010): 5375–409. http://dx.doi.org/10.5194/amtd-3-5375-2010.

Full text
Abstract:
Abstract. Carbonaceous species, usually classified into two categories, organic carbon (OC) and elemental carbon (EC), constitute an important component of the atmospheric aerosol. Carbonate carbon (CC), or inorganic carbon, another constituent of carbonaceous material, is often not considered in many atmospheric chemistry studies. The reason for this may be its low contribution to fine particle mass in most areas studied, along with the difficulties in its analytical determination in atmospheric aerosols. The objective of this study was the quantification of atmospheric carbonate concentrations using the thermal optical transmittance method (Sunset Laboratory, Inc.). Three different temperature protocols (two modified NIOSH protocols and the EUSAAR-2 protocol) were tested on filter samples containing known amounts of CC. Moreover, the performance of the two most widely used protocols across European countries (NIOSH and EUSAAR-2) was also checked on two different instruments namely the semi-continuous OCEC analyzer and the laboratory OCEC analyzer. NIOSH-840 thermal protocol (NIOSH protocol with a maximum temperature of 840 °C in the He-mode) can be used for the detection and quantification of atmospheric carbonate concentrations. CC was determined in ambient PM10 and PM2.5 samples From Athens and Barcelona by using the NIOSH-840 thermal protocol. The results confirm that in South European countries CC may constitute a significant fraction of carbonaceous aerosols (~15%), thus it should not be neglected. However, the NIOSH-840 protocol seems to overestimate the OC concentrations when compared to the EUSAAR-2 protocol. The results suggest that during dust episodes, common for the Southern Europe, the analytical laboratories could use the NIOSH-840 protocol as a suitable method for the carbonate determination and manually integrate the sharp peak that appears in the maximum temperature step in the inert mode. Afterwards, carbonate should be evaporated by a fumigation method and one could then apply the EUSAAR-2 protocol for the precise determination of OC and EC fractions.
APA, Harvard, Vancouver, ISO, and other styles
49

Novotný, Marián. "Formal analysis of security protocols for wireless sensor networks." Tatra Mountains Mathematical Publications 47, no. 1 (December 1, 2010): 81–97. http://dx.doi.org/10.2478/v10127-010-0032-7.

Full text
Abstract:
Abstract Design of security protocols is notoriously error-prone. For this reason, it is required to use formal methods to analyze their security properties. In the paper we present a formal analysis of the Canvas protocol. The Canvas protocol was developed by Harald Vogt and should provide data integrity inWireless Sensor Networks. However, Dieter Gollmann published an attack on the protocol. We consider the fallacy of the Canvas scheme in different models of the attacker and present a solution for correcting the scheme.We propose a formal model of the fixed Canvas protocol in the applied pi-calculus. This model includes a model of the network topology, communication channels, captured nodes, and capabilities of the attacker. Moreover, we formulate and analyze the data integrity property of the scheme in the semantic model of the applied pi-calculus. We prove that the fixed Canvas scheme, in the presence of an active adversary, provides data integrity of messages assuming that captured nodes are not direct neighbors in the communication graph of a sensor network. Finally, we discuss the applicability of the proposed formal model for analysis of other WSN security protocols.
APA, Harvard, Vancouver, ISO, and other styles
50

Zhang, Yan, Lixin Gao, and Changfei Tong. "On Distributed Reduced-Order Observer-Based Protocol for Linear Multiagent Consensus under Switching Topology." Abstract and Applied Analysis 2013 (2013): 1–13. http://dx.doi.org/10.1155/2013/793276.

Full text
Abstract:
We discuss linear multiagent systems consensus problem with distributed reduced-order observer-based protocol under switching topology. We use Jordan decomposition method to prove that the proposed protocols can solve consensus problem under directed fixed topology. By constructing a parameter-dependent common Lyapunov function, we prove that the distributed reduced-order observer-based protocol can also solve the continuous-time multi-agent consensus problem under the undirected switching interconnection topology. Then, we investigate the leader-following consensus problem and propose a reduced-order observer-based protocol for each following agent. By using similar analysis method, we can prove that all following agents can track the leader under a class of directed interaction topologies. Finally, the given simulation example also shows the effectiveness of our obtained result.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography