Academic literature on the topic 'ARM protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'ARM protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "ARM protocol"
Wijdenes, Paula, Michael Brouwers, and Corry K. van der Sluis. "Prosthesis Prescription Protocol of the Arm (PPP-Arm): The implementation of a national prosthesis prescription protocol." Prosthetics and Orthotics International 42, no. 1 (January 4, 2018): 56–59. http://dx.doi.org/10.1177/0309364617747962.
Full textYang, Wei Ming. "Design of UART Downloading for Multi-Process Micro-Kernel Embedded OS on ARM." Applied Mechanics and Materials 389 (August 2013): 843–48. http://dx.doi.org/10.4028/www.scientific.net/amm.389.843.
Full textZhang, Jin Hai. "Study on Embedded TCP_IP Protocol and ARM Implementation." Applied Mechanics and Materials 556-562 (May 2014): 6046–49. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.6046.
Full textLi, Dan. "The Research of HART Sensor System Based on ARM." Applied Mechanics and Materials 602-605 (August 2014): 2855–58. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.2855.
Full textOdutayo, Ayodele, Dmitry Gryaznov, Bethan Copsey, Paul Monk, Benjamin Speich, Corran Roberts, Karan Vadher, et al. "Design, analysis and reporting of multi-arm trials and strategies to address multiple testing." International Journal of Epidemiology 49, no. 3 (March 16, 2020): 968–78. http://dx.doi.org/10.1093/ije/dyaa026.
Full textMorris, David M., and Ben R. Londeree. "The Effects of Bicycle Crank Arm Length on Oxygen Consumption." Canadian Journal of Applied Physiology 22, no. 5 (October 1, 1997): 429–38. http://dx.doi.org/10.1139/h97-027.
Full textSeys, Stefaan, and Bart Preneel. "ARM: anonymous routing protocol for mobile ad hoc networks." International Journal of Wireless and Mobile Computing 3, no. 3 (2009): 145. http://dx.doi.org/10.1504/ijwmc.2009.028896.
Full textHou, Jing Jing, and Gen Wang Liu. "A Design of Li-Ion Battery Formation System Based on ARM Embedded Computer." Advanced Materials Research 354-355 (October 2011): 998–1001. http://dx.doi.org/10.4028/www.scientific.net/amr.354-355.998.
Full textPedrosa, Gustavo F., Marina G. Simões, Marina O. C. Figueiredo, Lucas T. Lacerda, Brad J. Schoenfeld, Fernando V. Lima, Mauro H. Chagas, and Rodrigo C. R. Diniz. "Training in the Initial Range of Motion Promotes Greater Muscle Adaptations Than at Final in the Arm Curl." Sports 11, no. 2 (February 6, 2023): 39. http://dx.doi.org/10.3390/sports11020039.
Full textWalker, R., S. Powers, and M. K. Stuart. "Peak oxygen uptake in arm ergometry: effects of testing protocol." British Journal of Sports Medicine 20, no. 1 (March 1, 1986): 25–26. http://dx.doi.org/10.1136/bjsm.20.1.25.
Full textDissertations / Theses on the topic "ARM protocol"
Jonsson, Fredrik. "Arm-P : Almost Reliable Multicast protocol." Thesis, Linköping University, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-14954.
Full textDistribution of information across IP based networks is today part of our everyday life. IP is the backbone of the Internet and most office networks. We use IP to access web pages, listen to radio, and to create computation clusters. All these examples use bandwidth, and bandwidth is a limited resource.
Many applications distribute the same information to multiple receivers, but in many cases the same information is sent to a single receiver at a time, thus multiple copies of the same information is sent, thus consuming bandwidth.
What if the information could be broadcasted to all the clients at the same time, similar to a television broadcast. TCP/IP provides some means to do that. For example UDP supports broadcasting; the problem faced when using UDP is that it’s not reliable. There is no guarantee that the information actually reaches the clients.
This Bachelor thesis in Computer Science aims to investigate the problems and solutions of how to achieve reliable distribution of fixed size data sets using a non reliable multicast communication channel, like UDP, in a LAN environment.
The thesis defines a protocol (Almost Reliable Multicast Protocol – Arm-P) that provides maximum scalability for delivery of versioned data sets that are designed to work in a LAN-environment. A proof-of-concept application is implemented for testing purposes.
Engstrand, Johan. "A 3D-printed Fat-IBC-enabled prosthetic arm : Communication protocol and data representation." Thesis, Uppsala universitet, Fasta tillståndets elektronik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-420051.
Full textŠpanihel, Pavol. "Zabezpečovací modul pro reklamní robot FEKT VUT v Brně." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2012. http://www.nusl.cz/ntk/nusl-219649.
Full textZemánek, Petr. "Modulární RGB LED displej s rozhraním Ethernet." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220700.
Full textKrůpa, Tomáš. "Univerzální zavaděč pro mikrokontrolér Kinetis K60." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-255480.
Full textPérez, María del Carmen Marín. "Benchmarking and applications of a computational photobiology tool for design of novel and highly fluorescent rhodopsin proteins." Doctoral thesis, Università di Siena, 2019. http://hdl.handle.net/11365/1070289.
Full textNovotný, Jan. "Zpracování signálu UHF RFID čtečky." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-221225.
Full textSabt, Mohamed. "Outsmarting smartphones : trust based on provable security and hardware primitives in smartphones architectures." Thesis, Compiègne, 2016. http://www.theses.fr/2016COMP2320.
Full textThe landscape of mobile devices has been changed with the introduction of smartphones. Sincetheir advent, smartphones have become almost vital in the modern world. This has spurred many service providers to propose access to their services via mobile applications. Despite such big success, the use of smartphones for sensitive applications has not become widely popular. The reason behind this is that users, being increasingly aware about security, do not trust their smartphones to protect sensitive applications from attackers. The goal of this thesis is to strengthen users trust in their devices. We cover this trust problem with two complementary approaches: provable security and hardware primitives. In the first part, our goal is to demonstrate the limits of the existing technologies in smartphones architectures. To this end, we analyze two widely deployed systems in which careful design was applied in order to enforce their security guarantee: the Android KeyStore, which is the component shielding users cryptographic keys in Android smartphones, and the family of Secure Channel Protocols (SCPs) defined by the GlobalPlatform consortium. Our study relies on the paradigm of provable security. Despite being perceived as rather theoretical and abstract, we show that this tool can be handily used for real-world systems to find security vulnerabilities. This shows the important role that can play provable security for trust by being able to formally prove the absence of security flaws or to identify them if they exist. The second part focuses on complex systems that cannot cost-effectively be formally verified. We begin by investigating the dual-execution-environment approach. Then, we consider the case when this approach is built upon some particular hardware primitives, namely the ARM TrustZone, to construct the so-called Trusted Execution Environment (TEE). Finally, we explore two solutions addressing some of the TEE limitations. First, we propose a new TEE architecture that protects its sensitive data even when the secure kernel gets compromised. This relieves service providers of fully trusting the TEE issuer. Second, we provide a solution in which TEE is used not only for execution protection, but also to guarantee more elaborated security properties (i.e. self-protection and self-healing) to a complex software system like an OS kernel
Prítel, Pavol. "Implementace protokolu EtherCAT pro procesor ARM." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-240937.
Full textSanti, Juliana de 1982. "Gerenciamento ativo de filas para o protocolo "High Speed Transmission Control Protocol" em redes com produto banda-atraso elevado." [s.n.], 2008. http://repositorio.unicamp.br/jspui/handle/REPOSIP/276151.
Full textDissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação
Made available in DSpace on 2018-08-13T10:35:13Z (GMT). No. of bitstreams: 1 Santi_Julianade_M.pdf: 1658984 bytes, checksum: 8a9f078587406a06815484e4fe057f7d (MD5) Previous issue date: 2008
Resumo: A utilização eficiente da banda passante em redes de alta velocidade e grandes atrasos, denominadas redes com produto banda-atraso elevado (PBA), tornou-se um grande desafio. Isto ocorre devido aos ajustes do protocolo Transmission Control Protocol (TCP). O High Speed TCP (HSTCP), uma variante do TCP para redes com PBA elevado, emprega ajustes mais agressivos permitindo, assim, que a utilização da banda seja escalável. As políticas de Gerenciamento Ativo de Filas ou Active Queue Management (AQM), monitoram o nível de ocupação das filas nos roteadores e notificam o congestionamento incipiente aos emissores TCP através do descarte/marcação de pacotes. O sistema de controle de congestionamento apresenta natureza de retroalimentação, na qual a taxa de transmissão dos nós fontes é ajustada em função do nível de ocupação da fila. Os controladores AQM determinam a probabilidade de descarte/marcação para maximizar a vazão e minimizar perdas, garantindo, assim, a estabilidade do tamanho da fila independentemente das variações das condições da rede. Neste trabalho, define-se a política de gerenciamento ativo de filas HSTCP-H2 para redes com PBA elevado que utilizam o protocolo HSTCP. Para a derivação de HSTCPH2: são utilizadas técnicas de Teoria de Controle Ótimo. A principal característica desta política é considerar o atraso do sistema o que permite melhor utilização dos recursos disponíveis. A estabilidade e os objetivos de desempenho do sistema são expressos e solucionados através de Desigualdades Matriciais Lineares, permitindo que os parâmetros do controlador possam ser calculados através da solução de um problema convexo simples. Diferentes controladores foram derivados considerando-se diferentes objetivos de desempenho, os quais consideram as características de redes com produto banda-atraso elevado. Através de simulações, os desempenhos dos controladores derivados são avaliados e a eficácia do controlador que apresentou o melhor desempenho foi comparado com o desempenho da política de AQM RED. São considerados cenários com enlace gargalo único e com múltiplos gargalos.
Abstract: The efficient utilization of bandwidth in high speed and large delay networks, called high bandwidth-delay product networks (BDP), has become a major challenge. This is due to adjustments of the Transmission Control Protocol (TCP). The High Speed TCP HSTCP): a TCP variant to high BDP networks, employs more aggressive adjustments, allowing scalable bandwidth utilization. The Active Queue Management (AQM) policies monitor the queue length in the routers and notify incipient congestion to TCP source by marking or dropping packets. The congestion control system presents intrinsic feedback nature, where the transmission rates of the sources are adjusted according to the level of congestion inferred by the queue occupancy. The AQM controllers determine the dropping marking probability values to maximize throughput and minimize losses, giving guarantees to stabilize the queue length independent of network conditions. In this work, it is defined HSTCP-H2, an active queue management policy to high BDP networks, which adopt the HSTCP as their transport protocol. Optimal control theory is used to conceive HSTCP-H2. The novelty of the proposed approach lies in consider the delay of the system which allows better use of available resources. Furthermore, in the proposed approach, stability and performance objectives are completely expressed as Linear Matrix Inequalities (LMIs), thus requiring the solution of a single convex problem for the computation of the controller parameters. Different controllers are derived considering different design goals, which take into account the characteristics of the high bandwidth-delay product networks. The performance produced by different optimal controllers was investigated. The efficacy of the controller with the best performance was then compared to the performance of RED policy. The simulation experiments were carried out using topologies with single and multiple bottleneck.
Mestrado
Redes de Computadores
Mestre em Ciência da Computação
Books on the topic "ARM protocol"
Parker, Sue. 'Protocols are good for nurses'. Sutton: Reed Healthcare Communications, 1998.
Find full textDocumentary protocols: Protocoles documentaires (1967-1975) / sous la direction de Vincent Bonin avec la collaboration de Michèle Thériault. Montréal (Québec) Canada: Galerie Leonard & Bina Ellen Art Gallery, 2010.
Find full text1933-, Vazan Bill, and Musée national des beaux-arts du Québec, eds. Les matins infidèles: L'art du protocole. Québec, Québec: Musée national des beaux-arts du Québec, 2013.
Find full textPardon me, your manners are showing!: Professional etiquette, protocol & diplomacy. Grand Forks, ND: Center for Innovation & Business Development, 1992.
Find full textRizzo, Galleria Michela, and Biennale di Venezia (55th : 2013 : Venice, Italy), eds. Protocolli veneziani I. Cinisello Balsamo, Milano: Silvana, 2013.
Find full textJones, Robin, Scott W. Miller, Nicole Cappuccio, and Jennifer Courtwright. AIM national aquatic monitoring framework: Field protocol for wadeable lotic systems. Denver, Colo: U.S. Department of the Interior, Bureau of Land Management, National Operations Center, 2017.
Find full textR, Chari P., Rajain Arpit, and Institute of Peace and Conflict Studies (New Delhi, India), eds. Working towards a verification protocol for biological weapons. New Delhi: Institute of Peace and Conflict Studies, 2001.
Find full textMitosis: Methods and protocols. Dordrecht: Humana Press, 2009.
Find full textProtocolos críticos. São Paulo, SP, Brasil: Iluminuras, 2008.
Find full textMiller, Derek. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations Institute for Disarmament Research, 2008.
Find full textBook chapters on the topic "ARM protocol"
González, Laura Pedraza, Leonardo Barneschi, Daniele Padula, Luca De Vico, and Massimo Olivucci. "Evolution of the Automatic Rhodopsin Modeling (ARM) Protocol." In Topics in Current Chemistry Collections, 105–52. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-07658-9_5.
Full textBina, T. S., M. E. Kunkel, E. G. R. dos Anjos, R. C. Ribeiro, T. V. Ribeiro, and H. D. Silveira. "Creation of a 3D printing protocol for the unlimbited arm prosthesis." In Advances and Current Trends in Biomechanics, 327–30. London: CRC Press, 2021. http://dx.doi.org/10.1201/9781003217152-72.
Full textFerrario, Cinzia, Yousra Ben Khadra, Michela Sugni, M. Daniela Candia Carnevali, Pedro Martinez, and Francesco Bonasoro. "Studying Echinodermata Arm Explant Regeneration Using Echinaster sepositus." In Methods in Molecular Biology, 263–91. New York, NY: Springer US, 2022. http://dx.doi.org/10.1007/978-1-0716-2172-1_14.
Full textPeng, Daogang, Hao Zhang, Jiannian Weng, Hui Li, and Fei Xia. "Development of EPA Protocol Information Enquiry Service System Based on Embedded ARM Linux." In Web Information Systems and Mining, 363–72. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-05250-7_39.
Full textKoziel, Brian, Amir Jalali, Reza Azarderakhsh, David Jao, and Mehran Mozaffari-Kermani. "NEON-SIDH: Efficient Implementation of Supersingular Isogeny Diffie-Hellman Key Exchange Protocol on ARM." In Cryptology and Network Security, 88–103. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-48965-0_6.
Full textBimonte-Nelson, Heather A. "The Water Radial-Arm Maze: Four Out of Eight Arms Platformed Protocol for Rodents." In The Maze Book, 411–19. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4939-2159-1_15.
Full textBimonte-Nelson, Heather A. "The Water Radial-Arm Maze: Seven Out of Eight Arms Platformed Protocol for Rodents." In The Maze Book, 421–27. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4939-2159-1_16.
Full textDaniel, Jill M. "The Land Radial-Arm Maze: Eight Out of Eight Arms Baited with Food Protocol for Rodents." In The Maze Book, 429–32. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4939-2159-1_17.
Full textChoi, Joonwon, Adam Chlipala, and Arvind. "Hemiola: A DSL and Verification Tools to Guide Design and Proof of Hierarchical Cache-Coherence Protocols." In Computer Aided Verification, 317–39. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13188-2_16.
Full textCrocker, Trisha, and Susan M. D. Carr. "Intervention Protocol." In Clay Work and Body Image in Art Therapy, 137–50. New York: Routledge, 2021.: Routledge, 2021. http://dx.doi.org/10.4324/9781003097884-11.
Full textConference papers on the topic "ARM protocol"
Wido, Daniel M., Denis J. DiAngelo, and Brian P. Kelly. "Robotic Simulation of an Eccentric Lever Arm Protocol and a Novel Head Weight Protocol for Evaluation of the Subaxial Cervical Spine: An In Vitro Biomechancial Comparison." In ASME 2011 Summer Bioengineering Conference. American Society of Mechanical Engineers, 2011. http://dx.doi.org/10.1115/sbc2011-53740.
Full textMeling, Hein, and Alberto Montresor. "Type-safe dynamic protocol composition in Jgroup/ARM." In the 3rd International DiscCoTec Workshop. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1566966.1566967.
Full textSeys, S., and B. Preneel. "ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks." In 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06). IEEE, 2006. http://dx.doi.org/10.1109/aina.2006.104.
Full textJadhav, A. D., and S. D. Mali. "RTOS based MODBUS protocol implementation on ARM-7 processor." In the International Conference & Workshop. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/1980022.1980298.
Full textKelong Wang, Daogang Peng, Lei Song, and Hao Zhang. "Implementation of Modbus Communication Protocol based on ARM Coretx-M0." In 2014 International Conference on System Science and Engineering (ICSSE). IEEE, 2014. http://dx.doi.org/10.1109/icsse.2014.6887907.
Full textLou Guohuan, Cai Haiting, and Li Shujie. "Research and implementation of ARM-based fieldbus protocol conversion method." In 2010 International Conference On Computer and Communication Technologies in Agriculture Engineering (CCTAE). IEEE, 2010. http://dx.doi.org/10.1109/cctae.2010.5544399.
Full textMartinez, H. I. H., C. A. C. Morales, and O. A. Martinez. "Automation of a robotic arm by analysing the CAN protocol." In 14th International Conference on Electronics, Communications and Computers, 2004. CONIELECOMP 2004. IEEE, 2004. http://dx.doi.org/10.1109/icecc.2004.1269539.
Full textAtmoko, Rachmad Andri, and Daoguo Yang. "Online Monitoring & Controlling Industrial Arm Robot Using MQTT Protocol." In 2018 IEEE International Conference on Robotics, Biomimetics, and Intelligent Computational Systems (Robionetics ). IEEE, 2018. http://dx.doi.org/10.1109/robionetics.2018.8674672.
Full textRupalwala, Shahin S. "ARM 11 based real-time video streaming server using RTSP protocol." In 2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO). IEEE, 2015. http://dx.doi.org/10.1109/eesco.2015.7253964.
Full textZola, Enrica, Israel Martin-Escalona, Francisco Barcelo-Arroyo, and Sergio Machado. "Implementation and analysis of the AODVv2 Routing Protocol in ARM devices." In 2021 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2021. http://dx.doi.org/10.1109/isncc52172.2021.9615672.
Full textReports on the topic "ARM protocol"
Quak, Evert-jan. Lessons Learned from Community-based Management of Acute Malnutrition (CMAM) Programmes that Operate in Fragile or Conflict Affected Settings. Institute of Development Studies (IDS), September 2021. http://dx.doi.org/10.19088/k4d.2021.133.
Full textChen, Po-Wei, Hsiao-Yuan Su, Chih-Hsing Wu, Jih-I. Yeh, Ching-Hui Loh, Li-Yu Chen, Huei-Kai Huang, and Shu-Man Lin. Association of Bisphosphonates with Risk of Incident Diabetes and Glycemic Control: A Protocol of Systematic Review and Meta-analysis. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, April 2022. http://dx.doi.org/10.37766/inplasy2022.4.0125.
Full textAndersen, K. The Authenticated Received Chain (ARC) Protocol. Edited by B. Long, S. Blank, and M. Kucherawy. RFC Editor, July 2019. http://dx.doi.org/10.17487/rfc8617.
Full textPstuty, Norbert, Mark Duffy, Dennis Skidds, Tanya Silveira, Andrea Habeck, Katherine Ames, and Glenn Liu. Northeast Coastal and Barrier Network Geomorphological Monitoring Protocol: Part I—Ocean Shoreline Position, Version 2. National Park Service, June 2022. http://dx.doi.org/10.36967/2293713.
Full textZareian, Farzin, and Joel Lanning. Development of Testing Protocol for Cripple Wall Components (PEER-CEA Project). Pacific Earthquake Engineering Research Center, University of California, Berkeley, CA, November 2020. http://dx.doi.org/10.55461/olpv6741.
Full textSprague, Joshua, David Kushner, James Grunden, Jamie McClain, Benjamin Grime, and Cullen Molitor. Channel Islands National Park Kelp Forest Monitoring Program: Annual report 2014. National Park Service, August 2022. http://dx.doi.org/10.36967/2293855.
Full textArkko, J., and C. Pignataro. IANA Allocation Guidelines for the Address Resolution Protocol (ARP). RFC Editor, April 2009. http://dx.doi.org/10.17487/rfc5494.
Full textChu, Dahtzen, James Miller, David Underwood, Stuart Foltz, Scott Lux, Eileen Westervelt, Juan Davila-Perez, et al. Standard protocol for protective storage of dormant Army facilities. Engineer Research and Development Center (U.S.), September 2018. http://dx.doi.org/10.21079/11681/29289.
Full textMartins, Francisco, Cíntia França, Francisco Santos, Diogo Martinho, Carolina Saldanha, and Élvio Rúbio Gouveia. Emerging technologies to promote fans interaction in football events: a systematic review. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, February 2023. http://dx.doi.org/10.37766/inplasy2023.2.0015.
Full textLeis, Sherry, Mike DeBacker, Lloyd Morrison, Gareth Rowell, and Jennifer Haack. Vegetation community monitoring protocol for the Heartland Inventory and Monitoring Network: Narrative, Version 4.0. Edited by Tani Hubbard. National Park Service, November 2022. http://dx.doi.org/10.36967/2294948.
Full text