Academic literature on the topic 'New protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'New protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "New protocol"

1

Gerard, Ian J., Jeffery A. Hall, Kelvin Mok, and D. Louis Collins. "New Protocol for Skin Landmark Registration in Image-Guided Neurosurgery: Technical Note." Operative Neurosurgery 11, no. 3 (June 26, 2015): 376–81. http://dx.doi.org/10.1227/neu.0000000000000868.

Full text
Abstract:
Abstract BACKGROUND Newer versions of the commercial Medtronic StealthStation allow the use of only 8 landmark pairs for patient-to-image registration as opposed to 9 landmarks in older systems. The choice of which landmark pair to drop in these newer systems can have an effect on the quality of the patient-to-image registration. OBJECTIVE To investigate 4 landmark registration protocols based on 8 landmark pairs and compare the resulting registration accuracy with a 9-landmark protocol. METHODS Four different protocols were tested on both phantoms and patients. Two of the protocols involved using 4 ear landmarks and 4 facial landmarks and the other 2 involved using 3 ear landmarks and 5 facial landmarks. Both the fiducial registration error and target registration error were evaluated for each of the different protocols to determine any difference between them and the 9-landmark protocol. RESULTS No difference in fiducial registration error was found between any of the 8-landmark protocols and the 9-landmark protocol. A significant decrease (P < .05) in target registration error was found when using a protocol based on 4 ear landmarks and 4 facial landmarks compared with the other protocols based on 3 ear landmarks. CONCLUSION When using 8 landmarks to perform the patient-to-image registration, the protocol using 4 ear landmarks and 4 facial landmarks greatly outperformed the other 8-landmark protocols and 9-landmark protocol, resulting in the lowest target registration error.
APA, Harvard, Vancouver, ISO, and other styles
2

Sunder, Madhavi. "New Working Group on “Cultural Protocols” Convenes at New York University, 19 August 2011." International Journal of Cultural Property 18, no. 4 (November 2011): 459–60. http://dx.doi.org/10.1017/s0940739111000361.

Full text
Abstract:
Protocols in international law seem to be proliferating. Examples of official protocols at international law abound, from the 1967 Stockholm Protocol Regarding Developing Countries (amending the Berne Convention on copyright), to the 1997 Kyoto Protocol on climate change, to the recent Nagoya Protocol on Access and Benefit Sharing in 2010. But what exactly is a “protocol” compared to other international legal instruments, such as declarations and treaties? And why does there seem to be a flurry of new protocols today, in domains as vast as intellectual property and indigenous people's rights? On 19 August a new “working group” convened at the New York University School of Law to begin to study protocols, especially with an eye toward their use as a tool to protect indigenous cultural property—hence, the term “cultural protocols.” The working group is the brainchild of Dr. Jane Anderson of the University of Massachusetts and Professor Barton Beebe of the New York University School of Law.
APA, Harvard, Vancouver, ISO, and other styles
3

Veronese, Sheila, Marco Cambiaghi, and Andrea Sbarbati. "New Protocol for Auditory Brainstem Implant Positioning." Neuroscience and Neurological Surgery 9, no. 5 (November 24, 2021): 01–07. http://dx.doi.org/10.31579/2578-8868/203.

Full text
Abstract:
Background: Surgery for applying the auditory brainstem implant is an otoneurosurgery that requires careful intraoperative monitoring to optimize the placement of the electrode paddle. This study aimed to validate a new method capable of increasing the accuracy of electrode array placement, reducing channel interaction, electrical artefacts, and saturation effects, and providing the largest number of electrodes that can be activated with the lowest possible electric charge. Materials and methods: Thirty-six subjects aged between 1.42 and 69.92 years were tested during surgery for auditory brainstem implantation. We recorded auditory electrical responses of the brainstem using the implant supplier's suggested stimulation protocol and the new protocol. Results: Saturations effects and electric artefacts were noticed respectively in 81.85% and 53.25% of recordings using implant supplier's method, while in 70.34% and 24.75% of recordings using the new method, with a percentage variation of 11.51% and 28.50%. Considering the amount of charge required to activate the electrodes, with the implant supplier's method an average charge of 14 nC was needed, while with the new protocol an average charge of 8 nC was necessary. Conclusions: The new method improves the coupling between the auditory brainstem implant and the surface of the cochlear nucleus.
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Fu Lin, Jie Yang, Hong Wei Zhou, and Ying Liu. "A New Dynamic Protocol Analysis Model." Advanced Materials Research 765-767 (September 2013): 1761–65. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1761.

Full text
Abstract:
Traditional static analysis methods such as formal validation and theorem proving were used to analyze protocols security previously. These methods can not measure and evaluate actual security of protocols accurately for the setting and suppose are far from the actual conditions. This paper proposes a new dynamic protocol analysis model. The system based on the model can be used to active test in actual running conditions, analyze known protocols security, integrity, robustness, and analyze unknown protocols online, provide support for protocol designer. The systems structure, working flow and implementation of key modules are described. The experimental results validate the validity of the models design.
APA, Harvard, Vancouver, ISO, and other styles
5

Doswald-Beck, Louise. "New Protocol on Blinding Laser Weapons." International Review of the Red Cross 36, no. 312 (May 1996): 272–99. http://dx.doi.org/10.1017/s0020860400089889.

Full text
Abstract:
On 13 October 1995, the first Review Conference of the 1980 Convention on Certain Conventional Weapons (CCW) adopted during its first session in Vienna a new fourth Protocol entitled “Protocol on Blinding Laser Weapons”. The 1980 Convention comprises a framework Convention (containing technical provisions such as applicability, entry into force and amendment) and annexed Protocols containing the substantive rules relating to certain weapons. Although many weapons had been discussed during the preparatory stages of this Convention, only three Protocols were adopted in 1980. However, the structure chosen enabled new Protocols to be added in order to accommodate future weapons which needed t o be prohibited or otherwise regulated.
APA, Harvard, Vancouver, ISO, and other styles
6

Dias, Álvaro Machado, and Adrian van Deusen. "A New Neurofeedback Protocol for Depression." Spanish journal of psychology 14, no. 1 (May 2011): 374–84. http://dx.doi.org/10.5209/rev_sjop.2011.v14.n1.34.

Full text
Abstract:
Context: Neurofeedback represents an exciting complementary option in the treatment of depression that builds upon a huge body of research on electroencephalographic correlates of depression. Objective: The objectives of this article are threefold: review the literature on neurofeedback protocols for depression; introduce a new protocol, which aims to synthesize the best qualities of the currently available protocols; and present the results of a small clinical experiment with the new protocol. Method: Structured survey of the literature; software development; clinical trial with one subject, submitted to ten sessions of neurofeedback (one hour each). Results: Currently there are twenty-one articles in neurofeedback for depression, among which only six present original experimental results. All of them report positive results with the technique. The most used protocols focus on Alpha inter-hemispheric asymmetry, and Theta/Beta ratio within the left prefrontal cortex. Our new protocol integrates both dimensions in a single circuit, adding to it a third programming line, which divides Beta frequencies and reinforces the decrease of Beta-3, in order to reduce anxiety. The favorable outcome of our clinical experiment, suggests that new research with this protocol is worthwhile.
APA, Harvard, Vancouver, ISO, and other styles
7

Chakraborty, Suvradip, Janaka Alawatugoda, and Chandrasekaran Pandu Rangan. "New approach to practical leakage-resilient public-key cryptography." Journal of Mathematical Cryptology 14, no. 1 (July 11, 2020): 172–201. http://dx.doi.org/10.1515/jmc-2019-0014.

Full text
Abstract:
AbstractWe present a new approach to construct several leakage-resilient cryptographic primitives, including leakage-resilient public-key encryption (PKE) schemes, authenticated key exchange (AKE) protocols and low-latency key exchange (LLKE) protocols. To this end, we introduce a new primitive called leakage-resilient non-interactive key exchange (LR-NIKE) protocol. We introduce an appropriate security model for LR-NIKE protocols in the bounded memory leakage (BML) settings. We then show a secure construction of the LR-NIKE protocol in the BML setting that achieves an optimal leakage rate, i.e., 1 – o(1). Our construction of LR-NIKE requires a minimal use of a leak-free hardware component. We argue that the use of such a leak-free hardware component seems to be unavoidable in any construction of an LR-NIKE protocol, even in the BML setting. Finally, we show how to construct the aforementioned leakage-resilient primitives from such an LR-NIKE protocol as summarized below. All these primitives also achieve the same (optimal) leakage rate as the underlying LR-NIKE protocol. We show how to construct a leakage-resilient (LR) IND-CCA-2-secure PKE scheme in the BML model generically from a bounded LR-NIKE (BLR-NIKE) protocol. Our construction of LR-IND-CCA-2 secure PKE differs significantly from the state-of-the-art constructions of these primitives, which mainly use hash proof techniques to achieve leakage resilience. Moreover, our transformation preserves the leakage-rate of the underlying BLR-NIKE protocol. We introduce a new leakage model for AKE protocols, in the BML setting, and present a leakage-resilient AKE protocol construction from the LR-NIKE protocol. We introduce the first-ever leakage model for LLKE protocols in the BML setting and the first construction of such a leakage-resilient LLKE from the LR-NIKE protocol.
APA, Harvard, Vancouver, ISO, and other styles
8

Milan, Zoka, Amy Rene Gomes, Mimi R. Borrelli, Mimi R. Borrelli, Gudran Kunst, and K. Katyayni. "Implementation of new protocol for pain management following cardiac surgery." Edorium Journal of Anesthesia 6, no. 1 (March 4, 2020): 1–9. http://dx.doi.org/10.5348/100020a05zm2020ra.

Full text
Abstract:
Aims: We assessed the implementation and effectiveness of an updated protocol designed to improve pain management in cardiac surgery patients. The new updated protocol was recommended systemic pain assessment every four hours unless patients were unstable, using the numerical rating score (NRS) after the endotracheal extubation. Our secondary aim was to analyze the factors predicting patients’ postoperative pain to guide development of future pain management protocols. Methods: Fifty patients undergoing cardiac surgery with median sternotomy were evaluated in this audit. Perioperative details and details regarding analgesic administration were collected. High-risk patients were classified as ones with a history of substance misuse, chronic pain, and preoperative opioid use. Pain was measured at rest, on coughing and on moving, for the first three postoperative days (POD), using 11-point NRS (0–10). Pain was considered “unacceptable” if it was NRS ≥4 at rest, and NRS ≥8 on activity. A univariate and multivariate mixed model linear regression was used to investigate factors that may contribute to pain following cardiac surgery. Results: On POD1 38% of patients reported unacceptable pain at rest, and 27% reported unacceptable pain on coughing or moving. There was limited implementation of the new protocol, thus we cannot comment on the effectiveness of the updated protocol. Multivariate analysis demonstrated an overall significant interaction effect between postoperative day and risk (p = 0.032). It was found that high-risk patients reported pain to be greater than pain reported by low-risk patients on POD3 (2.14, CI −0.32 to 4.26, p = 0.054). Use of preoperative gabapentin did not affect pain at rest nor pain on coughing or moving (p > 0.5). Conclusion: The new pain protocol was not followed in the majority of patient cases. Preoperatively, only 25 (56%) patients received gabapentin. No patients received patient-controlled analgesia (PCA) postoperatively. Seven (15%) patients identified as high risk received no differential pharmacological management contrary to the updated protocol. It is believed that e-mail is not sufficient to implement a new protocol such as this, thus resulting in protocol implementation failure. However, it was found that postoperative pain differed between high-and low-risk patients, especially at rest. This indicates that risk assessment and individualized pain protocols are important to optimize postoperative pain management following cardiac surgery. We have discussed the efforts required to improve future protocol implementation and pain management across disciplines.
APA, Harvard, Vancouver, ISO, and other styles
9

Friedrich, Lena, Joachim Krieter, Nicole Kemper, and Irena Czycholl. "Animal Welfare Assessment in Sows and Piglets—Introduction of a New German Protocol for Farm’s Self-Inspection and of New Animal-Based Indicators for Piglets." Agriculture 10, no. 11 (October 28, 2020): 506. http://dx.doi.org/10.3390/agriculture10110506.

Full text
Abstract:
We compare the Kuratorium für Technik und Bauwesen in der Landwirtschaft e.V. (KTBL) protocol, a German protocol for sows and piglets developed for farm’s self-inspection, to the Welfare Quality® protocol for sows and piglets (WQ). The KTBL protocol introduces new indicators for piglets to be assessed at pen level (face lesions, carpal joint lesions, undersized animals). The reliability of their assessment at pen level was analysed by comparison to assessments at individual level. Both protocols were applied by one observer in 65 farm visits. The protocols are highly similar, although the composition varies (WQ protocol: focus on animal-based, KTBL protocol: focus on management-based indicators). Consequently, the WQ protocol detected more welfare issues (e.g., welfare issues related to appropriate behaviour: 62.9% (WQ) vs. 21.0% (KTBL protocol)). The comparison between pen and individual level of piglets’ indicators was determined using Spearman’s rank correlation coefficient (RS), intraclass correlation coefficient (ICC) and limits of agreement (LoA). Carpal joint lesions and undersized animals (RS 0.73/0.80 ICC 0.55/0.57 LoA −0.12 to 0.03/−0.01 to 0.01) are reliably assessed at pen level but face lesions (RS 0.19 ICC 0.18 LoA −0.42 to 0.03) are not. Concluding, we present advantages and disadvantages of the KTBL protocol and introduce indicators for piglets which may enhance existing protocols.
APA, Harvard, Vancouver, ISO, and other styles
10

Yao, Gang, and Li Guo. "A New Group Key Agreement Protocol with Anonymity." Applied Mechanics and Materials 380-384 (August 2013): 2256–61. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2256.

Full text
Abstract:
Popularity of group-oriented applications motivates research on security protection for group communications. A number of group key agreement protocols have been proposed for this objective, but most current group key agreement protocols do not consider privacy protection. Group key agreement protocols for networks should also handle dynamic group membership events such as user join and leave events. The Join and Leave Protocols provide backward and forward secrecy respectively. In this paper, we proposed a new anonymous group key agreement protocol based on ID-based encryption cryptosystems. The proposed protocol not only benefits from the desirable features of ID-based cryptosystem, but also provides privacy protection for users. The proposed protocol achieves the following security attribute: anonymity, unlinkability, group key secrecy, group forward secrecy, group backward secrecy, perfect forward secrecy for the group session key and entity authentication.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "New protocol"

1

Lukovicsová, Nicola. "The history of diplomatic protocol with the emphasis on French influence on diplomatic protocol and new cultural influences on today´s diplomatic protocol." Master's thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-193888.

Full text
Abstract:
The Master's Thesis on "The History of Diplomatic Protocol with the Emphasis on French Influence on Diplomatic Protocol and New Cultural Influences on Today's Diplomatic Protocol" aims at introducing the topic of History of Diplomatic protocol and is further elaborating on the topic in terms of various influences on Diplomacy and Diplomatic protocol. The purpose was to show that the evolution of the practices, protocols and etiquette is a gradual process of change. Nowadays we live in the world strongly influenced by the European tradition that mainly comes from France. However, the changing world and process of globalization makes it easier for people to interact, share their values and spread their ideas.
APA, Harvard, Vancouver, ISO, and other styles
2

Redden, Toby Lynn. "New Referral Hepatitis C Protocol: The New Standard." Diss., North Dakota State University, 2014. https://hdl.handle.net/10365/27581.

Full text
Abstract:
The Gastroenterology (GI) clinic at Sanford Health anticipates an increase in patients with hepatitis C virus (HCV) based on the 2012 Centers for Disease Control (CDC) screening recommendations. With a disproportionately high prevalence in the baby-boomer population, 75% of all documented HCV cases, the CDC recommended a ?one-time testing of all persons born during 1945-1965 without prior ascertainment of HCV risk? (CDC, 2012a). The purpose of this practice improvement project was to refine the existing workflow of the GI clinic when caring for and managing patients with HCV. The Plan, Do, Study, Act method was followed to improve the processes and address the clinic goals. The project first assessed the existing referral protocol for hepatitis C to improve the quality of care for HCV patients, to increase the clinic?s efficiency, and to identify opportunities for improvement. HCV is a complicated, intense disease process, necessitating chart reviews, patient education, and depression monitoring. To meet these time commitments the department added a new role, the designated hepatitis C nurse. The hepatitis C nurse would serve as a liaison for all HCV patients and providers. The assessment further identified an incomplete process within the referral system. During the pre-appointment chart review for new hepatitis C referrals, many required tests were incomplete. To address the gap with referrals from primary care, a brochure containing a hepatitis C screening algorithm was created. The assessment also identified a need for depression monitoring. To provide safe, up-to-date, treatment monitoring for depression in patients, the Patient Health Questionnaire (PHQ-9) was implemented. The inclusion of PHQ-9 monitoring by the hepatitis C nurse has helped the GI clinic reach its goals for administration compliance. iv Staff members and providers have reported positive impacts at the clinic after the implementation of the new change processes at the GI clinic. Patients have expressed positive satisfaction with the services, particularly the ease of communicating with the GI clinic and consistent personnel since the implementation.
APA, Harvard, Vancouver, ISO, and other styles
3

Talkington, Gregory Joshua. "Shepherding Network Security Protocols as They Transition to New Atmospheres: A New Paradigm in Network Protocol Analysis." Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1609134/.

Full text
Abstract:
The solutions presented in this dissertation describe a new paradigm in which we shepherd these network security protocols through atmosphere transitions, offering new ways to analyze and monitor the state of the protocol. The approach involves identifying a protocols transitional weaknesses through adaption of formal models, measuring the weakness as it exists in the wild by statically analyzing applications, and show how to use network traffic analysis to monitor protocol implementations going into the future. Throughout the effort, we follow the popular Open Authorization protocol in its attempts to apply its web-based roots to a mobile atmosphere. To pinpoint protocol deficiencies, we first adapt a well regarded formal analysis and show it insufficient in the characterization of mobile applications, tying its transitional weaknesses to implementation issues and delivering a reanalysis of the proof. We then measure the prevalence of this weakness by statically analyzing over 11,000 Android applications. While looking through source code, we develop new methods to find sensitive protocol information, overcome hurdles like obfuscation, and provide interfaces for later modeling, all while achieving a false positive rate of below 10 percent. We then use network analysis to detect and verify application implementations. By collecting network traffic from Android applications that use OAuth, we produce a set of metrics that when fed into machine learning classifiers, can identify if the OAuth implementation is correct. The challenges include encrypted network communication, heterogeneous device types, and the labeling of training data.
APA, Harvard, Vancouver, ISO, and other styles
4

Wu, Chen. "A new TCP protocol based on end-to-end available bandwidth measurement /." View abstract or full-text, 2005. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202005%20WU.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Horn, Stacey Lynn. "Evaluation of a new standardized modified ramp protocol : the modified BSU ramp protocol." Virtual Press, 1999. http://liblink.bsu.edu/uhtbin/catkey/1129626.

Full text
Abstract:
The purpose of this study was to develop a prediction equation for peak oxygen uptake using the Modified BSU Ramp protocol. Thirty-four subjects (14 men and 20 women, age 32-83 years) completed the standard Ball State University Adult Physical Fitness Program quiet and exercise testing sessions, with the maximal exercise test conducted with the Modified BSU Ramp protocol. The modified ramp protocol increases speed and grade every 20 seconds, and it increases by - 0.15 METs every increment for the first 6 minutes and --0.3 METs per increment thereafter. The Modified BSU ramp protocol was developed to allow for reasonable exercise test times from a standardized ramp protocol with individuals with low functional capacities < 10 METs. Pre-test procedures included height and weight measurements, resting blood pressure, resting heart rate, body fat measures, a blood lipid profile, and resting electrocardiogram (ECG). Exercise testing included ECG, heart rate, and blood pressure that were recorded prior to, during, and in the recovery phase of exercise. Subjects were instructed to continue exercise until fatigue, and respiratory gases were collected to determine V02 . Data was then analyzed using multiple regression techniques. Gender, age, body weight, and treadmill test time were the significant predictors, which were used in the regression equation (R2 = 0.586, SEE = 3.54 ml-kg-'.min'). An equation was developed from the lone predictor, treadmill test time with R2 = .37 and SEE = 4.1 ml•kg'•min'. The equation is as follows: VOA = 4.932 + 1.934 (test time (min)). Of the tests conducted on the Modified BSU ramp protocol, 82% were within an "ideal" test time window of 812 minutes, and 97% were within an "acceptable" test time window of 6-15 minutes. In conclusion, VOA can be estimated with acceptable accuracy (i.e. SEE - ± I MET) from the Modified BSU Ramp protocol, and for clinical purposes it is a suitable protocol to use when testing low fit individuals.
School of Physical Education
APA, Harvard, Vancouver, ISO, and other styles
6

Tudorache, Ion Gabriel. "Peripheral Routing Protocol : a new routing protocol proposal for a realistic WSN mobility model." Thesis, University of Leeds, 2014. http://etheses.whiterose.ac.uk/7871/.

Full text
Abstract:
Wireless sensor networks (WSNs) are changing our way of life just as the internet has revolutionized the way people communicate with each other. Future wireless networks are envisioned to be robust, have simple and efficient communication between nodes and self-organizing dynamic capabilities. When new nodes join in, a self-configuring network has to have the ability to include these nodes in its structure in real time, without human or machine interference. The need for a destination node (D) which moves at the periphery of wireless sensor networks can be argued from different points of view: the first is that different WSN scenarios require data gathering in such a way; the second point is that this type of node movement maximizes network lifetime because it offers path diversity preventing the case where the same routes are used excessively. However the peripheral movement model of the mobile destination does not resemble any mobility models presented in the WSN literature. In this thesis a new realistic WSN sink mobility model entitled the “Marginal Mobility Model” (MMM) is proposed. This was introduced for the case when the dynamic destination (D), moving at the periphery, frequently exits and enters the WSN coverage area. We proved through Qualnet simulations that current routing protocols recommended for Mobile Ad Hoc Networks (MANETs) do not support this sink mobility model. Because of this, a new routing protocol is proposed to support it called the Peripheral Routing Protocol (PRP). It will be proven through MATLAB simulations that, for a military application scenario where D’s connectivity to the WSN varies between 10%-95%, compared with the 100% case, PRP outperforms routing protocols recommended for MANETs in terms of throughput (T), average end to end delay (AETED) and energy per transmitted packet (E). Also a comparison will be made between PRP and Location-Aided Routing (LAR) performance when D follows the MMM. Analytical models for both PRP and LAR are proposed for T and E. It is proved through MATLAB simulations that, when compared with LAR, PRP obtains better results for the following scenarios: when the WSN size in length and width is increased to 8000 m and one packet is on the fly between sender and sink, PRP sends 103% more data and uses 84% less energy; when more data packets are on the fly between sender and sink, PRP sends with 99.6% more data packets and uses 81% less energy; when the WSN density is increased to 10,000 nodes PRP uses 97.5% less energy; when D’s speed in increased to 50 Km/h, PRP sends 74.7% more data packets and uses 88.4% less energy.
APA, Harvard, Vancouver, ISO, and other styles
7

Shivarudraiah, Ranjitha. "STCP: A New Transport Protocol for High-Speed Networks." Digital Archive @ GSU, 2009. http://digitalarchive.gsu.edu/cs_theses/67.

Full text
Abstract:
Transmission Control Protocol (TCP) is the dominant transport protocol today and likely to be adopted in future high‐speed and optical networks. A number of literature works have been done to modify or tune the Additive Increase Multiplicative Decrease (AIMD) principle in TCP to enhance the network performance. In this work, to efficiently take advantage of the available high bandwidth from the high‐speed and optical infrastructures, we propose a Stratified TCP (STCP) employing parallel virtual transmission layers in high‐speed networks. In this technique, the AIMD principle of TCP is modified to make more aggressive and efficient probing of the available link bandwidth, which in turn increases the performance. Simulation results show that STCP offers a considerable improvement in performance when compared with other TCP variants such as the conventional TCP protocol and Layered TCP (LTCP).
APA, Harvard, Vancouver, ISO, and other styles
8

ROSEMBERG, MARCIO RICARDO. "SRAP: A NEW AUTHENTICATION PROTOCOL FOR SEMANTIC WEB APPLICATIONS." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2014. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=24515@1.

Full text
Abstract:
PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO
COORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR
PROGRAMA DE EXCELENCIA ACADEMICA
Normalmente, aplicações semânticas utilizam o conceito de linked data, onde é possível obter dados de diversas fontes e em múltiplos formatos. Desta forma, as aplicações semânticas processam muito mais dados do que as aplicações tradicionais. Uma vez que nem todas as informações são públicas, alguma forma de autenticação será imposta ao usuário. Consultar dados de múltiplas fontes pode requerer muitos pedidos de autenticação, normalmente através de uma combinação de conta de usuário e senha. Tais operações consomem tempo e, considerando-se o tempo extra que uma aplicação semântica leva para processar os dados coletados, pode tornar a experiência frustrante e incômoda para os usuários, devendo ser minimizado, sempre que possível. O propósito desta dissertação é o de analisar e comparar as técnicas de autenticação disponíveis para as aplicações semânticas e propor um protocolo mais rápido e mais seguro para autenticação em aplicações semânticas.
Usually, Linked Data makes Semantic Web Applications query much more information for processing than traditional Web applications. Since not all information is public, some form of authentication may be imposed on the user. Querying data from multiple data sources might require many authentication prompts. Such time consuming operations, added to the extra amount of time a Semantic Web application needs to process the data it collects might be frustrating to the users and should be minimized. The purpose of this thesis is to analyze and compare several Semantic Web authentication techniques available, leading to the proposal of a faster and more secure authentication protocol for Semantic Web Applications.
APA, Harvard, Vancouver, ISO, and other styles
9

Sivada, Siva Rupesh. "A new multicasting protocol based on modified reverse path forwarding /." Available to subscribers only, 2009. http://proquest.umi.com/pqdweb?did=1797219891&sid=3&Fmt=2&clientId=1509&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nikolaev, Ruslan. "A New QoS Routing Protocol for Mobile Ad-hoc Network." Available to subscribers only, 2009. http://proquest.umi.com/pqdweb?did=1796121001&sid=2&Fmt=2&clientId=1509&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "New protocol"

1

Huitema, Christian. IPv6--the new Internet protocol. Upper Saddle River, N.J: Prentice Hall PTR, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

IPv6--the new Internet protocol. 2nd ed. Upper Saddle River, NJ: Prentice Hall PTR, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

New Zealand. Ministry for the Environment., ed. New Zealand urban design protocol. Wellington: Ministry for the Environment, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Simon, Hank. Wireless application protocol: The new Internet standard for wireless application development. Charleston, SC: Computer Technology Research, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

New Zealand. Ministry of Health., ed. National protocol for methadone treatment in New Zealand. [New Zealand]: Ministry of Health, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Halo: The Cole Protocol. New York: Tor, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tauroa, Hiwi. Te marae: A guide to customs & protocol. Birkenhead, Auckland: Reed Books, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mollo, J. K. Diplomacy protocol: With focus on multi-cultural new South Africa. Johannesburg: J.K. Mollo, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Patricia, Tauroa, and Hanly Gil, eds. Te marae: A guide to customs & protocol. Auckland: Reed Methuen, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yan, Shuqian. Implementation and evaluation of QoSMIC: A new internet multicast routing protocol. Ottawa: National Library of Canada, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "New protocol"

1

Okazaki, Naonobu, Mi Rang Park, Kaoru Takahashi, and Norio Shiratori. "A New Test Sequence Generation Method for Interoperability Testing." In Protocol Test Systems, 243–58. Boston, MA: Springer US, 1995. http://dx.doi.org/10.1007/978-0-387-34883-4_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jaén, Tomás F. Fernandez, and Pedro Guillén García. "New Protocol for Muscle Injury Treatment." In Sports Injuries, 887–93. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-15630-4_114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gong, ShengWen. "A New Formal Communication Protocol Model." In Advances in Intelligent and Soft Computing, 629–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29390-0_100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bhutta, Muhammad Nasir Mumtaz, and Haitham Cruickshank. "A New Dynamic Multilayer IPSec Protocol." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 119–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36787-8_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Boualam, Soukayna Riffi, and Abdellatif Ezzouhairi. "New Objective Function for RPL Protocol." In Embedded Systems and Artificial Intelligence, 681–90. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-0947-6_64.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Alouache, Lylia, Nga Nguyen, Makhlouf Aliouat, and Rachid Chelouah. "New Robust Protocol for IoV Communications." In Challenges of the Internet of Things, 137–63. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119549765.ch7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, Chong Hee, and Pil Joong Lee. "New Key Recovery in WAKE Protocol." In Public Key Cryptography, 325–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44586-2_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Papazis, Kon, Naveen K. Chilamkurti, and Ben Soh. "A New Adaptive Layered Multicast Protocol." In Lecture Notes in Computer Science, 381–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25969-5_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, Soon-gohn, and Heau-jo Kang. "A New Secure Oblivious Transfer Protocol." In Computational Science and Its Applications - ICCSA 2006, 690–99. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11751649_76.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Maffei, Ivo, and Andrew W. Roscoe. "Optimally-Fair Exchange of Secrets via Delay Encryption and Commutative Blinding." In Financial Cryptography and Data Security, 94–111. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-47754-6_6.

Full text
Abstract:
AbstractWe propose a new fair exchange protocol that takes advantage of delay encryption and commutative encryption to achieve optimal partial fairness among all protocols involving one-way messages. Our protocol consists of 3 setup messages and $$2N+1$$ 2 N + 1 exchange messages and it is fair against covert adversaries with probability $$1- \frac{1}{2N}$$ 1 - 1 2 N . We prove that this is optimal up to shortening the setup phase which is notably more efficient than existing protocols.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "New protocol"

1

Zhang, Rui. "A new dynamic contract net protocol." In 2011 IEEE 3rd International Conference on Communication Software and Networks (ICCSN). IEEE, 2011. http://dx.doi.org/10.1109/iccsn.2011.6013964.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tan, Yang, and Bo Lv. "Mistakes of a Popular Protocol Calculating Private Set Intersection and Union Cardinality and its Corrections." In 3rd International Conference on Artificial Intelligence and Machine Learning (CAIML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121209.

Full text
Abstract:
In 2012, De Cristofaro et al. proposed a protocol to calculate the Private Set Intersection and Union cardinality (PSI-CA and PSU-CA). This protocol's security is based on the famous DDH assumption. Since its publication, it has gained lots of popularity because of its efficiency (linear complexity in computation and communication) and concision. So far, it's still considered one of the most efficient PSI-CA protocols and the most cited (more than 170 citations) PSI-CA paper based on the Google Scholar search. However, when we tried to implement this protocol, we couldn't get the correct result of the test data. Since the original paper lacks of experimental results to verify the protocol's correctness, we looked deeper into the protocol and found out it made a fundamental mistake. Needless to say, its correctness analysis and security proof are also wrong. In this paper, we will point out this PSI-CA protocol's mistakes, and provide the correct version of this protocol as well as the PSI protocol developed from this protocol. We also present a new security proof and some experimental results of the corrected protocol.
APA, Harvard, Vancouver, ISO, and other styles
3

Nomura, Takizuka, Kiriyama, Maruyama, and Yamamoto. "New Protocol Architecture Asel." In 1998 International Conference on Consumer Electronics. IEEE, 1998. http://dx.doi.org/10.1109/icce.1998.678312.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Qing-gui, Hu. "The new IPv6 security protocol-limited transmission protocol." In 2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS). IEEE, 2017. http://dx.doi.org/10.1109/eiis.2017.8298705.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dizaj, Mohammad Vahid Alizadeh, Reza Askari Moghaddam, and Samad Momenebellah. "New mobile payment protocol: Mobile pay center protocol 2 (MPCP2) by using new key agreement protocol: VAM." In 2011 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PacRim). IEEE, 2011. http://dx.doi.org/10.1109/pacrim.2011.6032860.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dizaj, Mohammad Vahid Alizadeh. "New mobile payment protocol: Mobile pay center protocol 4 (MPCP4) by using new key agreement protocol: VAC2." In 2011 3rd International Conference on Electronics Computer Technology (ICECT). IEEE, 2011. http://dx.doi.org/10.1109/icectech.2011.5941657.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dizaj, Mohammad Vahid Alizadeh, Reza Askari Moghaddam, and Samad Momenebellah. "New mobile payment protocol: Mobile pay center protocol (MPCP)." In 2011 3rd International Conference on Electronics Computer Technology (ICECT). IEEE, 2011. http://dx.doi.org/10.1109/icectech.2011.5941658.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Hao, Yuyi Ou, Jie Ling, Xiang Xu, and Heqing Guo. "A New Certified Email Protocol." In 18th International Conference on Database and Expert Systems Applications (DEXA 2007). IEEE, 2007. http://dx.doi.org/10.1109/dexa.2007.117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Hao, Yuyi Ou, Jie Ling, Xiang Xu, and Heqing Guo. "A New Certified Email Protocol." In 18th International Conference on Database and Expert Systems Applications (DEXA 2007). IEEE, 2007. http://dx.doi.org/10.1109/dexa.2007.4312981.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nguyen, Trong Khanh, Nicolas Marilleau, Tuong Vinh Ho, and Amal El Fallah. "New protocol supporting collaborative simulation." In the Second Symposium. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2069216.2069244.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "New protocol"

1

Keates, S. Chapter 15: Commercial New Construction Protocol. Office of Scientific and Technical Information (OSTI), September 2014. http://dx.doi.org/10.2172/1158443.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Harrington, D. Guidelines for Considering Operations and Management of New Protocols and Protocol Extensions. RFC Editor, November 2009. http://dx.doi.org/10.17487/rfc5706.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Polk, J. IANA Registration of New Session Initiation Protocol (SIP) Resource-Priority Namespaces. RFC Editor, March 2009. http://dx.doi.org/10.17487/rfc5478.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Palacz, Artur, Maciej Telszewski, Toste Tanhua, and Emma Heslop. Marine Plastics EOV and common sampling protocol. EuroSea, 2022. http://dx.doi.org/10.3289/eurosea_d1.5.

Full text
Abstract:
This deliverable describes the process of establishing global coordination for sustained observations of marine plastics litter as a new type of Essential Ocean Variable (EOV) addressing the aspect of observing human impacts on the ocean. The document reports on the EuroSea efforts to implement a community vision for an Integrated Marine Debris Observing System (IMDOS) as a new element of the Global Ocean Observing System (GOOS). First version of the Marine Plastics Litter EOV Specification Sheet is included. Progress towards establishing common sampling protocols for marine plastic litter in Europe and beyond are described.
APA, Harvard, Vancouver, ISO, and other styles
5

Holmberg, C., and J. Axell. IANA Registration of New Session Initiation Protocol (SIP) Resource-Priority Namespace for Mission Critical Push To Talk Service. RFC Editor, March 2017. http://dx.doi.org/10.17487/rfc8101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kurnik, Charles W., and Steven Keates. Chapter 15: Commercial New Construction Evaluation Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures. Office of Scientific and Technical Information (OSTI), October 2017. http://dx.doi.org/10.2172/1399359.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shamblin, Robert, Kevin Whelan, Mario Londono, and Judd Patterson. South Florida/Caribbean Network early detection protocol for exotic plants: Corridors of invasiveness. National Park Service, July 2022. http://dx.doi.org/10.36967/nrr-2293364.

Full text
Abstract:
Exotic plant populations can be potentially catastrophic to the natural communities of South Florida. Aggressive exotics such as Brazillian Pepper (Schinus terebinthifolius) and Melaleuca (Melaleuca quinquinervia) have displaced native habitats and formed monocultures of exotic stands (Dalrymple et al. 2003). Nearby plant nurseries, especially the ones outside the boundaries of Biscayne National Park (BISC) and Everglades National Park (EVER), are a continuous source of new exotic species that may become established within South Florida’s national parks. Early detection and rapid response to these new species of exotic plants is important to maintaining the integrity of the parks’ natural habitats and is a cost-effective approach to management. The South Florida/Caribbean Network (SFCN) developed the South Florida/Caribbean Network Early Detection Protocol for Exotic Plants to target early detection of these potential invaders. Three national parks of South Florida are monitored for invasive, exotic plants using this protocol: Big Cypress National Preserve (BICY), Biscayne National Park (BISC), and Everglades National Park (EVER). These national parks include some 2,411,000 acres (3,767.2 square miles [mi2]) that encompass a variety of habitat types. To monitor the entire area for new species would not be feasible; therefore the basic approach of this protocol is to scan major “corridors of invasiveness,” e.g., paved and unpaved roads, trails, trail heads, off road vehicle (ORV) trails, boat ramps, canals, and campgrounds, for exotic plant species new to the national parks of South Florida. Sampling is optimized using a two- to three-person crew: a trained botanist, a certified herbicide applicator, and optionally a SFCN (or IPMT [Invasive Plant Management Team]) staff member or park staff to take photographs and help with data collection. If infestations are small, they are treated immediately by the herbicide applicator. If large, they are reported to park staff and the Invasive Plant Management Team. The sampling domain is partitioned into five regions, with one region sampled per year. Regions include the terrestrial habitats of Biscayne National Park, the eastern region of Everglades National Park, the western region of Everglades National Park, the northern region of Big Cypress National Preserve, and the southern region of Big Cypress National Preserve. Monitoring of roads, trails, and canals occurs while traveling into and through the parks (i.e., travel at 2–10 mph) using motorized vehicles, airboats, and/or hiking. Campgrounds, boat launches, trailheads, and similar areas, involve complete searches. When an exotic plant is observed, a GPS location is obtained, and coordinates are taken of the plant. Photographs are not taken for every exotic plant encountered, but photographs will be taken for new and unusual species (for example a coastal exotic found in inland habitats). Information recorded at each location includes the species name, size of infestation, abundance, cover class, any treatment/control action taken, and relevant notes. During the surveys, a GPS “track” is also recorded to document the areas surveyed and a field of view is estimated. Field notes, pictures, and GPS data are compiled, entered, and analyzed in a Microsoft Access database. Resource briefs (and optional data summary reports) and associated shapefiles and data are then produced and sent to contacts within the corresponding national parks.
APA, Harvard, Vancouver, ISO, and other styles
8

Purba, Abdul, Saraswati Gumilang, Dhihintia Jiwangga, Nurina Hasanatuludhhiyah, and Maarten Postma. Cost and clinical outcomes in the use of new oral anticoagulants versus warfarin in deep vein thrombosis: A systematic review protocol. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, December 2022. http://dx.doi.org/10.37766/inplasy2022.12.0106.

Full text
Abstract:
Review question / Objective: What are the benefits of using new oral anticoagulants compared to warfarin in terms of efficacy, bleeding, and cost among people with deep vein thrombosis? This study aimed to compare the effectiveness, bleeding incidence, and cost between NOAC and warfarin in DVT patients. Condition being studied: The patient confirmed DVT with the results of the Wells' score and D-dimer test stating "possible DVT" and followed by an ultrasound examination which stated "DVT positive". Patients are taking oral anticoagulants to treat DVT or to prevent a recurrence. Oral anticoagulants consist of apixaban, rivaroxaban, edoxaban, dabigatran, and warfarin.
APA, Harvard, Vancouver, ISO, and other styles
9

Onikzeh, Parinaz, Afshin Heidari, Aida Kazemi, Parisa Najjariasl, Kamran Dalvandi, Hamidreza Sadeghsalehi, and Hadi Zamanian. 3D photography versus digital planimetry in wound measurement : a systematic review protocol. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, October 2021. http://dx.doi.org/10.37766/inplasy2021.10.0069.

Full text
Abstract:
Review question / Objective: The aim of this study is to find whether there is concordance between two methods of wound area measurement: 3D photography and digital planimetry. Condition being studied: One of the most important factors in all types of wound management is wound measurement and two new digital techniques are : digital planimetry and 3D-photography. Eligibility criteria: the articles will be included only if the study cases would be measured by both methods of wound measurement including 3D photography and digital planimetry. patients with wound in any area of their body like diabetic ulcers, venous ulcers or burning. not models or animals.not bite or scar or bruising. without any restriction in age or gender.
APA, Harvard, Vancouver, ISO, and other styles
10

Canellas, João Vitor, Luciana Drugos, Fabio Ritto, Ricardo Fischer, and Paulo Jose Medeiros. What grafting materials produce greater new bone formation in maxillary sinus floor elevation surgery? A systematic review and network meta-analysis protocol. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, June 2020. http://dx.doi.org/10.37766/inplasy2020.6.0106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography