Academic literature on the topic 'Survey protocols'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Survey protocols.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Survey protocols"

1

Singh, Amar, Shakti Kumar, and Sukhbir Singh Walia. "Routing Protocols for WMNs: A Survey." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (September 27, 2017): 1. http://dx.doi.org/10.23956/ijarcsse.v7i7.87.

Full text
Abstract:
Routing is one of the most challenging issues encountered in the Wireless Mesh Networks (WMNs) due to the dynamic nature of WMNs. The survey observes that literature is rich with wide range of routing protocols. Each protocol has its own features which we have briefly discussed. The routing protocols could be divided into three categories i.e. reactive, proactive and hybrid. In this paper we have reviewed wide range of existing routing protocols which are being applied for wireless mesh networks. The literature survey also points to the rising popularity of soft computing based approaches to the optimal cost path evaluation as compared to the classical or hard computing based approaches.
APA, Harvard, Vancouver, ISO, and other styles
2

G. Hamid, Harth, and Zainab T. Alisa. "A survey on IoT application layer protocols." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 3 (March 10, 2021): 1663. http://dx.doi.org/10.11591/ijeecs.v21.i3.pp1663-1672.

Full text
Abstract:
<span>The constant evolution in internet technology has made. The internet of things (IoT) to be the center of research fields in computer engineering. This review paper discusses the choice of an application layer protocol in an IoT system integration so first, the paper briefly defines the potential protocols. After that, it opens up a comparison between these protocols according to how they manage their overhead and messages which affects traffic management and thus starts the discussion. The main contribution of this work is the simplification of comparison between session layer protocols in the benefit of IoT applications exclusively. IoT system Standards and platforms are being improved constantly. IoT enables application devices to connect and coordinate their tacks, such applications like healthcare, smart home, and industrial automation. Several protocols have been discussed to provide effective communication for resource-limited devices. However, their traffic management is still a field for researches, to find the optimal protocol choice for different situations. The review collects the results of other works that experimentally compared application layer protocols in the IoT environment and presents the graphical and tabular compression. Finally, the conclusion summarize the choice in different applications.</span>
APA, Harvard, Vancouver, ISO, and other styles
3

Midha, Surabhi, and Anand Nayyar. "A Survey of Wireless Sensor Network Routing Protocols based on SPIN." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 6 (June 30, 2014): 4583–92. http://dx.doi.org/10.24297/ijct.v13i6.2521.

Full text
Abstract:
SPIN(Sensor Protocols for Information via Negotiation) comprises of a set of adaptive protocols that proficiently disseminate data in wireless sensor network(WSN).SPIN overcomes certain deficiencies associated with some of the data dissemination protocols & brings in more efficiency. WSNs have limited energy and hence efficiency of protocol has a significant impact on network‟s lifetime. Many protocols have been developed that are based on SPIN and are its modifications. This paper presents a survey on SPIN protocol and the various protocols devised which use SPIN as a base in one or another way.
APA, Harvard, Vancouver, ISO, and other styles
4

Rathish S, Ashok, and Dr Paramasivam K. "A Survey on Emulation of Communication Protocols in Microcontrollers." International Journal of Innovative Science and Research Technology 5, no. 7 (July 25, 2020): 395–99. http://dx.doi.org/10.38124/ijisrt20jul480.

Full text
Abstract:
Basic emulation of communication protocols involves the emulation or replicating the frames of the communication protocols using the port pins. This is useful when there is a particular need for a protocol inside a microcontroller where the required communication protocol is not present. The survey on emulation is suitable for the users to have a brief knowledge about the emulation before proceeding. This survey on emulation of communication protocols gives a brief information regarding the parameters, timing, and also the issues and problems faced during the emulation. A brief comparison was made with some different communication protocol emulation using a simple timer module. This will be helpful in concluding the behavior of each communication protocol on a simple timer module using which the protocol will be emulated.
APA, Harvard, Vancouver, ISO, and other styles
5

Alfouzan, Faisal Abdulaziz. "Energy-Efficient Collision Avoidance MAC Protocols for Underwater Sensor Networks: Survey and Challenges." Journal of Marine Science and Engineering 9, no. 7 (July 4, 2021): 741. http://dx.doi.org/10.3390/jmse9070741.

Full text
Abstract:
The Medium Access Control (MAC) layer protocol is the most important part of any network, and is considered to be a fundamental protocol that aids in enhancing the performance of networks and communications. However, the MAC protocol’s design for underwater sensor networks (UWSNs) has introduced various challenges. This is due to long underwater acoustic propagation delay, high mobility, low available bandwidth, and high error probability. These unique acoustic channel characteristics make contention-based MAC protocols significantly more expensive than other protocol contentions. Therefore, re-transmission and collisions should effectively be managed at the MAC layer to decrease the energy cost and to enhance the network’s throughput. Consequently, handshake-based and random access-based MAC protocols do not perform as efficiently as their achieved performance in terrestrial networks. To tackle this complicated problem, this paper surveys the current collision-free MAC protocols proposed in the literature for UWSNs. We first review the unique characteristic of underwater sensor networks and its negative impact on the MAC layer. It is then followed by a discussion about the problem definition, challenges, and features associated with the design of MAC protocols in UWANs. Afterwards, currently available collision-free MAC design strategies in UWSNs are classified and investigated. The advantages and disadvantages of each design strategy along with the recent advances are then presented. Finally, we present a qualitative comparison of these strategies and also discuss some possible future directions.
APA, Harvard, Vancouver, ISO, and other styles
6

Cynthia, Prudhvi Krishna Saguturu, C., Komali Bandi, Srikanth Magulluri, and T. Anusha. "A survey on MANET protocols in wireless sensor networks." International Journal of Engineering & Technology 7, no. 2.31 (May 29, 2018): 1. http://dx.doi.org/10.14419/ijet.v7i2.31.13384.

Full text
Abstract:
In Wireless sensor networks and ad hoc networks nodes have a freedom to move from one place to another, they are self-configuring this type of the structure fulfil the requirements of several application. A survey on the different MANET protocols will be done in this paper. Mainly this paper will focus on the Quality of Service on the different parameters like Throughput and Delay between different protocols like AODV (Ad Hoc on Demand Distance Vector), DSDV (Destination-Sequenced Distance-Vector Routing), DSR (Dynamic Source Routing), and TORA (Temporary Ordered Routing Algorithm). DSDV is called as proactive protocol because they know everything about the nodes in the network before the communication start. DSR, AODV, TORA protocols are called reactive protocol because nodes in this network do not know anything about network. They are also called ON-DEMAND routing protocols. After this analysis you will come to know which MANET protocol is best for different application.
APA, Harvard, Vancouver, ISO, and other styles
7

Desai, Rahul M., B. P. Patil, and Davinder Pal Sharma. "Routing Protocols for Mobile Ad Hoc Network - A Survey and Analysis." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 3 (September 1, 2017): 795. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp795-801.

Full text
Abstract:
<p class="Default">Ad hoc networks are mobile wireless networks where each node is acting as a router. The existing routing protocols such as Destination sequences distance vector, Optimized list state routing protocols, Ad hoc on demand routing protocol, Ad hoc on demand multipath routing protocol, Dynamic source routing are optimized versions of distance vector or link state routing protocols. In this paper, existing protocols such as DSDV, AODV, AOMDV, OLSR and DSR are analyzed on 50 nodes Mobile Ad Hoc network with random mobility. Packet delivery ratio, delay, control overhead and throughput parameters are used for performance analysis.</p>
APA, Harvard, Vancouver, ISO, and other styles
8

Oliveira, Luiz, Joel Rodrigues, Sergei Kozlov, Ricardo Rabêlo, and Victor Albuquerque. "MAC Layer Protocols for Internet of Things: A Survey." Future Internet 11, no. 1 (January 14, 2019): 16. http://dx.doi.org/10.3390/fi11010016.

Full text
Abstract:
Due to the wide variety of uses and the diversity of features required to meet an application, Internet of Things (IoT) technologies are moving forward at a strong pace to meet this demand while at the same time trying to meet the time-to-market of these applications. The characteristics required by applications, such as coverage area, scalability, transmission data rate, and applicability, refer to the Physical and Medium Access Control (MAC) layer designs of protocols. This paper presents a deep study of medium access control (MAC) layer protocols that are used in IoT with a detailed description of such protocols grouped (by short and long distance coverage). For short range coverage protocols, the following are considered: Radio Frequency Identification (RFID), Near Field Communication (NFC), Bluetooth IEEE 802.15.1, Bluetooth Low Energy, IEEE 802.15.4, Wireless Highway Addressable Remote Transducer Protocol (Wireless-HART), Z-Wave, Weightless, and IEEE 802.11 a/b/g/n/ah. For the long range group, Narrow Band IoT (NB-IoT), Long Term Evolution (LTE) CAT-0, LTE CAT-M, LTE CAT-N, Long Range Protocol (LoRa), and SigFox protocols are studied. A comparative study is performed for each group of protocols in order to provide insights and a reference study for IoT applications, considering their characteristics, limitations, and behavior. Open research issues on the topic are also identified.
APA, Harvard, Vancouver, ISO, and other styles
9

Baashirah, Rania, and Abdelshakour Abuzneid. "Survey on Prominent RFID Authentication Protocols for Passive Tags." Sensors 18, no. 10 (October 22, 2018): 3584. http://dx.doi.org/10.3390/s18103584.

Full text
Abstract:
Radio Frequency Identification (RFID) is one of the leading technologies in the Internet of Things (IoT) to create an efficient and reliable system to securely identify objects in many environments such as business, health, and manufacturing areas. Recent RFID authentication protocols have been proposed to satisfy the security features of RFID communication. In this article, we identify and review some of the most recent and enhanced authentication protocols that mainly focus on the authentication between a reader and a tag. However, the scope of this survey includes only passive tags protocols, due to the large scale of the RFID framework. We examined some of the recent RFID protocols in term of security requirements, computation, and attack resistance. We conclude that only five protocols resist all of the major attacks, while only one protocol satisfies all of the security requirements of the RFID system.
APA, Harvard, Vancouver, ISO, and other styles
10

Kaur, Jaspinder, Taranvir Kaur, and Kanchan Kaushal. "Survey on WSN Routing Protocols." International Journal of Computer Applications 109, no. 10 (January 16, 2015): 24–28. http://dx.doi.org/10.5120/19226-0924.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Survey protocols"

1

Yang, Ying. "Routing protocols for wireless sensor networks: A survey." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-19700.

Full text
Abstract:
Wireless sensor networks(WSNs) are different to traditional networks and are highly dependent on applications, thus traditional routing protocols cannot be applied efficiently to the networks. As the variability of both the application and the network architecture, the majority of the attention, therefore, has been given to the routing protocols. This work surveys and evaluates state-of-the-art routing protocols based on many factors including energy efficiency, delay andcomplexity, and presents several classifications for the various approaches pursued. Additionally, more attention is paid to several routing protocols and their advantages and disadvantages and, indeed, this work implements two of selected protocols, LEACH and THVRG, on the OPNET, and compares them in many aspects based on a large amount of experimental data. The survey also provides a valuable framework for comparing new and existing routing protocols. According to the evaluation for the performance of the routing protocols, this thesis provides assistance in relation to further improving the performance in relation to routing protocols. Finally, future research strategies and trends in relation to routing technology in wireless sensor networks are also provided.
APA, Harvard, Vancouver, ISO, and other styles
2

Tse, Kent. "Survey of Internet security protocols." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape16/PQDD_0002/MQ37174.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zubimendi, Leire. "Survey on video-on-demand broadcasting protocols." Zürich : ETH, Swiss Federal Institute of Technology Zurich, Department of Computer Science, Institute for Pervasive Computing, Information and Communication Systems Research Group, 2008. http://e-collection.ethbib.ethz.ch/show?type=dipl&nr=361.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Abtin, Houman. "A survey of the irrigation protocols used by dentists in British Columbia, Canada." Thesis, University of British Columbia, 2011. http://hdl.handle.net/2429/37003.

Full text
Abstract:
The goal of endodontic treatment is to prevent and eliminate infection. This is achieved by mechanical and chemical cleaning of the root canal. Chemical cleaning is a process in which irrigants are introduced in the root canal to eradicate bacteria and flush out debris. A study was conducted to assess the type, concentration of sodium hypochlorite (NaOCl), volume, sequence and method of delivery system of different irrigants used by general practitioners (GP) and endodontists (ENDO) in treating teeth with vital (VP) or non-vital pulp (NVP). We hypothesized that there are no significant differences between the groups regarding the method of irrigation in root canal treatment. Methods: 1) A total of 68 samples of bleach were collected from GP offices in Vancouver. Using titration, the concentration of hypochlorite in these bleach samples was calculated. 2) A questionnaire was sent to 150 GP and 42 ENDO registered with the College of Dental Surgeons of British Columbia. Results: The overall response rate to our questionnaire was 70.3%. Irrigants used in treating teeth with VP were NaOCl: ENDO 93.4%, GP 89.9% (p=0.445), EDTA: ENDO 72.9%, GP 35.1% (p<0.001), and RC-Prep™: ENDO 29.7%, GP 67.2% (p< 0.001). Irrigants used in treating teeth with NVP were NaOCl: ENDO 95.7%, GP 94.2% (p= 0.657), EDTA: ENDO 76.2%, GP 36.2% (p< 0.001), and RC-Prep™: ENDO 31.9%, GP 71.9% (p< 0.001). Majority of the ENDO (82.3%) used 5-6% NaOCl whereas 55% of the GP used 3-5% NaOCl. Commonly used irrigation needle by both groups was stainless steel with a tip size of 27G (ENDO 28.0%, GP 36.0%). The irrigation needle was inserted in the pulp chamber ENDO 79.8%, GP 75.2%, the coronal/mid canal: ENDO 79.8%, GP 85.3%, and the apical area ENDO 50.3%, GP 25.2%. Except for EDTA and saline, there were no statistically significant difference between both groups in their choice of the initial, in-between or final irrigant used. Conclusion: The ENDO and GP followed the recommended “best practice” for irrigation regarding the use of antimicrobial agents, such as NaOCl. However, the use of demineralizing agents for removing the smear layer was less frequent, particularly among the GP.
APA, Harvard, Vancouver, ISO, and other styles
5

Yousef, Paul. "GSM-Security: A Survey and Evaluation of the Current Situation." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2273.

Full text
Abstract:

The Global System for Mobile Communications (GSM) is the most widely used cellular technology in the world. Approximately 800 million people around the world are using GSM for different purposes, but mostly for voice communication and SMS. For GSM, like many other widely used systems, security is crucial. The security involves mechanisms used to protect the different shareholders, like subscribers and service providers. The aspects of security that this report covers are mainly anonymity, authentication and confidentiality.

The important aspects of the system that need protection are described, along with the implementation of mechanisms used for the protection. It appears that many of the very valuable aspects of GSM can be attacked.

The anonymity of a GSM user is compromised resulting in the attacker being able to observe the time, rate, length, sources or destinations of e g calls. Even tracking a subscriber’s movements becomes possible. However, a passive attack is not sufficient to perform these attacks. The attacker needs to mount an active attack using equipment offering base station functionality.

Authentication is a crucial aspect of a wireless communication system due to the nature of the medium used, i e the radio link that is available to every one and not only the legitimate entities. Even the authentication mechanisms are attacked. It is possible to clone a subscription either by having physical access to the smart card or over the air interface. Cloning a subscription over the air requires base station functionality.

The most obvious threat against communication systems is eavesdropping on conversations. The privacy of GSM conversations is protected using some version of the A5 algorithm. There are several impressive cryptanalytical attacks against these algorithms, that break the encryption and make it possible to eavesdrop in real-time. Most of these algorithms require, however, extensive computation power and unrealistic quantities of known plaintext, which make it difficult to use them in practice. Difficulties using cryptanalytical attacks to break the confidentiality of GSM calls does not mean that conversations are well protected. Loopholes in the protocols used in GSM make it possible for an outsider, with access to sufficient equipment, to eavesdrop on conversations in real-time.

In the presence of these threats and vulnerabilities it is justified to wonder whether GSM provides sufficient security for users with very valuable information to communicate. These users may be military organisations, senior management personnel in large companies etc. GSM’s current security model does note provide sufficient protection for these entities. An additional layer of security should be added to the current security model.

APA, Harvard, Vancouver, ISO, and other styles
6

Pumper, Candace. "PROTOCOLS FOR PERIOPERATIVE NUTRITIONAL CARE PRACTICE IN ACCREDITED BARIATRIC SURGICAL CENTERS: A SURVEY OF CURRENT PRACTICE." Kent State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=kent1500560856156472.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Grinnemo, Karl-Johan. "A Study of Partially Reliable Transport Protocols for Soft Real-Time Applications." Licentiate thesis, Karlstads universitet, Avdelningen för datavetenskap, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-33933.

Full text
Abstract:
The profileration of multimedia applications, such as streaming video, teleconferencing, and interactive gaming has created a tremendous challenge for the traditional transport protocols of the Internet – UDP and TCP. Specifically, many multimedia applications are examples of soft real-time applications. They have often relatively stringent require- ments in terms of delay and delay jitter, but typically tolerate a limited packet loss rate. In recognition of the transport service requirements of soft real-time applications, this thesis studies the feasibility of using retransmission based, partially reliable trans- port protocols for these applications. The thesis studies ways of designing retransmis- sion based, partially reliable transport protocols that are congestion aware and TCP com- patible. Furthermore, the transport protocols should provide a service that, in terms of performance metrics such as throughput, delay, and delay jitter, are suitable for soft real- time applications. The thesis work comprises the design, analysis, and evaluation of two retransmission based, partially reliable transport protocols: PRTP and PRTP-ECN. Extensive simulations have been carried out on PRTP as well as PRTP-ECN. These sim- ulations have in part been complemented by some theoretical analysis. The results of the simulations and the analysis suggest that substantial reductions in delay jitter and improvements in throughput can indeed be obtained with both PRTP and PRTP-ECN as compared to TCP. While PRTP reacted too slowly to congestion to be TCP-friendly and altogether fair, PRTP-ECN was found to be both TCP-friendly and reasonably fair. The thesis work also comprises an extensive survey on retransmission based, par- tially reliable transport protocols. Based on this survey, we have proposed a taxonomy for these protocols. The taxonomy considers two dimensions of retransmission based, partially reliable transport protocols: the transport service, and the error control scheme.
APA, Harvard, Vancouver, ISO, and other styles
8

Holloway, Simon, and n/a. "Survey protocols for the stream-breeding frogs of Far East Gippsland : the application of habitat modelling and an assessment of techniques." University of Canberra. Resource, Environmental & Heritage Sciences, 1997. http://erl.canberra.edu.au./public/adt-AUC20060725.150009.

Full text
Abstract:
This study developed a heirarchical approach to improve the efficiency and reliability of surveys for stream-breeding frogs in the montane forests of south-eastern Australia. Areas with suitable climate for some of these species were first determined by bioclimatic modelling. Landscape and habitat preferences were then determined for the four species commonly found in far East Gippsland, along with an assessment of survey techniques from which effective survey protocols were developed. The climate of localities at which five stream-breeding species had been previously found was modelled using BIOCLIM, and maps of the predicted potential distributions having similar climate were developed. Litoria phyllochroa was found to occur in coastal to alpine areas from Melbourne to Nowra, and potentially further inland, in areas with relatively low temperatures and low summer rainfall. Litoria lesueuri had a slightly larger known and predicted distribution, covering a wide range of values for the temperature and precipitation parameters. Both species had predicted areas inland from Melbourne and the Blue Mountains where they had never been recorded, probably largely due to land clearing. The rare Heleioporus australiacus had a slightly more northerly distribution, closer to the coast and adjacent ranges from Central Gippsland to just north of Sydney, with a generally warmer climate and large range of average annual precipitation values. Litoria citropa occupies an even narrower area along the coast, extending slightly further north again, with a climatic profile of few extremes but with relatively high rainfall particularly in summer. The rare Mixophyes balbus had a more northerly known and predicted narrow range along the NSW coast, just extending into Victoria and Queensland, characterised by the subtropical influence of higher summer rainfall. The southern extension into far East Gippsland appears to have an extreme sub-climate, and is hence considered highly susceptible to climate change. Future monitoring sites for these species can now be systematically chosen to include their full climatic range, so that any negative effects of climate change on amphibian populations may have a greater chance of detection. Four species were found commonly enough in the far East Gippsland study area for more detailed study - the three stream-breeding specialist species, L. phyllochroa, L citropa, and L. lesueuri, along with Crinia signifera which was not restricted to streams but commonly found along them. Three species, L. phyllochroa, L citropa and L. lesueuri, were not found at the few higher altitudes sites on the Errinundra Plateau, however they may have been restricted by habitat requirements other than altitude. Litoria phyllochroa was otherwise widespread, but preferred larger in-stream pools and backwaters for breeding with overhanging vegetation for perch and call sites. The other three species preferred stream reaches characterised by wide bedrock outcrops and associated wide break in the tree canopy, which may allow their preferred perch sites on rocky substrates to retain heat after sunset. Litoria lesueuri tadpoles were found in both unconnected and connected pools, and the common association of this species with bedrock outcrops may explain its range being largely restricted to granitic substratum where these outcrops mostly occurred. Litoria citropa preferred reaches with bedrock and boulder outcrops, although frogs used both rocky and vegetative substrates as perch sites, with tadpoles caught in both unconnected pools and backwaters. Crinia signifera tadpoles were mostly restricted to unconnected pools, with frogs generally only detected within or very close beside these. Habitat models varied in their predictive ability, from 67.5% for L. phyllochroa frogs to 92.7% for L. lesueuri tadpoles. Models developed from normally-distributed habitat variables by discriminant function analysis were generally more predictive than those from logistic regression analysis. The occurrence of frogs and tadpoles of L. phyllochroa, L. citropa and L. lesueuri can be predicted by the measurement of five habitat variables along a 50m reach: average width between the banks, average channel width, an average of the maximum depth of channel cross-sections along the reach, channel slope, and proportion of the stream length as pools. The occurrence of C. signifera along reaches can be predicted with the additional measurement of the proportion of the banks covered in ferns, the maximum cross-sectional channel depth along the reach, and the number of unconnected pools. Several different techniques for surveying frogs were compared for the four species commonly found along the streams. Probability of detection models were derived for each species for each technique, which allowed calculation of the statistical confidence of detecting a species that actually occurred at a site for any given number of surveys. For transect-based techniques, models were also developed which allowed determination of the minimum number of surveys required without detecting a species to be 95 percent statistically confident that the species did not occur there, for various transect lengths. This level of confidence can be obtained for the four common species by four surveys using the reliable night encounter technique along 500m stream transects, during the period from Ocotber to March, with air temperatures above 10°C. The application of habitat models to select favourable 50m reaches for survey also generally improved the detectability of each species. Timer-activated tape recorders, which automatically recorded the calls of frogs for many consecutive nights at a site, were very efficient at detecting all species except the quietcalling L. lesueuri. Night encounter surveys along stream transects detected all species from a reasonable effort, and dip-netting for tadpoles was also effective for most species. Active visual encounter surveys were less reliable, and day encounter surveys detected few frogs but provided some additional data when other activities were being performed along the streams. The findings of this study have important implications for future amphibian surveys and monitoring undertaken in East Gippsland and the south coast of New South Wales. If the standardised survey techniques recommended by this study are used in Environmental Impact Assessments, their results can be objectively assessed and defended. The use of habitat modelling and improvement in survey reliability can also be used more efficiently to find sites with populations suitable for monitoring. The likely amount of effort required by a long-term monitoring program can also be determined so as to largely overcome daily variations in the detection of each species.
APA, Harvard, Vancouver, ISO, and other styles
9

Cunha, Fábio Jorge Costa. "Dirofilariose cardiopulmonar em canídeos domésticos : estudo clínico e retrospectivo, situação em Portugal." Master's thesis, Universidade de Lisboa, Faculdade de Medicina Veterinária, 2019. http://hdl.handle.net/10400.5/18073.

Full text
Abstract:
Dissertação de Mestrado Integrado em Medicina Veterinária
A dirofilariose cardiopulmonar (DCP) é causada pelo nemátode Dirofilaria immitis, transmitido por vetores (mosquitos culicídeos) e é capaz de infetar uma grande variedade de hospedeiros, sendo os seus alvos preferenciais, canídeos domésticos e selvagens. Em Portugal, a espécie D. immitis é endémica e tem grande relevância no panorama nacional, especialmente nas bacias fluviais do Tejo, Douro, Sado, Mondego e na região autónoma da Madeira. Os objetivos deste estudo foram a determinação da prevalência de D. immitis em cães com proprietário no concelho de Sintra, avaliar os fatores de risco que possam estar associados à sua transmissão e os protocolos de prevenção que eram praticados nos cães submetidos a este estudo. O estudo consistiu na recolha de amostras sanguíneas de 50 cães, que foram analisadas com recurso a testes rápidos Uranoteste® Dirofilaria e ao teste de Knott modificado, para pesquisa da presença de dirofilárias adultas e microfilárias, respetivamente. Foram também preenchidos presencialmente 50 inquéritos pelos proprietários dos animais que participaram no presente estudo. Neste estudo não foram detetados animais positivos à DCP pelos dois métodos de deteção utilizados. Em relação a comportamentos de risco, 12%(6/50) dos animais vivia permanentemente em quintal, 16%(7/44) dos inquiridos passeava o seu animal em zonas com cursos de água, 93,2%(41/44) fazia-o em período noturno e 81,8%(35/44) dos animais contactava com animais fora do ambiente familiar e de estatuto sanitário desconhecido. Dos animais que entraram no estudo, apenas 28%(14/50) não fazia prevenção contra a DCP. No entanto, os proprietários que a faziam, utilizavam um protocolo que se encontra no limiar do aconselhado pela maioria dos autores para a desparasitação interna (4 vezes ao ano). No entanto, o recomendado pelo European Scientific Counsel Companion Animal Parasites (ESCCAP) para prevenção de D. immitis é um tratamento mensal. Tendo em conta que existe ainda hoje uma grande proporção de tutores que não tem informação, nem conhecimento, sobre protocolos eficazes contra doenças parasitárias, é de extrema importância, especialmente se estivermos a falar de doenças de carácter zoonótico, que sejam criadas medidas para que as pessoas tenham melhor e mais fácil acesso à informação. Com este objetivo em mente, é necessário contar com a colaboração do médico veterinário, presencialmente, para que este tenha um papel ativo durante a consulta em matérias de desparasitação, mas também ao referenciar plataformas digitais que contenham essa informação para consulta gratuita, como é o caso do site da ESCCAP a nível europeu.
ABSTRACT - Cardiopulmonary Dirofilariosis in domestic dogs- a clinical and retrospective study - Heartworm disease (HWD) is caused by a nematode of the species Dirofilaria immitis, which is transmited by vectors (Culicidae mosquitoes) and is capable of infecting a wide varieaty of hosts, with its preferential targets being both domestic and wild dogs. In Portugal, D. immitis is endemic and has a great relevance in the national panorama, especially in the river basins of Tejo, Douro, Sado and Mondego and in the autonomous region of Madeira. The goals of this study were to determine the prevalence of D. immitis in dogs with owner in the county of Sintra, evaluate the risk factors that might be associated with its transmission and the preventive protocols that were practiced in the dogs included in this study. This research consisted in the collection of blood samples from 50 dogs, which were analyzed using Uranoteste® Dirofilaria rapid tests and modified Knott test for assessing the presence of adult heartworms and microfilariae, respectively. The 50 animal owners who participated in this study also answered a face-to-face questionary. There were no heartworm positive animals in this study using both detection methods. In relation to the risk behaviors, 12% (6/50) of the animals lived permanently in the backyard, 16% (7/44) of the owners said that they walked with their animals in areas with water courses, 93.2% (41/44) walked at night, 81.8% (35/44) of the animals were in contact with animals outside family enviroment and of unknown health status. Of all the animals in this study, only 28% (14/50) did not have any prevention against HWD, although those who did, used a protocol at the threshold of the suggested by most authors for internal parasite deworming (4 times a year). However, being European Scientific Counsel Companion Animal Parasites (ESCCAP) recommends a monthly preventive treatment for D. immitis. If we take in consideration that a large number of people who does not have neither the information, nor the knowledge, regarding effective protocols against parasitic deseases, it is of paramount importance, especially if we are talking about zoonotic deseases, that measures are taken, so that the population has better and easier access to information. With this objective in mind, it is necessary to rely on the veterinarian's cooperation, personally, so that he can have an active role during the medical consultation on the deworming subject, but also when referring to digital plataforms containing free, reliable and independent information, for later consultation, like the ESCCAP site at the European level.
N/A
APA, Harvard, Vancouver, ISO, and other styles
10

Tuyisenge, Livinus. "CoVEceVé - Collecte des données Véhicule/Environnement et remontée avec réseau Cellulaire et réseau Véhiculaire. Network Architectures in Internet of Vehicles (IoV): Review, Protocols Analysis, Challenges and Issues Handover Mechanisms in Internet of vehicles (IoV): survey, Trends, Challenges, and Issues." Thesis, Reims, 2019. http://www.theses.fr/2019REIMS023.

Full text
Abstract:
Le transfert vertical intercellulaire est l’une des technologies clés qui facilitera le déploiement de véhicules connectés et autonomes. Aujourd’hui, l’émergence des réseaux véhiculaires : les communications de véhicule à véhicule (V2V), véhicule à infrastructure (V2I) et de véhicule à tout (V2X) a permis de nouvelles applications telles que les Systèmes de Transport Intelligents Coopératifs (C-ITS), les applications temps réel (par exemple, la conduite autonome), applications de gestion du trafic routier et applications de confort. Cependant, ces réseaux se caractérisent par une grande mobilité et de fréquents changements de la topologie, ce qui génère des réseaux épars et nécessitant des mécanismes de transfert pour le maintien de la continuité de session.Pour résoudre ce problème, nous avons proposé le PMIP-MIVH, une approche basée sur le PMIP et qui profite des avantages de l’utilisation d’une interface logique dans le traitement du transfert vertical intercellulaire. Pour améliorer et étendre notre approche, une méthode multicouche de sélection du meilleur réseau disponible, basée sur la logique floue a également été proposée. Les résultats analytiques et les résultats des simulations montrent tous que les solutions proposées sont performantes comparées aux autres méthodes de transfert existantes et améliorent efficacement la gestion de la mobilité dans les réseaux véhiculaires
Vertical handover is one of the key technologies that will facilitate the connected and autonomous vehicles deployment. Today, the emergence of Vehicular Ad hoc NETworks (VANETs): Vehicle to Vehicle (V2V) communications, Vehicle to Infrastructure (V2I) and Vehicle-to-Everything (V2X) has enabled new applications such as Cooperative Intelligent Transport Systems (C-ITS), real-time applications (for example, autonomous driving), road traffic management applications and comfort applications. However, these networks are characterized by a high level of mobility and dynamic change in the topology, which generates scattered networks and requires handover mechanisms for maintaining ongoing session continuity. To address this problem, we have proposed a PMIP-based Mobile Internal Vertical Handover (PMIP-MIVH) approach which takes advantage of the use of a logical interface in handling handover. To improve and extend our approach, a cross-layer and fuzzy logic-based selection method of the best available network has been also proposed. Analytical results and conducted simulation results all show that the proposed solutions overperform the existing handovers and enhance efficiently the handover management in the VANETs field
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Survey protocols"

1

Morgan, John D. Death education in Canada: Survey, curricula, protocols, bibliography. London, Ont: King's College, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

K, Kokula Krishna Hari, ed. A Survey on Routing Protocols in Wireless Sensor Networks. Chennai, India: Association of Scientists, Developers and Faculties, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

E, Allen James. Nursing home federal requirements, guidelines to surveyors, and survey protocols. 5th ed. New York: Springer Pub. Co., 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

1935-, Allen James E., ed. Nursing home federal requirements, guidelines to surveyors, and survey protocols. 4th ed. New York: Springer Pub. Co., 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hale, Sandra Beatriz. Interpreter policies, practices and protocols in Australian courts and tribunals: A national survey. Melbourne: Australasian Institute of Judicial Administration Incorporated, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Joint Commission on Accreditation of Healthcare Organizations. 1995 survey protocol for subacute programs. Oakbrook Terrace, IL: Joint Commission, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

E, Allen James. Nursing home federal requirements: Guidelines to surveyors and survey protocols, 2006 : a user-friendly rendering of the Centers for Medicare and Medicaid's (CMS) nursing home inspection and requirement forms. 6th ed. New York: Springer Pub. Co., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

S, Horbach Nicolette, and Korn Abner Paul, eds. Protocols for office gynecologic surgery. Cambridge, Mass., USA: Blackwell Science, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kendell, Kris. Survey protocol for the northern leopard frog. Edmonton, Alta: Alberta Sustainable Resource Development, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Downey, Brad A. Survey protocol for the Richardson's ground squirrel. Edmonton: Alberta Sustainable Resource Development, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Survey protocols"

1

Soumya, Sripada, and V. A. Sankar Ponnapalli. "A Survey—Vanets and Protocols." In Lecture Notes in Electrical Engineering, 413–19. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1420-3_42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shan, Weifeng, Husheng Liao, and Xueyuan Jin. "XML Concurrency Control Protocols: A Survey." In Web-Age Information Management, 299–308. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33050-6_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Brelurut, Agnès, David Gerault, and Pascal Lafourcade. "Survey of Distance Bounding Protocols and Threats." In Foundations and Practice of Security, 29–49. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30303-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mohamed Zain, Ifa Fatihah, Azlan Awang, and Anis Laouiti. "Hybrid MAC Protocols in VANET: A Survey." In Advances in Intelligent Systems and Computing, 3–14. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3503-6_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Meadows, Catherine A., and Catherine A. Meadows. "Formal verification of cryptographic protocols: A survey." In Advances in Cryptology — ASIACRYPT'94, 133–50. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/bfb0000430.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yang, Ruidi. "Survey on Privacy-Preserving Machine Learning Protocols." In Machine Learning for Cyber Security, 417–25. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62223-7_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gao, Zhenguo, Yongtian Yang, Jing Zhao, Jianwen Cui, and Xiang Li. "Service Discovery Protocols for MANETs: A Survey." In Lecture Notes in Computer Science, 232–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11943952_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Chin-Ling, Yue-Xun Chen, Chin-Feng Lee, and Yong-Yuan Deng. "A Survey of Authentication Protocols in VANET." In Lecture Notes on Data Engineering and Communications Technologies, 572–77. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02613-4_51.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Søbirk, Daniel, and Johan M. Karlsson. "A survey of wireless ATM MAC protocols." In Performance and Management of Complex Communication Networks, 191–210. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-0-387-35360-9_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Srinivasan, V., and G. Varghese. "A Survey of Recent IP Lookup Schemes." In Protocols for High-Speed Networks VI, 9–23. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-0-387-35580-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Survey protocols"

1

Ayyappan, B., and P. Mohan Kumar. "Security protocols in WSN: A survey." In 2017 Third International Conference on Science Technology Engineering & Management (ICONSTEM). IEEE, 2017. http://dx.doi.org/10.1109/iconstem.2017.8261297.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mishra, Priya, Charu, and Buddha Singh. "Position based routing protocols: A survey." In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). IEEE, 2017. http://dx.doi.org/10.1109/i-smac.2017.8058391.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lijun Gao and Zhang Lu. "Low-cost RFID security protocols survey." In 2011 Cross Strait Quad-Regional Radio Science and Wireless Technology Conference (CSQRWC). IEEE, 2011. http://dx.doi.org/10.1109/csqrwc.2011.6037142.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yousuf, Yawer, and Vidyasagar Potdar. "A Survey of RFID Authentication Protocols." In 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008). IEEE, 2008. http://dx.doi.org/10.1109/waina.2008.214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Devangavi, Anil D., and Rajendra Gupta. "Routing protocols in VANET — A survey." In 2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon). IEEE, 2017. http://dx.doi.org/10.1109/smarttechcon.2017.8358362.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rahayu, Triana Mugia, Sang-Gon Lee, and Hoon-Jae Lee. "Survey on LEACH-based security protocols." In 2014 16th International Conference on Advanced Communication Technology (ICACT). Global IT Research Institute (GIRI), 2014. http://dx.doi.org/10.1109/icact.2014.6778970.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Vasu, K. "MIPV6 Protocols: A Survey and Comparative Analysis." In The Fourth International Workshop on Computer Networks & Communications. Academy & Industry Research Collaboration Center (AIRCC), 2012. http://dx.doi.org/10.5121/csit.2012.2408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Elrhareg, Houda, Mohammed Ridouani, and Aawatif Hayar. "Routing Protocols on Cognitive Radio Networks: Survey." In 2019 IEEE International Smart Cities Conference (ISC2). IEEE, 2019. http://dx.doi.org/10.1109/isc246665.2019.9071779.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Garcia-Munoz, Luis H., J. Enrique Armendariz-Inigo, Hendrik Decker, and Francesc D. Munoz-Escoi. "Recovery Protocols for Replicated Databases--A Survey." In 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07). IEEE, 2007. http://dx.doi.org/10.1109/ainaw.2007.306.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ahmed, Salman, and Aamer Nadeem. "A survey on mobile agent communication protocols." In 2012 International Conference on Emerging Technologies (ICET). IEEE, 2012. http://dx.doi.org/10.1109/icet.2012.6375488.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Survey protocols"

1

Meadows, Catherine A. Formal Verification of Cryptographic Protocols: A Survey. Fort Belvoir, VA: Defense Technical Information Center, January 1995. http://dx.doi.org/10.21236/ada464292.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Welzl, M., and D. Ros. A Survey of Lower-than-Best-Effort Transport Protocols. RFC Editor, June 2011. http://dx.doi.org/10.17487/rfc6297.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Enghardt, T., T. Pauly, C. Perkins, K. Rose, and C. Wood. A Survey of the Interaction between Security Protocols and Transport Services. RFC Editor, October 2020. http://dx.doi.org/10.17487/rfc8922.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

echiam, Ostchega, Tatiana Nwankwo, Michele Chiappa, Jessica Graber, and Nguyen Duong T. Series 2–187: Comparing Blood Pressure Values Obtained by Two Different Protocols: National Health and Nutrition Examination Survey, 2017–2018. National Center for Health Statistics, April 2021. http://dx.doi.org/10.15620/cdc:104185.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

McClenaghan, M. B., W A Spirito, A. Plouffe, I. McMartin, J E Campbell, R. C. Paulen, R. G. Garrett, G. E M Hall, P. Pelchat, and M. S. Gauthier. Geological Survey of Canada till-sampling and analytical protocols: from field to archive, 2020 update. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 2020. http://dx.doi.org/10.4095/326162.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Carroll, Herbert B., and William I. Johnson. Field Laboratory in the Osage Reservation -- Determination of the Status of Oil and Gas Operations: Task 1. Development of Survey Procedures and Protocols. Office of Scientific and Technical Information (OSTI), April 1999. http://dx.doi.org/10.2172/6055.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Murphy, Joe J., Michael A. Duprey, Robert F. Chew, Paul P. Biemer, Kathleen Mullan Harris, and Carolyn Tucker Halpern. Interactive Visualization to Facilitate Monitoring Longitudinal Survey Data and Paradata. RTI Press, May 2019. http://dx.doi.org/10.3768/rtipress.2019.op.0061.1905.

Full text
Abstract:
Surveys often require monitoring during data collection to ensure progress in meeting goals or to evaluate the interim results of an embedded experiment. Under complex designs, the amount of data available to monitor may be overwhelming and the production of reports and charts can be costly and time consuming. This is especially true in the case of longitudinal surveys, where data may originate from multiple waves. Other such complex scenarios include adaptive and responsive designs, which were developed to act on the results of such monitoring to implement prespecified options or alternatives in protocols. This paper discusses the development of an interactive web-based data visualization tool, the Adaptive Total Design (ATD) Dashboard, which we designed to provide a wide array of survey staff with the information needed to monitor data collection daily. The dashboard was built using the R programming language and Shiny framework and provides users with a wide range of functionality to quickly assess trends. We present the structure of the data used to populate the dashboard, its design, and the process for hosting it on the web. Furthermore, we provide guidance on graphic design, data taxonomy, and software decisions that can help guide others in the process of developing their own data collection monitoring systems. To illustrate the benefits of the dashboard, we present examples from the National Longitudinal Study of Adolescent to Adult Health (Add Health). We also discuss features of the dashboard to be developed for future waves of Add Health.
APA, Harvard, Vancouver, ISO, and other styles
8

McNeil, R. J. Sampling protocols for soil geochemical surveys. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 2011. http://dx.doi.org/10.4095/287943.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lazdane, Gunta, Dace Rezeberga, Ieva Briedite, Elizabete Pumpure, Ieva Pitkevica, Darja Mihailova, and Marta Laura Gravina. Sexual and reproductive health in the time of COVID-19 in Latvia, qualitative research interviews and focus group discussions, 2020 (in Latvian). Rīga Stradiņš University, February 2021. http://dx.doi.org/10.25143/fk2/lxku5a.

Full text
Abstract:
Qualitative research is focused on the influence of COVID-19 pandemic and restriction measures on sexual and reproductive health in Latvia. Results of the anonymous online survey (I-SHARE) of 1173 people living in Latvia age 18 and over were used as a background in finalization the interview and the focus group discussion protocols ensuring better understanding of the influencing factors. Protocols included 9 parts (0.Introduction. 1. COVID-19 general influence, 2. SRH, 3. Communication with health professionals, 4.Access to SRH services, 5.Communication with population incl. three target groups 5.1. Pregnant women, 5.2. People with suspected STIs, 5.3.Women, who require abortion, 6. HIV/COVID-19, 7. External support, 8. Conclusions and recommendations. Data include audiorecords in Latvian of: 1) 11 semi-structures interviews with policy makers including representatives from governmental and non-governmental organizations involved in sexual and reproductive health, information and health service provision. 2) 12 focus group discussions with pregnant women (1), women in postpartum period (3) and their partners (3), people living with HIV (1), health care providers involved in maternal health care and emergency health care for women (4) (2021-02-18) Subject: Medicine, Health and Life Sciences Keywords: Sexual and reproductive health, COVID-19, access to services, Latvia
APA, Harvard, Vancouver, ISO, and other styles
10

Thomas, B., and L. Andersson. The Label Distribution Protocol (LDP) Implementation Survey Results. RFC Editor, October 2007. http://dx.doi.org/10.17487/rfc5038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography