Journal articles on the topic 'Computer network protocols – Testing'

To see the other types of publications on this topic, follow the link: Computer network protocols – Testing.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer network protocols – Testing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Che, Xiaoping, and Stephane Maag. "Passive performance testing of network protocols." Computer Communications 51 (September 2014): 36–47. http://dx.doi.org/10.1016/j.comcom.2014.06.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sidhu, D. P., and C. S. Chang. "Probabilistic testing of protocols." ACM SIGCOMM Computer Communication Review 19, no. 4 (August 1989): 295–302. http://dx.doi.org/10.1145/75247.75275.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yang, Xiao Jing, and Sheng Li Chen. "Study on a Wireless Temperature and Humidity Monitoring System for Workshop with Constant Temperature Based on SCM." Applied Mechanics and Materials 701-702 (December 2014): 593–97. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.593.

Full text
Abstract:
A wireless temperature and humidity monitoring system for workshop with constant temperature based on AT89C52 Single chip microcomputer and nRF905 wireless microchip is studied. The system is consists of base station and slave station. Base station is mainly consists of temperature acquisition module, humidity acquisition module, wireless communicating module and communicating testing module. Good communication protocols play an important role in ensuring the correct monitoring data. So the network topology, communication data form, ad hoc networks protocol, mac protocol and data link layer protocols are discussed for commutation protocol to host computer software. The cost of the system is low and it has a large function area and a good performance. It is able to provide messages of workshop with constant temperature for improving machining accuracy and prolonging the life of equipment in machine shop.
APA, Harvard, Vancouver, ISO, and other styles
4

Jedermann, Reiner, Markus Becker, Carmelita Gorg, and Walter Lang. "Testing network protocols and signal attenuation in packed food transports." International Journal of Sensor Networks 9, no. 3/4 (2011): 170. http://dx.doi.org/10.1504/ijsnet.2011.040238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Olenev, Valentin, Irina Lavrovskaya, Yuriy Sheynin, Ilya Korobkov, Elena Suvorova, Elena Podgornova, Dmitry Dymov, and Sergey Kochura. "STP-ISS Transport Protocol for SpaceWire On-Board Networks." International Journal of Embedded and Real-Time Communication Systems 5, no. 4 (October 2014): 45–76. http://dx.doi.org/10.4018/ijertcs.2014100103.

Full text
Abstract:
The paper describes the development of a new transport protocol for the SpaceWire onboard networks. It starts from the overview and analysis of existing SpaceWire-oriented transport protocols. Then the paper considers the general industrial requirements for the Transport protocol, which should operate over the SpaceWire network technology. The main two chapters of the paper present the first and the second revisions of the new STP-ISS transport protocol, which has been developed in accordance with the results of the overview and technical requirements. In addition, the authors describe STP-ISS modeling process, which was very efficient for the STP ISS protocol development, testing, analysis and improvement.
APA, Harvard, Vancouver, ISO, and other styles
6

Riska, Riska, and Hendri Alamsyah. "Analisis Perbandingan Protokol Transport Pada Video Streaming di Jaringan Lokal (LAN) Menggunakan Videolan Client." JURNAL MEDIA INFORMATIKA BUDIDARMA 3, no. 2 (April 14, 2019): 126. http://dx.doi.org/10.30865/mib.v3i2.1110.

Full text
Abstract:
The use of video streaming on computer networks uses the method of delivering multimedia content in the form of streaming that can be done with several transport protocols such as RTP, RTSP, and HTTP. The protocol has its own character and of course also has its own quality comparison. Therefore, this study will compare the quality of each of these protocols. The assessment criteria to be carried out in this study are the value of throughput, delay and jitter. Streaming video will be done with the VLC application and measuring the quality of services using the Wireshark application. From the results of the testing that the author did, the best video streaming quality on the local network is using HTTP protocol with a throughput value of 418.635 kbps, Delay 8.65 ms, and jitter 19,618 ms.
APA, Harvard, Vancouver, ISO, and other styles
7

Warman, Indra, and Alex Franozal. "QoS Analysis on OSPFv3 And RIPng Using GRE Tunneling on IPv6 Integrated Ipv4 Network." MATEC Web of Conferences 215 (2018): 01005. http://dx.doi.org/10.1051/matecconf/201821501005.

Full text
Abstract:
Every year, the availability of public IPv4 addresses is running low. However, the IETF (Internet Engineering Task Force) has set a new addressing standard called IPv6 (Internet Protocol version 6). IPv6 implementations can not be immediately performed on all end-to-end lines, a transition phase is required, one of which is the GRE tunneling method. IPv6 has some differences with IPv4, then in line with the presence of IPv6 will required the protocol that compatible with IPv6, among which is the routing protocol. Some dynamic routing protocols are created to support and can run on IPv6 such as RIPng and OSPFv3. Aim of this study is examines OSPFv3 routing protocols and RIPng routing protocols in terms of Quality of Service (QoS). The test is done by using seven routers with three scenarios in each routing protocol, ie scenario with best path active condition, when the network changes in other words best path down, and the scenario with best path condition has changed and the network has returned to normal. Testing is done by testing QoS parameters (delay, packet loss, and throughput) when the client computer downloads files with the .iso extension from the server. Downloaded files have different sizes, from 100 Mega Byte to 1 Giga Byte. From the results obtained that OSPFv3 provides better QoS (delay, packet loss, and throughput) than RIPng on integrated IPv6 network using GRE tunnel and can be a reference when going to transition from IPv4 to IPv6 using GRE Tunnel.
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Yujun. "Transport Mechanism Applied to Computer Network Protocol Conformance Testing." Journal of Computer Research and Development 42, no. 1 (2005): 102. http://dx.doi.org/10.1360/crad20050114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mohd Fuzi, Mohd Faris, Khairunnisa Abdullah, Iman Hazwam Abd Halim, and Rafiza Ruslan. "Network Automation using Ansible for EIGRP Network." Journal of Computing Research and Innovation 6, no. 4 (September 20, 2021): 59–69. http://dx.doi.org/10.24191/jcrinn.v6i4.237.

Full text
Abstract:
Network automation has evolved into a solution that emphasizes efficiency in all areas. Furthermore, communication and computer networks rely on a platform that provides the necessary technological infrastructure for packet transfer through the Internet using routing protocols. The Enhanced Interior Gateway Routing Protocol (EIGRP) is a hybrid routing protocol that combines the properties of both distance-vector and link-state routing methods. The traditional technique to configure EIGRP is inefficient and requires repeated processes compared to the network automation concept. Network automation helps to assist network administrators in automating and verifying the EIGRP configuration using scripting. This paper implemented network automation using Ansible to configure EIGRP routing and advanced configuration in the GNS3 environment. This study is focused on automated scripting to configure IP Addresses to the interfaces, EIGRP routing protocol, a default static route and advanced EIGRP configurations. Ansible ran the scripting on Network Automation Docker and pushed the configurations to the routers. The network automation docker communicated with other routers via SSH. In the testing phase, the running configuration between the traditional approach and automation scripting in the Ansible playbook was compared to verify EIGRP configurations' accuracy. The findings show that Ansible has successfully deployed the configuration to the routers with no errors. Ansible can help network administrators minimized human mistakes, reduce time-consuming and enable device visibility across the network environment. Implementing EIGRP authentication and hardening process can enhance the network security level for future study.
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Qun, Zhonghao Sun, Zhangquan Wang, Shiping Ye, Ziyi Su, Hao Chen, and Chao Hu. "A Practical Format and Semantic Reverse Analysis Approach for Industrial Control Protocols." Security and Communication Networks 2021 (March 12, 2021): 1–11. http://dx.doi.org/10.1155/2021/6690988.

Full text
Abstract:
Industrial control protocol is the basis of communication and interaction of industrial control system, and its security is related to the whole industrial infrastructure. Because many industrial control systems use proprietary protocols, it is necessary to adopt protocol reverse analysis technology to parse them and then detect whether there are secure vulnerabilities in the protocols by means of fuzzy testing. However, most of the existing technologies are designed for common network protocols, and there is no improvement for industrial control protocol. Therefore, we propose a multistage ensemble reverse analysis method, namely, MSERA, which fully considers the design concept of industrial control protocols. MSERA divides the traditional reverse analysis process into three stages and identifies the fields with different semantic characteristics in different stages and combines with field rectification to effectively improve the results of reverse analysis of industrial control protocols. Through the experimental comparison of some public and proprietary industrial control protocols, it is found that MSERA not only outperforms Netzob in the accuracy of field split but also far exceeds Netzob in semantic recognition accuracy. The experimental results show that MSERA is very practical and suitable for reverse analysis of industrial control protocols.
APA, Harvard, Vancouver, ISO, and other styles
11

Liu, Xinyao, Baojiang Cui, Junsong Fu, and Jinxin Ma. "HFuzz: Towards automatic fuzzing testing of NB-IoT core network protocols implementations." Future Generation Computer Systems 108 (July 2020): 390–400. http://dx.doi.org/10.1016/j.future.2019.12.032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Uyar, M. Ümit, Mariusz A. Fecko, Adarshpal S. Sethi, and Paul D. Amer. "Testing protocols modeled as FSMs with timing parameters." Computer Networks 31, no. 18 (August 1999): 1967–88. http://dx.doi.org/10.1016/s1389-1286(99)00007-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Cheung, Long Fung, King Shan Lui, Kenneth Kin Yip Wong, Wing Kin Lee, and Philip W. T. Pong. "A Laboratory-Based Smart Grid Sensor Network Testbed." Applied Mechanics and Materials 479-480 (December 2013): 747–52. http://dx.doi.org/10.4028/www.scientific.net/amm.479-480.747.

Full text
Abstract:
A laboratory-based sensor network testbed for Smart Grid was developed at the Smart Grid and High Power System Laboratory of The University of Hong Kong. The setup is featured by a scaled transmission-line model, visualization of sensor measurement, optical communication network, and integration with global positioning system (GPS). The transmission-line model consists of a power cable and towers in which various types of sensors including magnetic sensors, infrared sensors, strain gauges, and accelerometers are installed to monitor the condition of the transmission line and the transmission towers. Magnetic sensors and infrared sensor are employed as advanced sensors which can provide more accurate and comprehensive information of the transmission line. The sensor data is transferred to the computer for analysis and visualization. Graphical user interface (GUI) was designed in LabVIEW to integrate the data acquisition and display of measurement results including cable position, inclination and vibration of the tower, frequency and waveform of the cable current. The host computer also forms an IP network with five remote computers, via optical fiber and optical interface card, for testing various communication protocols. The topology and connectivity of the network is graphically displayed. The sensor network is integrated with GPS and can perform synchronized measurement with the GPS timing. This sensor network testbed provides a platform for the implementation testing, experimentation, and feasibility evaluation of new sensor applications under test in Smart Grid.
APA, Harvard, Vancouver, ISO, and other styles
14

Lin, Weiwei, Hongwei Zeng, Honghao Gao, Huaikou Miao, and Xiaolin Wang. "Test Sequence Reduction of Wireless Protocol Conformance Testing to Internet of Things." Security and Communication Networks 2018 (November 1, 2018): 1–13. http://dx.doi.org/10.1155/2018/3723691.

Full text
Abstract:
Wireless communication protocols are indispensable in Internet of Things (IoT), which refer to rules and conventions that must be followed by both entities to complete wireless communication or service. Wireless protocol conformance testing concerns an effective way to judge whether a wireless protocol is carried out as expected. Starting from existing test sequence generation methods in conformance testing, an improved method based on overlapping by invertibility and multiple unique input/output (UIO) sequences is proposed in this paper. The method is accomplished in two steps: first, maximum-length invertibility-dependent overlapping sequences (IDOSs) are constructed, then a minimum-length rural postman tour covering the just constructed set of maximum-length IDOSs is generated and a test sequence is extracted from the tour. The soundness and effectiveness of the method are analyzed. Theory and experiment show that desirable test sequences can be yielded by the proposed method to reveal violations of wireless communication protocols in IoT.
APA, Harvard, Vancouver, ISO, and other styles
15

Wang, Alf Inge, Martin Jarrett, and Eivind Sorteberg. "Experiences from Implementing a Mobile Multiplayer Real-Time Game for Wireless Networks with High Latency." International Journal of Computer Games Technology 2009 (2009): 1–14. http://dx.doi.org/10.1155/2009/530367.

Full text
Abstract:
This paper describes results and experiences from designing, implementing, and testing a multiplayer real-time game over mobile networks with high latency. The paper reports on network latency and bandwidth measurements from playing the game live over GPRS, EDGE, UMTS, and WLAN using the TCP and the UDP protocols. These measurements describe the practical constraints of various wireless networks and protocols when used for mobile multiplayer game purposes. Further, the paper reports on experiences from implementing various approaches to minimize issues related to high latency. Specifically, the paper focuses on a discussion about how much of the game should run locally on the client versus on the server to minimize the load on the mobile device and obtain sufficient consistency in the game. The game was designed to reveal all kinds of implementation issues of mobile network multiplayer games. The goal of the game is for a player to push other players around and into traps where they loose their lives. The game relies heavily on collision detection between the players and game objects. The paper presents experiences from experimenting with various approaches that can be used to handle such collisions, and highlights the advantages and disadvantages of the various approaches.
APA, Harvard, Vancouver, ISO, and other styles
16

Umar, Rusydi, Imam Riadi, and Ridho Surya Kusuma. "Mitigating Sodinokibi Ransomware Attack on Cloud Network Using Software-Defined Networking (SDN)." International Journal of Safety and Security Engineering 11, no. 3 (June 30, 2021): 239–46. http://dx.doi.org/10.18280/ijsse.110304.

Full text
Abstract:
Sodinokibi Ransomware virus becomes a severe threat by targeting data encryption on a server, and this virus infection continues to spread to encrypt data on other computers. This study aims to mitigate by experiment with building a prevention system through computer network management. The mitigation process is carried out through static, dynamic, and Software-Defined Networking (SDN) analysis to prevent the impact of attacks through programmatic network management. SDN consists of two main components in its implementation, the Ryu controller and Open Virtual Switch (OVS). Result testing mitigation system on infected networks by crippling TCP internet protocol access can reduce virus spread by 17.13% and suppress Sodinokibi traffic logs by up to 73.97%. Based on the percentage data, SDN-based mitigation in this study is per the objectives to make it possible to mitigate Ransomware attacks on computer network traffic.
APA, Harvard, Vancouver, ISO, and other styles
17

Herschel, Richard, Hamid Nemati, and David Steiger. "Knowledge Exchange Protocols: A Second Study." Journal of Information & Knowledge Management 02, no. 02 (June 2003): 153–63. http://dx.doi.org/10.1142/s0219649203000085.

Full text
Abstract:
In the knowledge management domain, the conversion of tacit knowledge to explicit knowledge is critical because it is a prerequisite to the knowledge amplification process wherein knowledge becomes part of an organization's knowledge network. Moreover, this process is strategically important because it enhances an organization's ability to create new knowledge that is inevitably expressed through the organization's capabilities, products, and services. The conversion of tacit to explicit knowledge is particularly relevant to information technology (IT), because IT can only partially facilitate tacit knowledge management, while it offers a substantial number of techniques to support the management and sharing of explicit knowledge. In this paper, knowledge exchange protocols are examined as a vehicle for improving the tacit-to-explicit knowledge conversion process. In a second experiment testing the use of knowledge exchange protocols, initial findings are confirmed: while structure may significantly improve the tacit-to-explicit knowledge conversion process, it also matters how the structure is employed in this process.
APA, Harvard, Vancouver, ISO, and other styles
18

Bishop, Steve, Matthew Fairbairn, Michael Norrish, Peter Sewell, Michael Smith, and Keith Wansbrough. "Rigorous specification and conformance testing techniques for network protocols, as applied to TCP, UDP, and sockets." ACM SIGCOMM Computer Communication Review 35, no. 4 (October 2005): 265–76. http://dx.doi.org/10.1145/1090191.1080123.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Korniyenko, Bogdan, and Liliya Galata. "MODELING OF INFORMATION SECURITY SYSTEM IN COMPUTER NETWORK." Information systems and technologies security, no. 1 (1) (2019): 36–41. http://dx.doi.org/10.17721/ists.2019.1.36-41.

Full text
Abstract:
This article presents simulation modeling process as the way to study the behavior of the Information Security system. Graphical Network Simulator is used for modeling such system and Kali Linux is used for penetration testing and security audit. To implement the project GNS3 package is selected. GNS3 is a graphical network emulator that allows you to simulate a virtual network of more than 20 different manufacturers on a local computer, connect a virtual network to a real one, add a full computer to the network, Third-party Applications for network packet analysis are supported. Depending on the hardware platform on which GNS3 will be used, it is possible to build complex projects consisting of routers Cisco, Cisco ASA, Juniper, as well as servers running network operating systems. Using modeling in the design of computing systems, you can: estimate the bandwidth of the network and its components; identify vulnerability in the structure of computing system; compare different organizations of a computing system; make a perspective development forecast for computer system; predict future requirements for network bandwidth; estimate the performance and the required number of servers in the network; compare various options for computing system upgrading; estimate the impact of software upgrades, workstations or servers power, network protocols changes on the computing system. Research computing system parameters with different characteristics of the individual components allows us to select the network and computing equipment, taking into account its performance, quality of service, reliability and cost. As the cost of a single port in active network equipment can vary depends on the manufacturer's equipment, technology used, reliability, manageability. The modeling can minimize the cost of equipment for the computing system. The modeling becomes effective when the number of workstations is 50-100, and when it more than 300, the total savings could reach 30-40% of project cost
APA, Harvard, Vancouver, ISO, and other styles
20

Zhang, Hong, and Jie Li. "Dynamical Topology Analysis Of Vanet Based On Complex Networks Theory." Cybernetics and Information Technologies 14, no. 5 (December 1, 2014): 172–86. http://dx.doi.org/10.2478/cait-2014-0053.

Full text
Abstract:
Abstract A Vehicular Ad hoc NETwork (VANET) is a special subset of multi-hop Mobile Ad hoc Networks, in which the vehicles wireless interfaces can communicate with each other, as well as with fixed equipments alongside city roads or highways. Vehicular mobility dynamic characteristics, including high speed, predictable, restricted mobility pattern significantly affect the performance of routing protocols in a real VANET. Based on the existing studies, here we propose a testing network according to the preferential attachment on the degree of nodes and analyze VANET model characteristics for finding out the dynamic topology from the instantaneous degree distribution, instantaneous clustering coefficient and average path length. Analysis and simulation results demonstrate that VANET has a small world network features and is characterized by a truncated scale-free degree distribution with power-law degree distribution. The dynamic topology analysis indicates a possible mechanism of VANET, which might be helpful in the traffic congestion, safety and management.
APA, Harvard, Vancouver, ISO, and other styles
21

Khattak, Hasan, Zoobia Ameer, Ud Din, and Muhammad Khan. "Cross-layer design and optimization techniques in wireless multimedia sensor networks for smart cities." Computer Science and Information Systems 16, no. 1 (2019): 1–17. http://dx.doi.org/10.2298/csis181115004k.

Full text
Abstract:
The future smart cities vision can be developed through leveraging the potentials of Internet of Things (IoT) and wireless sensor network (WSN) technologies. WSN is a resource constrained network where network nodes are tiny devices that are run on battery power. Diverse types of applications such as environmental and habitual monitoring, detection, and tracking, use WSNs. The invention of new network protocols, the establishment of new models for communications, and testing the available solutions in real world environment are some of the current research issues in WSNs. Main challenges in such networks include energy conservation in an efficient way, dealing with variable channel capacity, and the resource constrained nature of such networks. The design of architecture for such networks has a vital role in solving the issues to some extent, i.e., the cross layer design approach is an architectural technique that offers the interaction of different layers together to enhance the performance, minimize the energy consumption, enhance the network life time, and provide Quality of Service (QoS) in real time communications. These are some of the current areas where cross-layer design approaches are being used. This paper presents different types of cross-layer design techniques in wireless multimedia sensor networks. Using such architectural techniques, different state of the art cross-layer optimization approaches are discussed while giving the reader an insight on prominent challenges and issues along with future directions.
APA, Harvard, Vancouver, ISO, and other styles
22

Dyce, Keir, and Mary Barrett. "Taking Care of (E)-Business?: Australian IT Professionals’ Views of Wireless Network Vulnerability Assessments." Journal of Theoretical and Applied Electronic Commerce Research 1, no. 2 (August 1, 2006): 79–89. http://dx.doi.org/10.3390/jtaer1020015.

