Academic literature on the topic 'Survey protocols'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Survey protocols.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Survey protocols"
Singh, Amar, Shakti Kumar, and Sukhbir Singh Walia. "Routing Protocols for WMNs: A Survey." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (September 27, 2017): 1. http://dx.doi.org/10.23956/ijarcsse.v7i7.87.
Full textG. Hamid, Harth, and Zainab T. Alisa. "A survey on IoT application layer protocols." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 3 (March 10, 2021): 1663. http://dx.doi.org/10.11591/ijeecs.v21.i3.pp1663-1672.
Full textMidha, Surabhi, and Anand Nayyar. "A Survey of Wireless Sensor Network Routing Protocols based on SPIN." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 6 (June 30, 2014): 4583–92. http://dx.doi.org/10.24297/ijct.v13i6.2521.
Full textRathish S, Ashok, and Dr Paramasivam K. "A Survey on Emulation of Communication Protocols in Microcontrollers." International Journal of Innovative Science and Research Technology 5, no. 7 (July 25, 2020): 395–99. http://dx.doi.org/10.38124/ijisrt20jul480.
Full textAlfouzan, Faisal Abdulaziz. "Energy-Efficient Collision Avoidance MAC Protocols for Underwater Sensor Networks: Survey and Challenges." Journal of Marine Science and Engineering 9, no. 7 (July 4, 2021): 741. http://dx.doi.org/10.3390/jmse9070741.
Full textCynthia, Prudhvi Krishna Saguturu, C., Komali Bandi, Srikanth Magulluri, and T. Anusha. "A survey on MANET protocols in wireless sensor networks." International Journal of Engineering & Technology 7, no. 2.31 (May 29, 2018): 1. http://dx.doi.org/10.14419/ijet.v7i2.31.13384.
Full textDesai, Rahul M., B. P. Patil, and Davinder Pal Sharma. "Routing Protocols for Mobile Ad Hoc Network - A Survey and Analysis." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 3 (September 1, 2017): 795. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp795-801.
Full textOliveira, Luiz, Joel Rodrigues, Sergei Kozlov, Ricardo Rabêlo, and Victor Albuquerque. "MAC Layer Protocols for Internet of Things: A Survey." Future Internet 11, no. 1 (January 14, 2019): 16. http://dx.doi.org/10.3390/fi11010016.
Full textBaashirah, Rania, and Abdelshakour Abuzneid. "Survey on Prominent RFID Authentication Protocols for Passive Tags." Sensors 18, no. 10 (October 22, 2018): 3584. http://dx.doi.org/10.3390/s18103584.
Full textKaur, Jaspinder, Taranvir Kaur, and Kanchan Kaushal. "Survey on WSN Routing Protocols." International Journal of Computer Applications 109, no. 10 (January 16, 2015): 24–28. http://dx.doi.org/10.5120/19226-0924.
Full textDissertations / Theses on the topic "Survey protocols"
Yang, Ying. "Routing protocols for wireless sensor networks: A survey." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-19700.
Full textTse, Kent. "Survey of Internet security protocols." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape16/PQDD_0002/MQ37174.pdf.
Full textZubimendi, Leire. "Survey on video-on-demand broadcasting protocols." Zürich : ETH, Swiss Federal Institute of Technology Zurich, Department of Computer Science, Institute for Pervasive Computing, Information and Communication Systems Research Group, 2008. http://e-collection.ethbib.ethz.ch/show?type=dipl&nr=361.
Full textAbtin, Houman. "A survey of the irrigation protocols used by dentists in British Columbia, Canada." Thesis, University of British Columbia, 2011. http://hdl.handle.net/2429/37003.
Full textYousef, Paul. "GSM-Security: A Survey and Evaluation of the Current Situation." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2273.
Full textThe Global System for Mobile Communications (GSM) is the most widely used cellular technology in the world. Approximately 800 million people around the world are using GSM for different purposes, but mostly for voice communication and SMS. For GSM, like many other widely used systems, security is crucial. The security involves mechanisms used to protect the different shareholders, like subscribers and service providers. The aspects of security that this report covers are mainly anonymity, authentication and confidentiality.
The important aspects of the system that need protection are described, along with the implementation of mechanisms used for the protection. It appears that many of the very valuable aspects of GSM can be attacked.
The anonymity of a GSM user is compromised resulting in the attacker being able to observe the time, rate, length, sources or destinations of e g calls. Even tracking a subscriber’s movements becomes possible. However, a passive attack is not sufficient to perform these attacks. The attacker needs to mount an active attack using equipment offering base station functionality.
Authentication is a crucial aspect of a wireless communication system due to the nature of the medium used, i e the radio link that is available to every one and not only the legitimate entities. Even the authentication mechanisms are attacked. It is possible to clone a subscription either by having physical access to the smart card or over the air interface. Cloning a subscription over the air requires base station functionality.
The most obvious threat against communication systems is eavesdropping on conversations. The privacy of GSM conversations is protected using some version of the A5 algorithm. There are several impressive cryptanalytical attacks against these algorithms, that break the encryption and make it possible to eavesdrop in real-time. Most of these algorithms require, however, extensive computation power and unrealistic quantities of known plaintext, which make it difficult to use them in practice. Difficulties using cryptanalytical attacks to break the confidentiality of GSM calls does not mean that conversations are well protected. Loopholes in the protocols used in GSM make it possible for an outsider, with access to sufficient equipment, to eavesdrop on conversations in real-time.
In the presence of these threats and vulnerabilities it is justified to wonder whether GSM provides sufficient security for users with very valuable information to communicate. These users may be military organisations, senior management personnel in large companies etc. GSM’s current security model does note provide sufficient protection for these entities. An additional layer of security should be added to the current security model.
Pumper, Candace. "PROTOCOLS FOR PERIOPERATIVE NUTRITIONAL CARE PRACTICE IN ACCREDITED BARIATRIC SURGICAL CENTERS: A SURVEY OF CURRENT PRACTICE." Kent State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=kent1500560856156472.
Full textGrinnemo, Karl-Johan. "A Study of Partially Reliable Transport Protocols for Soft Real-Time Applications." Licentiate thesis, Karlstads universitet, Avdelningen för datavetenskap, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-33933.
Full textHolloway, Simon, and n/a. "Survey protocols for the stream-breeding frogs of Far East Gippsland : the application of habitat modelling and an assessment of techniques." University of Canberra. Resource, Environmental & Heritage Sciences, 1997. http://erl.canberra.edu.au./public/adt-AUC20060725.150009.
Full textCunha, Fábio Jorge Costa. "Dirofilariose cardiopulmonar em canídeos domésticos : estudo clínico e retrospectivo, situação em Portugal." Master's thesis, Universidade de Lisboa, Faculdade de Medicina Veterinária, 2019. http://hdl.handle.net/10400.5/18073.
Full textA dirofilariose cardiopulmonar (DCP) é causada pelo nemátode Dirofilaria immitis, transmitido por vetores (mosquitos culicídeos) e é capaz de infetar uma grande variedade de hospedeiros, sendo os seus alvos preferenciais, canídeos domésticos e selvagens. Em Portugal, a espécie D. immitis é endémica e tem grande relevância no panorama nacional, especialmente nas bacias fluviais do Tejo, Douro, Sado, Mondego e na região autónoma da Madeira. Os objetivos deste estudo foram a determinação da prevalência de D. immitis em cães com proprietário no concelho de Sintra, avaliar os fatores de risco que possam estar associados à sua transmissão e os protocolos de prevenção que eram praticados nos cães submetidos a este estudo. O estudo consistiu na recolha de amostras sanguíneas de 50 cães, que foram analisadas com recurso a testes rápidos Uranoteste® Dirofilaria e ao teste de Knott modificado, para pesquisa da presença de dirofilárias adultas e microfilárias, respetivamente. Foram também preenchidos presencialmente 50 inquéritos pelos proprietários dos animais que participaram no presente estudo. Neste estudo não foram detetados animais positivos à DCP pelos dois métodos de deteção utilizados. Em relação a comportamentos de risco, 12%(6/50) dos animais vivia permanentemente em quintal, 16%(7/44) dos inquiridos passeava o seu animal em zonas com cursos de água, 93,2%(41/44) fazia-o em período noturno e 81,8%(35/44) dos animais contactava com animais fora do ambiente familiar e de estatuto sanitário desconhecido. Dos animais que entraram no estudo, apenas 28%(14/50) não fazia prevenção contra a DCP. No entanto, os proprietários que a faziam, utilizavam um protocolo que se encontra no limiar do aconselhado pela maioria dos autores para a desparasitação interna (4 vezes ao ano). No entanto, o recomendado pelo European Scientific Counsel Companion Animal Parasites (ESCCAP) para prevenção de D. immitis é um tratamento mensal. Tendo em conta que existe ainda hoje uma grande proporção de tutores que não tem informação, nem conhecimento, sobre protocolos eficazes contra doenças parasitárias, é de extrema importância, especialmente se estivermos a falar de doenças de carácter zoonótico, que sejam criadas medidas para que as pessoas tenham melhor e mais fácil acesso à informação. Com este objetivo em mente, é necessário contar com a colaboração do médico veterinário, presencialmente, para que este tenha um papel ativo durante a consulta em matérias de desparasitação, mas também ao referenciar plataformas digitais que contenham essa informação para consulta gratuita, como é o caso do site da ESCCAP a nível europeu.
ABSTRACT - Cardiopulmonary Dirofilariosis in domestic dogs- a clinical and retrospective study - Heartworm disease (HWD) is caused by a nematode of the species Dirofilaria immitis, which is transmited by vectors (Culicidae mosquitoes) and is capable of infecting a wide varieaty of hosts, with its preferential targets being both domestic and wild dogs. In Portugal, D. immitis is endemic and has a great relevance in the national panorama, especially in the river basins of Tejo, Douro, Sado and Mondego and in the autonomous region of Madeira. The goals of this study were to determine the prevalence of D. immitis in dogs with owner in the county of Sintra, evaluate the risk factors that might be associated with its transmission and the preventive protocols that were practiced in the dogs included in this study. This research consisted in the collection of blood samples from 50 dogs, which were analyzed using Uranoteste® Dirofilaria rapid tests and modified Knott test for assessing the presence of adult heartworms and microfilariae, respectively. The 50 animal owners who participated in this study also answered a face-to-face questionary. There were no heartworm positive animals in this study using both detection methods. In relation to the risk behaviors, 12% (6/50) of the animals lived permanently in the backyard, 16% (7/44) of the owners said that they walked with their animals in areas with water courses, 93.2% (41/44) walked at night, 81.8% (35/44) of the animals were in contact with animals outside family enviroment and of unknown health status. Of all the animals in this study, only 28% (14/50) did not have any prevention against HWD, although those who did, used a protocol at the threshold of the suggested by most authors for internal parasite deworming (4 times a year). However, being European Scientific Counsel Companion Animal Parasites (ESCCAP) recommends a monthly preventive treatment for D. immitis. If we take in consideration that a large number of people who does not have neither the information, nor the knowledge, regarding effective protocols against parasitic deseases, it is of paramount importance, especially if we are talking about zoonotic deseases, that measures are taken, so that the population has better and easier access to information. With this objective in mind, it is necessary to rely on the veterinarian's cooperation, personally, so that he can have an active role during the medical consultation on the deworming subject, but also when referring to digital plataforms containing free, reliable and independent information, for later consultation, like the ESCCAP site at the European level.
N/A
Tuyisenge, Livinus. "CoVEceVé - Collecte des données Véhicule/Environnement et remontée avec réseau Cellulaire et réseau Véhiculaire. Network Architectures in Internet of Vehicles (IoV): Review, Protocols Analysis, Challenges and Issues Handover Mechanisms in Internet of vehicles (IoV): survey, Trends, Challenges, and Issues." Thesis, Reims, 2019. http://www.theses.fr/2019REIMS023.
Full textVertical handover is one of the key technologies that will facilitate the connected and autonomous vehicles deployment. Today, the emergence of Vehicular Ad hoc NETworks (VANETs): Vehicle to Vehicle (V2V) communications, Vehicle to Infrastructure (V2I) and Vehicle-to-Everything (V2X) has enabled new applications such as Cooperative Intelligent Transport Systems (C-ITS), real-time applications (for example, autonomous driving), road traffic management applications and comfort applications. However, these networks are characterized by a high level of mobility and dynamic change in the topology, which generates scattered networks and requires handover mechanisms for maintaining ongoing session continuity. To address this problem, we have proposed a PMIP-based Mobile Internal Vertical Handover (PMIP-MIVH) approach which takes advantage of the use of a logical interface in handling handover. To improve and extend our approach, a cross-layer and fuzzy logic-based selection method of the best available network has been also proposed. Analytical results and conducted simulation results all show that the proposed solutions overperform the existing handovers and enhance efficiently the handover management in the VANETs field
Books on the topic "Survey protocols"
Morgan, John D. Death education in Canada: Survey, curricula, protocols, bibliography. London, Ont: King's College, 1990.
Find full textK, Kokula Krishna Hari, ed. A Survey on Routing Protocols in Wireless Sensor Networks. Chennai, India: Association of Scientists, Developers and Faculties, 2016.
Find full textE, Allen James. Nursing home federal requirements, guidelines to surveyors, and survey protocols. 5th ed. New York: Springer Pub. Co., 2003.
Find full text1935-, Allen James E., ed. Nursing home federal requirements, guidelines to surveyors, and survey protocols. 4th ed. New York: Springer Pub. Co., 2000.
Find full textHale, Sandra Beatriz. Interpreter policies, practices and protocols in Australian courts and tribunals: A national survey. Melbourne: Australasian Institute of Judicial Administration Incorporated, 2011.
Find full textJoint Commission on Accreditation of Healthcare Organizations. 1995 survey protocol for subacute programs. Oakbrook Terrace, IL: Joint Commission, 1995.
Find full textE, Allen James. Nursing home federal requirements: Guidelines to surveyors and survey protocols, 2006 : a user-friendly rendering of the Centers for Medicare and Medicaid's (CMS) nursing home inspection and requirement forms. 6th ed. New York: Springer Pub. Co., 2007.
Find full textS, Horbach Nicolette, and Korn Abner Paul, eds. Protocols for office gynecologic surgery. Cambridge, Mass., USA: Blackwell Science, 1996.
Find full textKendell, Kris. Survey protocol for the northern leopard frog. Edmonton, Alta: Alberta Sustainable Resource Development, 2002.
Find full textDowney, Brad A. Survey protocol for the Richardson's ground squirrel. Edmonton: Alberta Sustainable Resource Development, 2003.
Find full textBook chapters on the topic "Survey protocols"
Soumya, Sripada, and V. A. Sankar Ponnapalli. "A Survey—Vanets and Protocols." In Lecture Notes in Electrical Engineering, 413–19. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1420-3_42.
Full textShan, Weifeng, Husheng Liao, and Xueyuan Jin. "XML Concurrency Control Protocols: A Survey." In Web-Age Information Management, 299–308. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33050-6_29.
Full textBrelurut, Agnès, David Gerault, and Pascal Lafourcade. "Survey of Distance Bounding Protocols and Threats." In Foundations and Practice of Security, 29–49. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30303-1_3.
Full textMohamed Zain, Ifa Fatihah, Azlan Awang, and Anis Laouiti. "Hybrid MAC Protocols in VANET: A Survey." In Advances in Intelligent Systems and Computing, 3–14. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3503-6_1.
Full textMeadows, Catherine A., and Catherine A. Meadows. "Formal verification of cryptographic protocols: A survey." In Advances in Cryptology — ASIACRYPT'94, 133–50. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/bfb0000430.
Full textYang, Ruidi. "Survey on Privacy-Preserving Machine Learning Protocols." In Machine Learning for Cyber Security, 417–25. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62223-7_36.
Full textGao, Zhenguo, Yongtian Yang, Jing Zhao, Jianwen Cui, and Xiang Li. "Service Discovery Protocols for MANETs: A Survey." In Lecture Notes in Computer Science, 232–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11943952_20.
Full textChen, Chin-Ling, Yue-Xun Chen, Chin-Feng Lee, and Yong-Yuan Deng. "A Survey of Authentication Protocols in VANET." In Lecture Notes on Data Engineering and Communications Technologies, 572–77. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02613-4_51.
Full textSøbirk, Daniel, and Johan M. Karlsson. "A survey of wireless ATM MAC protocols." In Performance and Management of Complex Communication Networks, 191–210. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-0-387-35360-9_11.
Full textSrinivasan, V., and G. Varghese. "A Survey of Recent IP Lookup Schemes." In Protocols for High-Speed Networks VI, 9–23. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-0-387-35580-1_3.
Full textConference papers on the topic "Survey protocols"
Ayyappan, B., and P. Mohan Kumar. "Security protocols in WSN: A survey." In 2017 Third International Conference on Science Technology Engineering & Management (ICONSTEM). IEEE, 2017. http://dx.doi.org/10.1109/iconstem.2017.8261297.
Full textMishra, Priya, Charu, and Buddha Singh. "Position based routing protocols: A survey." In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). IEEE, 2017. http://dx.doi.org/10.1109/i-smac.2017.8058391.
Full textLijun Gao and Zhang Lu. "Low-cost RFID security protocols survey." In 2011 Cross Strait Quad-Regional Radio Science and Wireless Technology Conference (CSQRWC). IEEE, 2011. http://dx.doi.org/10.1109/csqrwc.2011.6037142.
Full textYousuf, Yawer, and Vidyasagar Potdar. "A Survey of RFID Authentication Protocols." In 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008). IEEE, 2008. http://dx.doi.org/10.1109/waina.2008.214.
Full textDevangavi, Anil D., and Rajendra Gupta. "Routing protocols in VANET — A survey." In 2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon). IEEE, 2017. http://dx.doi.org/10.1109/smarttechcon.2017.8358362.
Full textRahayu, Triana Mugia, Sang-Gon Lee, and Hoon-Jae Lee. "Survey on LEACH-based security protocols." In 2014 16th International Conference on Advanced Communication Technology (ICACT). Global IT Research Institute (GIRI), 2014. http://dx.doi.org/10.1109/icact.2014.6778970.
Full textVasu, K. "MIPV6 Protocols: A Survey and Comparative Analysis." In The Fourth International Workshop on Computer Networks & Communications. Academy & Industry Research Collaboration Center (AIRCC), 2012. http://dx.doi.org/10.5121/csit.2012.2408.
Full textElrhareg, Houda, Mohammed Ridouani, and Aawatif Hayar. "Routing Protocols on Cognitive Radio Networks: Survey." In 2019 IEEE International Smart Cities Conference (ISC2). IEEE, 2019. http://dx.doi.org/10.1109/isc246665.2019.9071779.
Full textGarcia-Munoz, Luis H., J. Enrique Armendariz-Inigo, Hendrik Decker, and Francesc D. Munoz-Escoi. "Recovery Protocols for Replicated Databases--A Survey." In 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07). IEEE, 2007. http://dx.doi.org/10.1109/ainaw.2007.306.
Full textAhmed, Salman, and Aamer Nadeem. "A survey on mobile agent communication protocols." In 2012 International Conference on Emerging Technologies (ICET). IEEE, 2012. http://dx.doi.org/10.1109/icet.2012.6375488.
Full textReports on the topic "Survey protocols"
Meadows, Catherine A. Formal Verification of Cryptographic Protocols: A Survey. Fort Belvoir, VA: Defense Technical Information Center, January 1995. http://dx.doi.org/10.21236/ada464292.
Full textWelzl, M., and D. Ros. A Survey of Lower-than-Best-Effort Transport Protocols. RFC Editor, June 2011. http://dx.doi.org/10.17487/rfc6297.
Full textEnghardt, T., T. Pauly, C. Perkins, K. Rose, and C. Wood. A Survey of the Interaction between Security Protocols and Transport Services. RFC Editor, October 2020. http://dx.doi.org/10.17487/rfc8922.
Full textechiam, Ostchega, Tatiana Nwankwo, Michele Chiappa, Jessica Graber, and Nguyen Duong T. Series 2–187: Comparing Blood Pressure Values Obtained by Two Different Protocols: National Health and Nutrition Examination Survey, 2017–2018. National Center for Health Statistics, April 2021. http://dx.doi.org/10.15620/cdc:104185.
Full textMcClenaghan, M. B., W A Spirito, A. Plouffe, I. McMartin, J E Campbell, R. C. Paulen, R. G. Garrett, G. E M Hall, P. Pelchat, and M. S. Gauthier. Geological Survey of Canada till-sampling and analytical protocols: from field to archive, 2020 update. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 2020. http://dx.doi.org/10.4095/326162.
Full textCarroll, Herbert B., and William I. Johnson. Field Laboratory in the Osage Reservation -- Determination of the Status of Oil and Gas Operations: Task 1. Development of Survey Procedures and Protocols. Office of Scientific and Technical Information (OSTI), April 1999. http://dx.doi.org/10.2172/6055.
Full textMurphy, Joe J., Michael A. Duprey, Robert F. Chew, Paul P. Biemer, Kathleen Mullan Harris, and Carolyn Tucker Halpern. Interactive Visualization to Facilitate Monitoring Longitudinal Survey Data and Paradata. RTI Press, May 2019. http://dx.doi.org/10.3768/rtipress.2019.op.0061.1905.
Full textMcNeil, R. J. Sampling protocols for soil geochemical surveys. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 2011. http://dx.doi.org/10.4095/287943.
Full textLazdane, Gunta, Dace Rezeberga, Ieva Briedite, Elizabete Pumpure, Ieva Pitkevica, Darja Mihailova, and Marta Laura Gravina. Sexual and reproductive health in the time of COVID-19 in Latvia, qualitative research interviews and focus group discussions, 2020 (in Latvian). Rīga Stradiņš University, February 2021. http://dx.doi.org/10.25143/fk2/lxku5a.
Full textThomas, B., and L. Andersson. The Label Distribution Protocol (LDP) Implementation Survey Results. RFC Editor, October 2007. http://dx.doi.org/10.17487/rfc5038.
Full text