Full text
Abstract:
M-commerce, a growing sub-category of E-business, allows business to be done ‘anywhere, anytime’. However security of wireless devices remains problematic. It is unclear whether protocols to alleviate security problems, such as wireless vulnerability assessments (WNVAs), are being used or are effective. The paper reports on a survey-based study of Australian computer security professionals’ use of and opinions about two types of WNVA: wireless monitoring and penetration testing. An initially surprising finding was how little both types are used, despite the ease with which wireless networks can be attacked and the fact that penetration testing is fairly well understood. In the light of organizational culture the survey findings become more explicable. Senior management, and even IT staff, may still hold a traditional, ‘wired network’ view of their organization. Aspects of organizational culture also appear to limit the way WNVA users go about the assessment process. A cultural shift could help change users’ perceptions about the risks and rewards of WNVAs. This could threaten IT staff’s professional identity, however, and needs further research.
APA, Harvard, Vancouver, ISO, and other styles
23

LI, Wei-Ming, Ai-Fang ZHANG, Jian-Cai LIU, and Zhi-Tang LI. "An Automatic Network Protocol Fuzz Testing and Vulnerability Discovering Method." Chinese Journal of Computers 34, no. 2 (May 19, 2011): 242–55. http://dx.doi.org/10.3724/sp.j.1016.2011.00242.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Lee, D., Dongluo Chen, Ruibing Hao, R. E. Miller, Jianping Wu, and Xia Yin. "Network protocol system monitoring-a formal approach with passive testing." IEEE/ACM Transactions on Networking 14, no. 2 (April 2006): 424–37. http://dx.doi.org/10.1109/tnet.2006.872572.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Giridharan, Guruprasad A., Michael A. Sobieski, Mickey Ising, Mark S. Slaughter, and Steven C. Koenig. "Blood Trauma Testing For Mechanical Circulatory Support Devices." Biomedical Instrumentation & Technology 45, no. 4 (July 1, 2011): 334–39. http://dx.doi.org/10.2345/0899-8205-45.4.334.

Full text
Abstract:
Abstract Preclinical hemolysis testing is a critical requirement toward demonstrating device safety for U.S. Food and Drug Administration (FDA) 510(k) approval of mechanical circulatory support devices (MCSD). FDA and ASTM (formerly known as the American Society for Testing and Materials) have published guidelines to assist industry with developing study protocols. However, there can be significant variability in experimental procedures, study design, and reporting of data that makes comparison of test and predicate devices a challenge. To overcome these limitations, we present a hemolysis testing protocol developed to enable standardization of hemolysis testing while adhering to FDA and ASTM guidelines. Static mock flow loops primed with fresh bovine blood (600 mL, Hematocrit = 27±5%, heparin titrated for ACT >300 sec) from a single-source donor were created as a platform for investigating test and predicate devices. MCSD differential pressure and temperature were maintained at 80 mmHg and 25°±2° C. Blood samples (3 ml) were collected at 0, 5, 90, 180, 270, 360 minutes to measure CBC and plasma free hemoglobin. This protocol led to 510(k) approval of two adult MCSD and has been used to test novel cannulae and a pediatric MCSD. Standardization of hemolysis testing procedures and transparency of results may enable better blood trauma characterization of MCS devices to facilitate the FDA 510(k) and PMA submission processes and improve clinical outcomes.
APA, Harvard, Vancouver, ISO, and other styles
26

Ümit Uyar, M., Mariusz A. Fecko, Ali Y. Duale, Paul D. Amer, and Adarshpal S. Sethi. "Experience in developing and testing network protocol software using FDTs." Information and Software Technology 45, no. 12 (September 2003): 815–35. http://dx.doi.org/10.1016/s0950-5849(03)00062-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Wei-Wei, Lin, Zeng Hong-Wei, and Jung Yoon Kim. "A Combining Method for Wireless Protocol Conformance Testing: A Empirical Case." Wireless Communications and Mobile Computing 2021 (July 15, 2021): 1–14. http://dx.doi.org/10.1155/2021/6378139.

Full text
Abstract:
Ensuring the consistency of protocol implementation and protocol specification is the basic premise of wireless communication. With the application of wireless communication in more and more fields, the wireless communication environment becomes more and more complex, and the fault coverage of wireless protocol conformance testing is also facing more and more challenges. To solve this problem, this paper uses Finite State Machine (FSM) as a formal description tool for wireless protocols and presents a combining test method based on two test methods with complementary characteristics in the test technologies based on structural coverage and state identification. Then, the paper evaluates the effectiveness of the method based on 14 empirical cases. The experimental results show that the fault coverage of each empirical case can be effectively improved to 100% when the average test cost is only increased by 17.99%.
APA, Harvard, Vancouver, ISO, and other styles
28

Darmawan, Darmawan, and Pharmayeni Pharmayeni. "Development of Client-Server Application by Using UDP Socket Programming for Remotely Monitoring CNC Machine Environment in Fixture Process." Jurnal Rekayasa Elektrika 12, no. 2 (August 30, 2016): 48. http://dx.doi.org/10.17529/jre.v12i2.2925.

Full text
Abstract:
The use of computer technology in manufacturing industries can improve manufacturing flexibility significantly, especially in manufacturing processes; many software applications have been utilized to improve machining performance. However, none of them has discussed the abilities to perform direct machining. In this paper, an integrated system for remote operation and monitoring of Computer Numerical Control (CNC) machines is put into consideration. The integrated system includes computerization, network technology, and improved holding mechanism. The work proposed by this research is mainly on the software development for such integrated system. It uses Java three-dimensional (3D) programming and Virtual Reality Modeling Language (VRML) at the client side for visualization of machining environment. This research is aimed at developing a control system to remotely operate and monitor a self-reconfiguration fixture mechanism of a CNC milling machine through internet connection and integration of Personal Computer (PC)-based CNC controller, a server side, a client side and CNC milling. The performance of the developed system was evaluated by testing with one type of common protocols particularly User Datagram Protocol (UDP). Using UDP, the developed system requires 3.9 seconds to complete the close clamping, less than 1 second to release the clamping and it can deliver 463 KiloByte.
APA, Harvard, Vancouver, ISO, and other styles
29

Ramalingom, T., K. Thulasiraman, and A. Das. "Context independent unique state identification sequences for testing communication protocols modelled as extended finite state machines." Computer Communications 26, no. 14 (September 2003): 1622–33. http://dx.doi.org/10.1016/s0140-3664(03)00116-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Guo, Jiaxing, Chunxiang Gu, Xi Chen, Siqi Lu, and Fushan Wei. "Automated State-Machine-Based Analysis of Hostname Verification in IPsec Implementations." Information Technology and Control 50, no. 3 (September 24, 2021): 570–87. http://dx.doi.org/10.5755/j01.itc.50.3.27844.

Full text
Abstract:
Owing to the advent and rapid development of Internet communication technology, network security protocols with cryptography as their core have gradually become an important means of ensuring secure communications. Among numerous security protocols, certificate authentication is a common method of identity authentication, and hostname verification is a critical but easily neglected process in certificate authentication. Hostname verification validates the identity of a remote target by checking whether the hostname of the communication partner matches any name in the X.509 certificate. Notably, errors in hostname verification may cause security problems with regard to identity authentication. In this study, we use a model-learning method to conduct security testing for hostname verification in internet protocol security (IPsec). This method can analyze the problems entailed in implementing hostname verification in IPsec by effectively inferring the deterministic finite automaton model that can describe the matching situation between the certificate subject name and the hostname for different rules. We analyze two popular IPsec implementations, Strongswan and Libreswan, and find five violations. We use some of these violations to conduct actual attack tests on the IPsec implementation. The results show that under certain conditions, attackers can use these flaws to carry out identity impersonation attacks and man-in-the-middle attacks.
APA, Harvard, Vancouver, ISO, and other styles
31

Ahmed, Ahmed Abdelmoamen, and Gbenga Agunsoye. "A Real-Time Network Traffic Classifier for Online Applications Using Machine Learning." Algorithms 14, no. 8 (August 21, 2021): 250. http://dx.doi.org/10.3390/a14080250.

Full text
Abstract:
The increasing ubiquity of network traffic and the new online applications’ deployment has increased traffic analysis complexity. Traditionally, network administrators rely on recognizing well-known static ports for classifying the traffic flowing their networks. However, modern network traffic uses dynamic ports and is transported over secure application-layer protocols (e.g., HTTPS, SSL, and SSH). This makes it a challenging task for network administrators to identify online applications using traditional port-based approaches. One way for classifying the modern network traffic is to use machine learning (ML) to distinguish between the different traffic attributes such as packet count and size, packet inter-arrival time, packet send–receive ratio, etc. This paper presents the design and implementation of NetScrapper, a flow-based network traffic classifier for online applications. NetScrapper uses three ML models, namely K-Nearest Neighbors (KNN), Random Forest (RF), and Artificial Neural Network (ANN), for classifying the most popular 53 online applications, including Amazon, Youtube, Google, Twitter, and many others. We collected a network traffic dataset containing 3,577,296 packet flows with different 87 features for training, validating, and testing the ML models. A web-based user-friendly interface is developed to enable users to either upload a snapshot of their network traffic to NetScrapper or sniff the network traffic directly from the network interface card in real time. Additionally, we created a middleware pipeline for interfacing the three models with the Flask GUI. Finally, we evaluated NetScrapper using various performance metrics such as classification accuracy and prediction time. Most notably, we found that our ANN model achieves an overall classification accuracy of 99.86% in recognizing the online applications in our dataset.
APA, Harvard, Vancouver, ISO, and other styles
32

Mouttappa, Pramila, Stephane Maag, and Ana Cavalli. "Using passive testing based on symbolic execution and slicing techniques: Application to the validation of communication protocols." Computer Networks 57, no. 15 (October 2013): 2992–3008. http://dx.doi.org/10.1016/j.comnet.2013.06.019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Fanani, Galih, and Imam Riadi. "Analysis of Digital Evidence on Denial of Service (DoS) Attack Log Based." Buletin Ilmiah Sarjana Teknik Elektro 2, no. 2 (July 21, 2020): 70. http://dx.doi.org/10.12928/biste.v2i2.1065.

Full text
Abstract:
This research is carried out an analysis and investigation of digital log file data retrieval from DoS (Denial of Service) attacks, on internet networks that have been detected by IDS (Intrusion Detection System) and using Wireshark as Tools Analysis Network. The research phase begins with the design of an experimental scenario which is often carried out daily where users access the internet network. The next stage is an attack in the form of ping flood on the target computer connected to the internet network, the final stage of data retrieval which will be analyzed later. Testing research using UAT (User Acceptance Test), to prove that the analysis has been received by the user. The results of research conducted to obtain data in the form of an attacker's IP (Internet Protocol), target IP, protocol type, the port used and the time of the attack. In the UAT test results, the obtained value of 18% of students disagrees, 58% of students agree, and 24% of students strongly agree. This research has conducted an analysis of random data attacks using Wireshark applications received by users.
APA, Harvard, Vancouver, ISO, and other styles
34

Ninkovic, Nemanja, Slavko Gajin, and Irini Reljin. "Packet dispersion strategy evaluation from the perspective of packet loss pattern and VoIP quality." Computer Science and Information Systems 13, no. 1 (2016): 71–92. http://dx.doi.org/10.2298/csis150120043n.

Full text
Abstract:
The appearance of burst packet losses and its devastating effect on Voice over IP (VoIP) service have imposed a requirement for the implementation of loss recovery mechanisms to address VoIP quality during periods when high packet loss is exhibited. Existing loss recovery mechanisms are dependent on end point capabilities, whereas Quality of service (QoS) routing protocols suffer from complexity and scalability issues. In this paper, we examine packet dispersion?s ability to address burst losses and provide a computational model, which is verified using real network testing. A study has been carried out to investigate the effect of different packet dispersion strategies on burst losses, which clearly shows dispersion?s qualitative superiority over single path routing. Furthermore, an analytical approach is proposed resulting in quality estimation obtained by individual strategies. Practical evaluation has shown that each strategy copes differently with various burst scenarios in order to maximize VoIP quality.
APA, Harvard, Vancouver, ISO, and other styles
35

Wildman, Wesley J., Saikou Y. Diallo, George Hodulik, Andrew Page, Andreas Tolk, and Neha Gondal. "The Artificial University: Decision Support for Universities in the COVID-19 Era." Complexity 2020 (December 24, 2020): 1–10. http://dx.doi.org/10.1155/2020/5910209.

Full text
Abstract:
Operating universities under pandemic conditions is a complex undertaking. The Artificial University (TAU) responds to this need. TAU is a configurable, open-source computer simulation of a university using a contact network based on publicly available information about university classes, residences, and activities. This study evaluates health outcomes for an array of interventions and testing protocols in an artificial university of 6,500 students, faculty, and staff. Findings suggest that physical distancing and centralized contact tracing are most effective at reducing infections, but there is a tipping point for compliance below which physical distancing is less effective. If student compliance is anything short of high, it helps to have separate buildings for quarantining infected students, thereby gracefully increasing compliance. Hybrid in-person and online classes and closing fitness centers do not significantly change cumulative infections but do significantly decrease the number of the infected at any given time, indicating strategies for “flattening the curve” to protect limited resources. Supplementing physical distancing with centralized contact tracing decreases infected individuals by an additional 14%; boosting frequency of testing for student-facing staff yields a further 7% decrease. A trade-off exists between increasing the sheer number of infection tests and targeting testing for key nodes in the contact network (i.e., student-facing staff). There are significant advantages to getting and acting on test results quickly. The costs and benefits to universities of these findings are discussed. Artificial universities can be an important decision support tool for universities, generating useful policy insights into the challenges of operating universities under pandemic conditions.
APA, Harvard, Vancouver, ISO, and other styles
36

EL-GENDY, HAZEM, and NABIL EL-KADHI. "FORMAL METHOD FOR AUTOMATED TRANSFORMATION OF LOTOS SPECIFICATIONS TO ESTELLE SPECIFICATIONS." International Journal of Software Engineering and Knowledge Engineering 15, no. 05 (October 2005): 873–91. http://dx.doi.org/10.1142/s0218194005002567.

Full text
Abstract:
ISO and IEC have jointly developed two Formal Description Techniques (FDTs) for specifying distributed real time systems such as computer/telecommunications protocols. These are Lotos and Estelle. In this paper, a formal method for automated transformation of a Lotos specification to an Estelle specification is presented. The method is applicable to various Lotos specification styles and to various communications protocols of ISO OSI layers. Our method has applications in conformance testing of such systems and building common semantic model for the various FDTs. In this paper, we develop an algorithm for constructing a 'Data Oriented'-Restricted Behavior Tree T that represent both the control flow aspects and the data flow aspects of the system. Then, we develop an algorithm for constructing the Estelle specifications from T. A minimization rule is also developed to optimize the size of the Estelle specification by reducing both the number of states and the number of transitions.
APA, Harvard, Vancouver, ISO, and other styles
37

KOJIMA, Hideharu, Juichi TAKAHASHI, Tomoyuki OHTA, and Yoshiaki KAKUDA. "An Equivalent Division Method for Reducing Test Cases in State Transition Testing of MANET Protocols." IEICE Transactions on Communications E92-B, no. 3 (2009): 794–806. http://dx.doi.org/10.1587/transcom.e92.b.794.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Azhar, Raesul. "Analisa Perbandingan Penerapan PBR Dan Non PBR Pada Protocol OSPF Untuk Koneksi Internet." Jurnal Matrik 15, no. 1 (July 26, 2017): 29. http://dx.doi.org/10.30812/matrik.v15i1.26.

Full text
Abstract:
The implementation of quota policies to limit the use of the Internet, such as limiting the use of streaming media applications, download and upload activity has a purpose in order to maintain the performance of computer networks, especially companies / organizations that have low Internet bandwidth capacity. Implementation of Policy Based Routing (PBR) means choosing a path or a different route from the routing table to reach the destination address of data packets transmitted. Router device without applying the PBR will choose a path based on the IP address of the destination.This research was conducted by adopting the method NDLC in comparing the routing policy. Thestages through which the problem analysis, design and simulation prototype network topology. At this stage of prototype Simulation is done by confiuring and testing the Quality of Service (QoS) for network design. Results achieved in the form of comparisons PBR application on the router and use of NON PBR for the implementation of a policy to optimize traffi transmission of data packets or internet traffi usage by users.
APA, Harvard, Vancouver, ISO, and other styles
39

Holbech, Henrik, Peter Matthiessen, Martin Hansen, Gerrit Schüürmann, Dries Knapen, Marieke Reuver, Frédéric Flamant, et al. "ERGO: Breaking Down the Wall between Human Health and Environmental Testing of Endocrine Disrupters." International Journal of Molecular Sciences 21, no. 8 (April 22, 2020): 2954. http://dx.doi.org/10.3390/ijms21082954.

Full text
Abstract:
ERGO (EndocRine Guideline Optimization) is the acronym of a European Union-funded research and innovation action, that aims to break down the wall between mammalian and non-mammalian vertebrate regulatory testing of endocrine disruptors (EDs), by identifying, developing and aligning thyroid-related biomarkers and endpoints (B/E) for the linkage of effects between vertebrate classes. To achieve this, an adverse outcome pathway (AOP) network covering various modes of thyroid hormone disruption (THD) in multiple vertebrate classes will be developed. The AOP development will be based on existing and new data from in vitro and in vivo experiments with fish, amphibians and mammals, using a battery of different THDs. This will provide the scientifically plausible and evidence-based foundation for the selection of B/E and assays in lower vertebrates, predictive of human health outcomes. These assays will be prioritized for validation at OECD (Organization for Economic Cooperation and Development) level. ERGO will re-think ED testing strategies from in silico methods to in vivo testing and develop, optimize and validate existing in vivo and early life-stage OECD guidelines, as well as new in vitro protocols for THD. This strategy will reduce requirements for animal testing by preventing duplication of testing in mammals and non-mammalian vertebrates and increase the screening capacity to enable more chemicals to be tested for ED properties.
APA, Harvard, Vancouver, ISO, and other styles
40

Wang, Zhiqiang, Yuheng Lin, Zihan Zhuo, Jieming Gu, and Tao Yang. "GNFCVulFinder: NDEF Vulnerability Discovering for NFC-Enabled Smart Mobile Devices Based on Fuzzing." Security and Communication Networks 2021 (June 28, 2021): 1–14. http://dx.doi.org/10.1155/2021/9946022.

Full text
Abstract:
Near-field communication (NFC) is a set of communication protocols that enable two electronic devices. Its security and reliability are welcomed by mobile terminal manufactures, banks, telecom operators, and third-party payment platforms. Simultaneously, it has also drawn more and more attention from hackers and attackers, and NFC-enabled devices are facing increasing threats. To improve the security of the NFC technology, the paper studied the technology of discovering security vulnerabilities of NFC Data Exchange Format (NDEF), the most important data transmission protocol. In the paper, we proposed an algorithm, GTCT (General Test Case Construction and Test), based on fuzzing to construct test cases and test the NDEF protocol. GTCT adopts four strategies to construct test cases, manual, generation, mutation, and “reverse analysis,” which can detect logic vulnerabilities that fuzzing cannot find and improve the detection rate. Based on GTCT, we designed an NDEF vulnerability discovering framework and developed a tool named “GNFCVulFinder” (General NFC Vulnerability Finder). By testing 33 NFC system services and applications on Android and Windows Phones, we found eight vulnerabilities, including DoS vulnerabilities of NFC service, logic vulnerabilities about opening Bluetooth/Wi-Fi/torch, design flaws about the black screen, and DoS of NFC applications. Finally, we give some security suggestions for the developer to enhance the security of NFC.
APA, Harvard, Vancouver, ISO, and other styles
41

Michel, Hervé, Thomas Kroc, Brian J. McEvoy, Deepak Patil, Pierre Reppert, and Mark A. Smith. "Potential Induced Radioactivity in Materials Processed with X-ray Energy Above 5 MeV." Biomedical Instrumentation & Technology 55, s3 (March 1, 2021): 17–26. http://dx.doi.org/10.2345/0899-8205-55.s3.17.

Full text
Abstract:
Abstract Section 5.1.2 of ANSI/AAMI/ISO 11137-1 states that “the potential for induced radioactivity in product shall be assessed.” This article describes how compliance with this requirement may be achieved using qualified test methods. Materials of consideration are conceptually discussed, and results of testing conducted on products processed with a 7.5-MeV X-ray irradiation process are provided. As X-ray becomes more widely used in healthcare sterilization, having standard assessment protocols for activation coupled with a shared database of material test results will benefit manufacturers seeking to utilize this innovative technology.
APA, Harvard, Vancouver, ISO, and other styles
42

ARYANTA, DWI, and BAYU AGUNG PRANATA. "Perancangan dan Analisis Redistribution Routing Protocol OSPF dan EIGRP." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 2, no. 2 (July 1, 2014): 85. http://dx.doi.org/10.26760/elkomika.v2i2.85.

Full text
Abstract:
ABSTRAKOSPF (Open Shortest Path First) dan EIGRP (Enhanced Interior Gateway Routing Protocol) adalah dua routing protokol yang banyak digunakan dalam jaringan komputer. Perbedaan karakteristik antar routing protokol menimbulkan masalah dalam pengiriman paket data. Teknik redistribution adalah solusi untuk melakukan komunikasi antar routing protokol. Dengan menggunakan software Cisco Packet Tracer 5.3 pada penelitian ini dibuat simulasi OSPF dan EIGRP yang dihubungkan oleh teknik redistribution, kemudian dibandingkan kualitasnya dengan single routing protokol EIGRP dan OSPF. Parameter pengujian dalam penelitian ini adalah nilai time delay dan trace route. Nilai trace route berdasarkan perhitungan langsung cost dan metric dibandingkan dengan hasil simulasi. Hasilnya dapat dilakukan proses redistribution OSPF dan EIGRP. Nilai delay redistribution lebih baik 1% dibanding OSPF dan 2-3% di bawah EIGRP tergantung kepadatan traffic. Dalam perhitungan trace route redistribution dilakukan 2 perhitungan, yaitu cost untuk area OSPF dan metric pada area EIGRP. Pengambilan jalur utama dan alternatif pengiriman paket berdasarkan nilai cost dan metric yang terkecil, hal ini terbukti berdasarkan perhitungan dan simulasi.Kata kunci: OSPF, EIGRP, Redistribution, Delay, Cost, Metric.ABSTRACTOSPF (Open Shortest Path First) and EIGRP (Enhanced Interior Gateway Routing Protocol) are two routing protocols are widely used in computer networks. Differences between the characteristics of routing protocols pose a problem in the delivery of data packets. Redistribution technique is the solution for communication between routing protocols. By using the software Cisco Packet Tracer 5.3 in this study were made simulating OSPF and EIGRP redistribution linked by technique, then compared its quality with a single EIGRP and OSPF routing protocols. Testing parameters in this study is the value of the time delay and trace route. Value trace route based on direct calculation of cost and metric compared with the simulation results. The result can be OSPF and EIGRP redistribution process. Value delay redistribution 1% better than OSPF and EIGRP 2-3% under traffic density dependent. In calculating the trace route redistribution is done 2 calculations, the cost for OSPF area and the area of the EIGRP metric. Making primary and alternate paths based on the packet delivery rate and the cost of the smallest metric, it is proved by calculation and simulation.Keywords: OSPF, EIGRP, Redistribution, Delay, Cost, Metric.
APA, Harvard, Vancouver, ISO, and other styles
43

Wang, G., and X. Luo. "Design and debugging of communication between controller and Kingview based on CAN bus." World Journal of Engineering 10, no. 4 (August 21, 2013): 395–400. http://dx.doi.org/10.1260/1708-5284.10.4.395.

Full text
Abstract:
By selecting hardware, erecting CAN network structure and adopting appropriate software and standard communication protocol to debug the system, the system realizes the data communication between controller and Kingview based on CAN bus. At the same time?with the detailed description of the debugging process and the validation of debugging results, the system realizes the monitor to controller by programming computer through CAN bus and the CAN data have been in a state of monitoring in the whole process. Testing results show that the system has good reliability, real-time and practicality, and shows the advantages of CAN bus.
APA, Harvard, Vancouver, ISO, and other styles
44

Zendehdel, Ghazale Amel, Ratinder Kaur, Inderpreet Chopra, Natalia Stakhanova, and Erik Scheme. "Automated Security Assessment Framework for Wearable BLE-enabled Health Monitoring Devices." ACM Transactions on Internet Technology 22, no. 1 (February 28, 2022): 1–31. http://dx.doi.org/10.1145/3448649.

Full text
Abstract:
The growth of IoT technology, increasing prevalence of embedded devices, and advancements in biomedical technology have led to the emergence of numerous wearable health monitoring devices (WHMDs) in clinical settings and in the community. The majority of these devices are Bluetooth Low Energy (BLE) enabled. Though the advantages offered by BLE-enabled WHMDs in tracking, diagnosing, and intervening with patients are substantial, the risk of cyberattacks on these devices is likely to increase with device complexity and new communication protocols. Furthermore, vendors face risk and financial tradeoffs between speed to market and ensuring device security in all situations. Previous research has explored the security and privacy of such devices by manually testing popular BLE-enabled WHMDs in the market and generally discussed categories of possible attacks, while mostly focused on IP devices. In this work, we propose a new semi-automated framework that can be used to identify and discover both known and unknown vulnerabilities in WHMDs. To demonstrate its implementation, we validate it with a number of commercially available BLE-enabled enabled wearable devices. Our results show that the devices are vulnerable to a number of attacks, including eavesdropping, data manipulation, and denial of service attacks. The proposed framework could therefore be used to evaluate potential devices before adoption into a secure network or, ideally, during the design and implementation of new devices.
APA, Harvard, Vancouver, ISO, and other styles
45

Sánchez-Sutil, Francisco, and Antonio Cano-Ortega. "Design and Testing of a Power Analyzer Monitor and Programming Device in Industries with a LoRA LPWAN Network." Electronics 10, no. 4 (February 11, 2021): 453. http://dx.doi.org/10.3390/electronics10040453.

Full text
Abstract:
Electrical installations represent an important part of the industry. In this sense, knowing the state of the electrical installation in real time through the readings of the installed power analyzers is of vital importance. For this purpose, the RS485 bus can be used, which most electrical installations already have. An alternative to the bus wiring and its distance limitation is the use of low-power wide area networks (LPWAN). The long range (LoRa) protocol is ideal for industries due to its low-power consumption and coverage of up to 10 km. In this research, a device is developed to control all the reading and programming functions of a power analyzer and to integrate the device into the LoRa LPWAN network. The power analyzer monitor and programming device (PAMPD) is inexpensive and small enough to be installed in electrical panels, together with the power analyzer, without additional wiring. The information collected is available in the cloud in real time, allowing a multitude of analysis be run and optimization in real time. The results support high efficiency in information transmission with average information loss rate of 3% and a low average transmission time of 30 ms.
APA, Harvard, Vancouver, ISO, and other styles
46

Monteiro, Diogo Souza, and Sven Anders. "Third-party certification, food standards and quality assurance in supply chains." Journal on Chain and Network Science 9, no. 2 (January 1, 2009): 83–88. http://dx.doi.org/10.3920/jcns2009.x164.

Full text
Abstract:
This paper develops a theoretical framework to address and discuss issues of certifier effort, firm size and cost differences in the provision of credible third-party certification services in vertical food supply chains. The emergence of private and voluntary food standards have opened a fast growing market for the provision of independent third-party certification services for a range of credence attributes from origin, through food quality and safety to social and environmental attributes. This study argues that the quality of certification may be affected by the number of heterogeneous standards a certifier is accredited to verify. Moreover, results suggest that the quality of more complex and costly testing protocols and standards resulting in overall higher certification cost may be better served by smaller certification bodies that on average exert higher effort levels. This finding seems of particular relevance to food chain management given the growing proliferation of highly specialized private standards and contractual arrangements in international food supply.
APA, Harvard, Vancouver, ISO, and other styles
47

Yulianto, Budi. "Analisis Korelasi Faktor Perilaku Konsumen terhadap Keputusan Penggunaan Teknologi Komunikasi Voip." ComTech: Computer, Mathematics and Engineering Applications 5, no. 1 (June 30, 2014): 236. http://dx.doi.org/10.21512/comtech.v5i1.2619.

Full text
Abstract:
The advancement of communication technology that is combined with computer and the Internet brings Internet Telephony or VoIP (Voice over Internet Protocol). Through VoIP technology, the cost of telecommunications in particular for international direct dialing (IDD) can be reduced. This research analyzes the growth rate of VoIP users, the correlation of the consumer behavior towards using VoIP, and cost comparisons of using telecommunication services between VoIP and other operators. This research is using descriptive analysis method to describe researched object through sampling data collection for hypothesis testing. This research will lead to the conclusion that the use of VoIP for international area will be more advantageous than the use of other operators of GSM (Global System for Mobile), CDMA (Code Division Multiple Access), or the PSTN (Public Switched Telephone Network).
APA, Harvard, Vancouver, ISO, and other styles
48

Qian, Zhi Qin, Li Zong Lin, Zhuan Huang, Wei Guo Ju, and Qun Cao. "A Design of Comprehensive Remote Sensor Experiment System." Applied Mechanics and Materials 437 (October 2013): 643–49. http://dx.doi.org/10.4028/www.scientific.net/amm.437.643.

Full text
Abstract:
The remote network experiment is to remotely operate laboratory equipment to complete real experiment in different places through the Internet. This paper takes the comprehensive sensor experiment of the course Mechanical engineering testing technology as an example and designs a set of comprehensive remote sensor experiment system based on B/S model and configuration platform. The system is composed of a control system and a test system. The platform of kingview and the module of data acquisition using single-chip computer are used in the control system which communicates through the ModbusRTU protocol to realize data acquisition and the control function of output. The test system is based on Ethernet and composed of AD converter and DDE program. It realizes real-time data acquisition and high speed data transmission through the TCP/IP network. This system not only has the function of appointment course for students, but also greatly enhances students' learning ability by joining new design of experimental modules. The system has good reusability, scalability and maintainability.
APA, Harvard, Vancouver, ISO, and other styles
49

López-Valcárcel, Luis A., and Manuel García Sánchez. "A Wideband Radio Channel Sounder for Non-Stationary Channels: Design, Implementation and Testing." Electronics 10, no. 15 (July 30, 2021): 1838. http://dx.doi.org/10.3390/electronics10151838.

Full text
Abstract:
The increasing bandwidths and frequencies proposed for new mobile communications give rise to new challenges for system designers. Channel sounding and channel characterization are important tasks to provide useful information for the design of systems, protocols, and techniques to fight the propagation impairments. In this paper, we present a novel radio channel sounder capable of dealing with non-stationary channels. It can be operated in real-time and has a compact size to ease transport. For versatility and cost purposes, the core of the system is implemented in Field Programmable Gate Arrays (FPGAs). Three measurement campaigns have been conducted to illustrate the performance of the sounder in both static and non-static channels. In its current configuration, the sounder reaches an RF null-to-null bandwidth of 1 GHz, providing a delay resolution of 2 ns, a maximum measurable Doppler shift of 7.63 kHz, and 4.29 s of continuous acquisition time. A comparison with other channel sounders in the literature reveals that our proposal achieves a good combination of performance, cost, and size.
APA, Harvard, Vancouver, ISO, and other styles
50

Iavich, Maksim, Tamari Kuchukhidze, Sergiy Gnatyuk, and Andriy Fesenko. "Novel Certification Method for Quantum Random Number Generators." International Journal of Computer Network and Information Security 13, no. 3 (June 8, 2021): 28–38. http://dx.doi.org/10.5815/ijcnis.2021.03.03.

Full text
Abstract:
Random numbers have many uses, but finding true randomness is incredibly difficult. Therefore, quantum mechanics is used, using the essentially unpredictable behavior of a photon, to generate truly random numbers that form the basis of many modern cryptographic protocols. It is essential to trust cryptographic random number generators to generate only true random numbers. This is why certification methods are needed which will check both the performance of our device and the quality of the random bits generated. Self-testing as well as device independent quantum random number generation methods are analyzed in the paper. The advantages and disadvantages of both methods are identified. The model of a novel semi self-testing certification method for quantum random number generators is offered in the paper. This method combines different types of certification approaches and is rather secure and efficient. The method is very important for computer science, because it combines the best features from selftesting and device independent methods. It can be used, when the random numbers’ entropy depends on the device and when it does not. In the related researches, these approaches are offered to be used separately, depending on the random number generator. The offered novel certification technology can be properly used, when the device is compromised or spoiled. The technology can successfully detect unintended irregularities, operational problems, abnormalities and problems in the randomization process. The offered mythology assists to eliminate problems related to physical devices. The offered system has the higher certification randomness security and is faster than self-testing approaches. The method is rather efficient because it implements the different certification approaches in the parallel threads. The offered techniques make the offered research must more efficient than the other existing approaches. The corresponding programming simulation is implemented by means of the simulation techniques.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography