To see the other types of publications on this topic, follow the link: Survey protocols.

Journal articles on the topic 'Survey protocols'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Survey protocols.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Singh, Amar, Shakti Kumar, and Sukhbir Singh Walia. "Routing Protocols for WMNs: A Survey." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (September 27, 2017): 1. http://dx.doi.org/10.23956/ijarcsse.v7i7.87.

Full text
Abstract:
Routing is one of the most challenging issues encountered in the Wireless Mesh Networks (WMNs) due to the dynamic nature of WMNs. The survey observes that literature is rich with wide range of routing protocols. Each protocol has its own features which we have briefly discussed. The routing protocols could be divided into three categories i.e. reactive, proactive and hybrid. In this paper we have reviewed wide range of existing routing protocols which are being applied for wireless mesh networks. The literature survey also points to the rising popularity of soft computing based approaches to the optimal cost path evaluation as compared to the classical or hard computing based approaches.
APA, Harvard, Vancouver, ISO, and other styles
2

G. Hamid, Harth, and Zainab T. Alisa. "A survey on IoT application layer protocols." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 3 (March 10, 2021): 1663. http://dx.doi.org/10.11591/ijeecs.v21.i3.pp1663-1672.

Full text
Abstract:
<span>The constant evolution in internet technology has made. The internet of things (IoT) to be the center of research fields in computer engineering. This review paper discusses the choice of an application layer protocol in an IoT system integration so first, the paper briefly defines the potential protocols. After that, it opens up a comparison between these protocols according to how they manage their overhead and messages which affects traffic management and thus starts the discussion. The main contribution of this work is the simplification of comparison between session layer protocols in the benefit of IoT applications exclusively. IoT system Standards and platforms are being improved constantly. IoT enables application devices to connect and coordinate their tacks, such applications like healthcare, smart home, and industrial automation. Several protocols have been discussed to provide effective communication for resource-limited devices. However, their traffic management is still a field for researches, to find the optimal protocol choice for different situations. The review collects the results of other works that experimentally compared application layer protocols in the IoT environment and presents the graphical and tabular compression. Finally, the conclusion summarize the choice in different applications.</span>
APA, Harvard, Vancouver, ISO, and other styles
3

Midha, Surabhi, and Anand Nayyar. "A Survey of Wireless Sensor Network Routing Protocols based on SPIN." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 6 (June 30, 2014): 4583–92. http://dx.doi.org/10.24297/ijct.v13i6.2521.

Full text
Abstract:
SPIN(Sensor Protocols for Information via Negotiation) comprises of a set of adaptive protocols that proficiently disseminate data in wireless sensor network(WSN).SPIN overcomes certain deficiencies associated with some of the data dissemination protocols & brings in more efficiency. WSNs have limited energy and hence efficiency of protocol has a significant impact on network‟s lifetime. Many protocols have been developed that are based on SPIN and are its modifications. This paper presents a survey on SPIN protocol and the various protocols devised which use SPIN as a base in one or another way.
APA, Harvard, Vancouver, ISO, and other styles
4

Rathish S, Ashok, and Dr Paramasivam K. "A Survey on Emulation of Communication Protocols in Microcontrollers." International Journal of Innovative Science and Research Technology 5, no. 7 (July 25, 2020): 395–99. http://dx.doi.org/10.38124/ijisrt20jul480.

Full text
Abstract:
Basic emulation of communication protocols involves the emulation or replicating the frames of the communication protocols using the port pins. This is useful when there is a particular need for a protocol inside a microcontroller where the required communication protocol is not present. The survey on emulation is suitable for the users to have a brief knowledge about the emulation before proceeding. This survey on emulation of communication protocols gives a brief information regarding the parameters, timing, and also the issues and problems faced during the emulation. A brief comparison was made with some different communication protocol emulation using a simple timer module. This will be helpful in concluding the behavior of each communication protocol on a simple timer module using which the protocol will be emulated.
APA, Harvard, Vancouver, ISO, and other styles
5

Alfouzan, Faisal Abdulaziz. "Energy-Efficient Collision Avoidance MAC Protocols for Underwater Sensor Networks: Survey and Challenges." Journal of Marine Science and Engineering 9, no. 7 (July 4, 2021): 741. http://dx.doi.org/10.3390/jmse9070741.

Full text
Abstract:
The Medium Access Control (MAC) layer protocol is the most important part of any network, and is considered to be a fundamental protocol that aids in enhancing the performance of networks and communications. However, the MAC protocol’s design for underwater sensor networks (UWSNs) has introduced various challenges. This is due to long underwater acoustic propagation delay, high mobility, low available bandwidth, and high error probability. These unique acoustic channel characteristics make contention-based MAC protocols significantly more expensive than other protocol contentions. Therefore, re-transmission and collisions should effectively be managed at the MAC layer to decrease the energy cost and to enhance the network’s throughput. Consequently, handshake-based and random access-based MAC protocols do not perform as efficiently as their achieved performance in terrestrial networks. To tackle this complicated problem, this paper surveys the current collision-free MAC protocols proposed in the literature for UWSNs. We first review the unique characteristic of underwater sensor networks and its negative impact on the MAC layer. It is then followed by a discussion about the problem definition, challenges, and features associated with the design of MAC protocols in UWANs. Afterwards, currently available collision-free MAC design strategies in UWSNs are classified and investigated. The advantages and disadvantages of each design strategy along with the recent advances are then presented. Finally, we present a qualitative comparison of these strategies and also discuss some possible future directions.
APA, Harvard, Vancouver, ISO, and other styles
6

Cynthia, Prudhvi Krishna Saguturu, C., Komali Bandi, Srikanth Magulluri, and T. Anusha. "A survey on MANET protocols in wireless sensor networks." International Journal of Engineering & Technology 7, no. 2.31 (May 29, 2018): 1. http://dx.doi.org/10.14419/ijet.v7i2.31.13384.

Full text
Abstract:
In Wireless sensor networks and ad hoc networks nodes have a freedom to move from one place to another, they are self-configuring this type of the structure fulfil the requirements of several application. A survey on the different MANET protocols will be done in this paper. Mainly this paper will focus on the Quality of Service on the different parameters like Throughput and Delay between different protocols like AODV (Ad Hoc on Demand Distance Vector), DSDV (Destination-Sequenced Distance-Vector Routing), DSR (Dynamic Source Routing), and TORA (Temporary Ordered Routing Algorithm). DSDV is called as proactive protocol because they know everything about the nodes in the network before the communication start. DSR, AODV, TORA protocols are called reactive protocol because nodes in this network do not know anything about network. They are also called ON-DEMAND routing protocols. After this analysis you will come to know which MANET protocol is best for different application.
APA, Harvard, Vancouver, ISO, and other styles
7

Desai, Rahul M., B. P. Patil, and Davinder Pal Sharma. "Routing Protocols for Mobile Ad Hoc Network - A Survey and Analysis." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 3 (September 1, 2017): 795. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp795-801.

Full text
Abstract:
<p class="Default">Ad hoc networks are mobile wireless networks where each node is acting as a router. The existing routing protocols such as Destination sequences distance vector, Optimized list state routing protocols, Ad hoc on demand routing protocol, Ad hoc on demand multipath routing protocol, Dynamic source routing are optimized versions of distance vector or link state routing protocols. In this paper, existing protocols such as DSDV, AODV, AOMDV, OLSR and DSR are analyzed on 50 nodes Mobile Ad Hoc network with random mobility. Packet delivery ratio, delay, control overhead and throughput parameters are used for performance analysis.</p>
APA, Harvard, Vancouver, ISO, and other styles
8

Oliveira, Luiz, Joel Rodrigues, Sergei Kozlov, Ricardo Rabêlo, and Victor Albuquerque. "MAC Layer Protocols for Internet of Things: A Survey." Future Internet 11, no. 1 (January 14, 2019): 16. http://dx.doi.org/10.3390/fi11010016.

Full text
Abstract:
Due to the wide variety of uses and the diversity of features required to meet an application, Internet of Things (IoT) technologies are moving forward at a strong pace to meet this demand while at the same time trying to meet the time-to-market of these applications. The characteristics required by applications, such as coverage area, scalability, transmission data rate, and applicability, refer to the Physical and Medium Access Control (MAC) layer designs of protocols. This paper presents a deep study of medium access control (MAC) layer protocols that are used in IoT with a detailed description of such protocols grouped (by short and long distance coverage). For short range coverage protocols, the following are considered: Radio Frequency Identification (RFID), Near Field Communication (NFC), Bluetooth IEEE 802.15.1, Bluetooth Low Energy, IEEE 802.15.4, Wireless Highway Addressable Remote Transducer Protocol (Wireless-HART), Z-Wave, Weightless, and IEEE 802.11 a/b/g/n/ah. For the long range group, Narrow Band IoT (NB-IoT), Long Term Evolution (LTE) CAT-0, LTE CAT-M, LTE CAT-N, Long Range Protocol (LoRa), and SigFox protocols are studied. A comparative study is performed for each group of protocols in order to provide insights and a reference study for IoT applications, considering their characteristics, limitations, and behavior. Open research issues on the topic are also identified.
APA, Harvard, Vancouver, ISO, and other styles
9

Baashirah, Rania, and Abdelshakour Abuzneid. "Survey on Prominent RFID Authentication Protocols for Passive Tags." Sensors 18, no. 10 (October 22, 2018): 3584. http://dx.doi.org/10.3390/s18103584.

Full text
Abstract:
Radio Frequency Identification (RFID) is one of the leading technologies in the Internet of Things (IoT) to create an efficient and reliable system to securely identify objects in many environments such as business, health, and manufacturing areas. Recent RFID authentication protocols have been proposed to satisfy the security features of RFID communication. In this article, we identify and review some of the most recent and enhanced authentication protocols that mainly focus on the authentication between a reader and a tag. However, the scope of this survey includes only passive tags protocols, due to the large scale of the RFID framework. We examined some of the recent RFID protocols in term of security requirements, computation, and attack resistance. We conclude that only five protocols resist all of the major attacks, while only one protocol satisfies all of the security requirements of the RFID system.
APA, Harvard, Vancouver, ISO, and other styles
10

Kaur, Jaspinder, Taranvir Kaur, and Kanchan Kaushal. "Survey on WSN Routing Protocols." International Journal of Computer Applications 109, no. 10 (January 16, 2015): 24–28. http://dx.doi.org/10.5120/19226-0924.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Devika G., Asha Gowda Karegowda, and Ramesh D. "Survey of WSN Routing Protocols." International Journal of Applied Evolutionary Computation 11, no. 1 (January 2020): 34–51. http://dx.doi.org/10.4018/ijaec.2020010103.

Full text
Abstract:
Many original ideologies are being applied as a solution to the problem of wireless sensor network with the rigorous experimentation and advancement in technology and research. This article reviews various energy efficient routing algorithms, classifying them based on the methodology applied. The classification is based on the design approach used to solve the basic problem arising in the construction of a transmission path between a source and the base station [BS] with a minimum of energy consumed. The pros and cons of the routing algorithm for WSN in the stated architectures are analyzed. The parameters to be considered in the evaluation of all routing protocols are summarized.
APA, Harvard, Vancouver, ISO, and other styles
12

Qubbaj, Nour Najeeb Abdalkareem, Anas Abu Taleb, and Walid Salameh. "LEACH Based Protocols: A Survey." Advances in Science, Technology and Engineering Systems Journal 5, no. 6 (December 2020): 1258–66. http://dx.doi.org/10.25046/aj0506150.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Knoef, H. A. M., and H. J. Koele. "Survey of tar measurement protocols." Biomass and Bioenergy 18, no. 1 (January 2000): 55–59. http://dx.doi.org/10.1016/s0961-9534(99)00067-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Sheikh, Ashfaq. "Multicast Routing Protocols: A Survey." International Journal of Recent Advancement in Engineering & Research 2, no. 3 (March 8, 2017): 9. http://dx.doi.org/10.24128/ijraer.2017.wx78gh.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Figueroa-Lorenzo, Santiago, Javier Añorga, and Saioa Arrizabalaga. "A Survey of IIoT Protocols." ACM Computing Surveys 53, no. 2 (July 2020): 1–53. http://dx.doi.org/10.1145/3381038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

MAZWA, Khawla. "A Survey on the Smart Home Environment: Architecture and Protocols." Journal of Advanced Research in Dynamical and Control Systems 12, SP4 (March 31, 2020): 1218–23. http://dx.doi.org/10.5373/jardcs/v12sp4/20201596.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Jangra, Dr Banta Singh, and Manish Kumar Naga. "Secure Routing Protocols in Wireless Ad-Hoc Networks – A Survey." Paripex - Indian Journal Of Research 3, no. 6 (January 15, 2012): 32–34. http://dx.doi.org/10.15373/22501991/june2014/11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Kaur, Navneet, Dr Sahil Verma, and Dr Kavita. "A Survey of Routing Protocols in Wireless Sensor Networks." International Journal of Engineering & Technology 7, no. 4.12 (October 4, 2018): 20. http://dx.doi.org/10.14419/ijet.v7i4.12.21094.

Full text
Abstract:
Wireless Sensor Networks(WSNs) comprise sensor nodes which find applications in a wide variety of fields such as medical, wildlife, security, environment, industry. A network communication is initialized and accomplished with the aid of routing protocols. A routing protocol is a set of rules which govern the routing phenomenon. WSNs protocols for the purpose of routing have been the ubiquitous option of the researchers in the recent years due to their exorbitant scope of improvement. The objective of a routing protocol is to inquest for a relevant route amidst sender and receiver to accomplish successful transmission at the destination .Dissipation of energy and lengthening the duration of the network have always been one of the major points of research gaps. As the nodes in WSNs in are battery operated, so they can only use restricted energy to proceed with the communication and transmission operation. To cope up with this, a number of researchers have come up with developments in the field of energy efficacy and optimizations in WSNs routing protocols. A reify summarization of some protocols for routing purposes has been manifested in this paper.
APA, Harvard, Vancouver, ISO, and other styles
19

Sabor, Nabil, Shigenobu Sasaki, Mohammed Abo-Zahhad, and Sabah M. Ahmed. "A Comprehensive Survey on Hierarchical-Based Routing Protocols for Mobile Wireless Sensor Networks: Review, Taxonomy, and Future Directions." Wireless Communications and Mobile Computing 2017 (2017): 1–23. http://dx.doi.org/10.1155/2017/2818542.

Full text
Abstract:
Introducing mobility to Wireless Sensor Networks (WSNs) puts new challenges particularly in designing of routing protocols. Mobility can be applied to the sensor nodes and/or the sink node in the network. Many routing protocols have been developed to support the mobility of WSNs. These protocols are divided depending on the routing structure into hierarchical-based, flat-based, and location-based routing protocols. However, the hierarchical-based routing protocols outperform the other routing types in saving energy, scalability, and extending lifetime of Mobile WSNs (MWSNs). Selecting an appropriate hierarchical routing protocol for specific applications is an important and difficult task. Therefore, this paper focuses on reviewing some of the recently hierarchical-based routing protocols that are developed in the last five years for MWSNs. This survey divides the hierarchical-based routing protocols into two broad groups, namely, classical-based and optimized-based routing protocols. Also, we present a detailed classification of the reviewed protocols according to the routing approach, control manner, mobile element, mobility pattern, network architecture, clustering attributes, protocol operation, path establishment, communication paradigm, energy model, protocol objectives, and applications. Moreover, a comparison between the reviewed protocols is investigated in this survey depending on delay, network size, energy-efficiency, and scalability while mentioning the advantages and drawbacks of each protocol. Finally, we summarize and conclude the paper with future directions.
APA, Harvard, Vancouver, ISO, and other styles
20

Shende, Dipali K., Sonavane S.S, and Yogesh Angal. "A Comprehensive Survey of the Routing Schemes for IoT applications." Scalable Computing: Practice and Experience 21, no. 2 (June 27, 2020): 203–16. http://dx.doi.org/10.12694/scpe.v21i2.1667.

Full text
Abstract:
Internet of Things (IoT) is with a perception of ‘anything’, ‘anywhere’ and provides the interconnection among devices with a remarkable scale and speed. The prevalent intention of IoT is the datatransmission through the internet without the mediation of humans. An efficient routing protocol must be included in the IoT network for the accomplishment of its objectives and securing data transmission. Accordingly, the survey presents various routing protocols for secure data communication in IoT for providing a clear vision as the major issue in the IoT networks is energy consumption. Therefore, there is a need for devising an effective routing scheme to provide superior performance over the other existing schemes in terms of energy consumption. Thus, this review article provides a detailed review of 52 research papers presenting the suggested routing protocols based on the contentbased, clustering-based, fuzzy-based, Routing Protocol for Low power and Lossy Networks, tree-based and so on. Also, a detailed analysis and discussion are made by concerning the parameters, simulation tool, and year of publication, network size, evaluation metrics, and utilized protocols. Finally, the research gaps and issues of various conventional routing protocols are presented for extending the researchers towards a better contribution of routing protocol for the secure IoT routing.
APA, Harvard, Vancouver, ISO, and other styles
21

Badge, Vaishali S., and FM Ashiqe. "Survey of Glycemic Control Protocols in Cardiac Surgery Intensive Care Units." Journal of Research & Innovation in Anesthesia 2, no. 1 (2017): 24–25. http://dx.doi.org/10.5005/jp-journals-10049-0027.

Full text
Abstract:
ABSTRACT Perioperative Hyperglycaemia can lead to sepsis, mediastinitis, prolonged mechanical ventilation, cardiac arrhythmias, increased ICU and hospital stay. The different centres follow different protocols to treat hyperglycaemia and still there is a controversy regarding the tight sugar control protocol. This survey was carried out to find the appropriate protocol regarding glycaemic control in various centres in UK. How to cite this article Badge VS, Ashiqe FM. Survey of Glycemic Control Protocols in Cardiac Surgery Intensive Care Units. Res Inno in Anesth 2017;2(1):24-25.
APA, Harvard, Vancouver, ISO, and other styles
22

Kim, Jung Su, Sang Kyung Lee, Sun-Ki Kim, Seung-Min Yoo, Jung Min Kim, and Sang-Wook Yoon. "NATIONAL DIAGNOSTIC REFERENCE LEVELS AND ACHIEVABLE DOSES FOR 13 ADULT CT PROTOCOLS AND A PAEDIATRIC HEAD CT PROTOCOL: NATIONAL SURVEY OF KOREAN HOSPITALS." Radiation Protection Dosimetry 187, no. 2 (July 19, 2019): 220–29. http://dx.doi.org/10.1093/rpd/ncz156.

Full text
Abstract:
Abstract To develop a second set of diagnostic reference levels (DRLs) and achievable doses (ADs) for 13 adult computed tomography (CT) protocols and a paediatric head CT protocol in Korea. A survey of 13,625 CT examinations was performed based on 13 adult CT protocols and a paediatric non-contrast brain CT protocol using 369 CT systems, with patients grouped according to age. Most CT protocols in this survey had DRLs similar to those reported in other countries. However, chest and abdomen-pelvic CT had lower DRLs than those reported in the first Korean national survey and those from other countries. Paediatric non-contrast brain CT in each age group, with the exception of the 11–15-year age group, had lower DRLs than those reported in other countries. The DRLs presented here are similar to (or lower than for some protocols) those reported in the first Korean national survey and those from other countries.
APA, Harvard, Vancouver, ISO, and other styles
23

Masdari, Mohammad, and Maryam Tanabi. "Multipath Routing protocols in Wireless Sensor Networks: A Survey and Analysis." International Journal of Future Generation Communication and Networking 6, no. 6 (December 31, 2013): 181–92. http://dx.doi.org/10.14257/ijfgcn.2013.6.6.19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Sharma, Nidhi, and Shikha Sharma. "Comprehensive Survey of Routing Techniques in Wireless Sensor Network." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 5, no. 2 (August 15, 2013): 563–75. http://dx.doi.org/10.24297/ijmit.v5i2.4446.

Full text
Abstract:
Wireless Sensor Netw orks ( WSNs) c onsist of small nodes with sensing, computation, and wireless communications capabilities. Many routing, power management, and data dissemination protocols have been specifically designed for WSNs where energy awareness is an essential design issue. The focus , however, has been given to the routing protocols which might differ depending on the application and netw ork architecture. In this paper, we present a survey of the state-of-the-art routing techniques in WSNs. We first outline the designchallenges for routing protocols in WSNs followed by a comprehensive survey of different routing techniques . Overall, the routing techniques are classified into three categories based on the underlying netw ork structure: flat, hierarchical, and location-based routing. Furthermore, these protocols can be classified into multipath-based,query-based, negotiation-based, QoS-based, and coherent-based depending on the protocol operation. We study the design tradeoffs b e twe e n ener gy and communication overhead savings in every routing paradigm. We also highlight the adv antages and performance issues of each routing technique.
APA, Harvard, Vancouver, ISO, and other styles
25

H.Iche, Aditya, and M. R Dhage. "Location based Routing Protocols: A Survey." International Journal of Computer Applications 109, no. 11 (January 16, 2015): 28–31. http://dx.doi.org/10.5120/19235-1005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Puri, Swati, and Vishal Arora. "Routing Protocols in MANET: A Survey." International Journal of Computer Applications 96, no. 13 (June 18, 2014): 7–12. http://dx.doi.org/10.5120/16852-6718.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Umar, Idris Abubakar, and Zurina Mohd Hanapi. "Energy Efficient MAC Protocols: a Survey." International Journal on Communications Antenna and Propagation (IRECAP) 5, no. 2 (April 30, 2015): 106. http://dx.doi.org/10.15866/irecap.v5i2.5606.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Prakash, Ambuj, and Umesh Kumar. "Authentication Protocols and Techniques A Survey." International Journal of Computer Sciences and Engineering 6, no. 6 (June 30, 2018): 1014–20. http://dx.doi.org/10.26438/ijcse/v6i6.10141020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

KumarMathi, Senthil, and M. L. Valarmathi. "Mobile IP Registration Protocols: A Survey." International Journal of Computer Applications 51, no. 17 (August 30, 2012): 24–34. http://dx.doi.org/10.5120/8135-1853.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

WENSTROM, K., W. ANDREWS, and J. MAHER. "Amnioinfusion survey: prevalence, protocols, and complications." Obstetrics & Gynecology 86, no. 4 (October 1995): 572–76. http://dx.doi.org/10.1016/s0029-7844(95)80019-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

He, Lin, Ying Liu, and Gang Ren. "Network-Layer Accountability Protocols: A Survey." IEEE Access 6 (2018): 66886–902. http://dx.doi.org/10.1109/access.2018.2879489.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Papakostas, George A., and Venetis Kanakaris. "Internet of things protocols - a survey." International Journal of Humanitarian Technology 1, no. 2 (2020): 101. http://dx.doi.org/10.1504/ijht.2020.10034628.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Taysi, Z. Cihan, and A. Gokhan Yavuz. "Routing Protocols for GeoNet: A Survey." IEEE Transactions on Intelligent Transportation Systems 13, no. 2 (June 2012): 939–54. http://dx.doi.org/10.1109/tits.2012.2183637.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Mcveigh, Elliot R., R. Mark Henkelman, and Michael J. Bronskill. "Optimization of survey protocols for mri." Magnetic Resonance in Medicine 13, no. 2 (February 1990): 177–91. http://dx.doi.org/10.1002/mrm.1910130202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Maihofer, Christian. "A survey of geocast routing protocols." IEEE Communications Surveys & Tutorials 6, no. 2 (2004): 32–42. http://dx.doi.org/10.1109/comst.2004.5342238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

WENSTROM, K. "Amnioinfusion Survey: Prevalence, Protocols, and Complications." Obstetrics & Gynecology 86, no. 4 (October 1995): 572–74. http://dx.doi.org/10.1016/0029-7844(95)00235-j.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Kanakaris, Venetis, and George A. Papakostas. "Internet of things protocols - a survey." International Journal of Humanitarian Technology 1, no. 2 (2020): 101. http://dx.doi.org/10.1504/ijht.2020.112449.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Azrour, Mourade, Mohammed Ouanan, and Yousef Farhaoui. "Survey of Detection SIP Malformed Messages." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 2 (August 1, 2017): 457. http://dx.doi.org/10.11591/ijeecs.v7.i2.pp457-465.

Full text
Abstract:
Session Initiation Protocol (SIP) is an application layer protocol designed to control and establish multimedia sessions over internet. SIP gaining more and more popularity as it is used by numerous applications such as telephony over IP(ToIP). SIP is a text based protocol built on the base of the HTTP and SMTP protocols. SIP suffers from certain security threats which need to be resolved in order to make it a more efficient signaling protocol. In this work, we review the proposed works aimed to detect SIP malformed messages that can cause security problem. Then, we classify the type of malformed SIP message and compare between the mechanisms used to reinforce the detection of malformed SIP message attack.
APA, Harvard, Vancouver, ISO, and other styles
39

Mathew K., Deepa, and Anita Jones. "Survey: energy efficient protocols using radio scheduling in wireless sensor network." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 2 (April 1, 2020): 1296. http://dx.doi.org/10.11591/ijece.v10i2.pp1296-1307.

Full text
Abstract:
An efficient energy management scheme is crucial factor for design and implementation of any sensor network. Almost all sensor networks are structured with numerous small sized, low cost sensor devices which are scattered over the large area. To improvise the network performance by high throughput with minimum energy consumption, an energy efficient radio scheduling MAC protocol is effective solution, since MAC layer has the capability to collaborate with distributed wireless networks. The present survey study provides relevant research work towards radio scheduling mechanism in the design of energy efficient wireless sensor networks (WSNs). The various radio scheduling protocols are exist in the literature, which has some limitations. Therefore, it is require developing a new energy efficient radio scheduling protocol to perform multi tasks with minimum energy consumption (e.g. data transmission). The most of research studies paying more attention towards to enhance the overall network lifetime with the aim of using energy efficient scheduling protocol. In that context, this survey study overviews the different categories of MAC based radio scheduling protocols and those protocols are measured by evaluating their data transmission capability, energy efficiency, and network performance. With the extensive analysis of existing works, many research challenges are stated. Also provides future directions for new WSN design at the end of this survey.
APA, Harvard, Vancouver, ISO, and other styles
40

Srivastava, Pallavi, Edwin Chung, and Stepan Ozana. "Asynchronous Floating-Point Adders and Communication Protocols: A Survey." Electronics 9, no. 10 (October 15, 2020): 1687. http://dx.doi.org/10.3390/electronics9101687.

Full text
Abstract:
Addition is the key operation in digital systems, and floating-point adder (FPA) is frequently used for real number addition because floating-point representation provides a large dynamic range. Most of the existing FPA designs are synchronous and their activities are coordinated by clock signal(s). However, technology scaling has imposed several challenges like clock skew, clock distribution, etc., on synchronous design due to presence of clock signal(s). Asynchronous design is an alternate approach to eliminate these challenges imposed by the clock, as it replaces the global clock with handshaking signals and utilizes a communication protocol to indicate the completion of activities. Bundled data and dual-rail coding are the most common communication protocols used in asynchronous design. All existing asynchronous floating-point adder (AFPA) designs utilize dual-rail coding for completion detection, as it allows the circuit to acknowledge as soon as the computation is done; while bundled data and synchronous designs utilizing single-rail encoding will have to wait for the worst-case delay irrespective of the actual completion time. This paper reviews all the existing AFPA designs and examines the effects of the selected communication protocol on its performance. It also discusses the probable outcome of AFPA designed using protocols other than dual-rail coding.
APA, Harvard, Vancouver, ISO, and other styles
41

Sija, Baraka D., Young-Hoon Goo, Kyu-Seok Shim, Huru Hasanova, and Myung-Sup Kim. "A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View." Security and Communication Networks 2018 (2018): 1–17. http://dx.doi.org/10.1155/2018/8370341.

Full text
Abstract:
A network protocol defines rules that control communications between two or more machines on the Internet, whereas Automatic Protocol Reverse Engineering (APRE) defines the way of extracting the structure of a network protocol without accessing its specifications. Enough knowledge on undocumented protocols is essential for security purposes, network policy implementation, and management of network resources. This paper reviews and analyzes a total of 39 approaches, methods, and tools towards Protocol Reverse Engineering (PRE) and classifies them into four divisions, approaches that reverse engineer protocol finite state machines, protocol formats, and both protocol finite state machines and protocol formats to approaches that focus directly on neither reverse engineering protocol formats nor protocol finite state machines. The efficiency of all approaches’ outputs based on their selected inputs is analyzed in general along with appropriate reverse engineering inputs format. Additionally, we present discussion and extended classification in terms of automated to manual approaches, known and novel categories of reverse engineered protocols, and a literature of reverse engineered protocols in relation to the seven layers’ OSI (Open Systems Interconnection) model.
APA, Harvard, Vancouver, ISO, and other styles
42

Tripp-Barba, Carolina, Aníbal Zaldívar-Colado, Luis Urquiza-Aguiar, and José Alfonso Aguilar-Calderón. "Survey on Routing Protocols for Vehicular Ad Hoc Networks Based on Multimetrics." Electronics 8, no. 10 (October 17, 2019): 1177. http://dx.doi.org/10.3390/electronics8101177.

Full text
Abstract:
In the last few years, many routing protocols have been proposed for vehicular ad hoc networks (VANETs) because of their specific characteristics. Protocols that use several metrics have been shown to be the most adequate to VANETs due to their effectiveness in dealing with dynamic environment changes due to vehicle mobility. Metrics such as distance, density, link stability, speed, and position were selected by the authors for the best proposal. Several surveys of routing proposals have been generated to categorize contributions and their application scenarios, but none of them focused on multimetric approaches. In this paper, we present a review of the routing protocols based on more than one metric to select the best route in a VANET. The main objective of this research was to present the contemporary most frequently used metrics in the different proposals and their application scenarios. This review helps in the selection protocols or the creation of metrics when a new protocol is designed.This survey of multimetric VANET routing protocols employed systematic literature-review (SLR) methodology in four well-knownown databases that allowed to analyze current state-of-the-art proposals. In addition, this paper provides a description of these multimetric routing protocols. Our findings indicate that distance and speed are the most popular and versatile metrics. Finally, we define some possible directions for future research related to the use of this class of protocols.
APA, Harvard, Vancouver, ISO, and other styles
43

Peytchev, Andy. "Split-Sample Design with Parallel Protocols to Reduce Cost and Nonresponse Bias in Surveys." Journal of Survey Statistics and Methodology 8, no. 4 (October 3, 2019): 748–71. http://dx.doi.org/10.1093/jssam/smz033.

Full text
Abstract:
Abstract Response rates in household surveys are declining, increasing the risk of nonresponse bias in survey estimates. Survey costs are increasing. As a result, design features such as higher monetary incentives are needed but often cannot be afforded. Two or more survey protocols could be implemented in parallel, where some have lower nonresponse while others have lower cost, as long as the data can be combined in a way that reflects the reduced potential for nonresponse bias under the more intensive protocol. We describe the main barrier to the use of such an approach—that traditional methods ignore the expected lower bias in one condition. The proposed approach includes random assignment of sample members to a data collection protocol and adjustment of survey estimates to the superior protocol, based on key survey variables—if differences in estimates are found. This represents a major departure from the current practice in constructing nonresponse adjustments and leverages the use of the same sampling design, survey instrument, and measurement procedures in each condition. An illustrative example is presented using data from a national survey. Methods to address both bias reduction and variance estimation are described. We end with limitations and suggestions for future research.
APA, Harvard, Vancouver, ISO, and other styles
44

Faiza A., Al-Salti, Al-Zeidi Nasser M., Day Khaled, Arafeh Bassel, and Touzene Abderezak. "An Overview Survey of Recent Routing Protocols for Underwater Wireless Sensor Networks." Sultan Qaboos University Journal for Science [SQUJS] 23, no. 2 (December 30, 2018): 95. http://dx.doi.org/10.24200/squjs.vol23iss2pp95-110.

Full text
Abstract:
With the recent advances in underwater sensor devices and technologies, underwater wireless sensor networks (UWSNs) enable a variety of applications such as underwater exploration and monitoring, disaster prevention, and military surveillance and reconnaissance. However, these kinds of networks faces a number of challenges induced by the nature of the underwater environment and its influence on the physical media. Therefore, new routing protocols are proposed specifically for such networks to mitigate these challenges. This paper surveys some of the recent routing protocols for UWSNs. Specifically, the idea of each protocol is presented as well as its advantages and disadvantages. Furthermore, the presented protocols are classified into different categories. The paper is concluded with some open research issues.
APA, Harvard, Vancouver, ISO, and other styles
45

Green, Nancy, Zainab Abedin, Allan Teller, Kawthar Muhammad, Brenda Ruotolo, Deborah F. Stiles, and Rui Ferreira. "3202 Columbia University’s Personalized IRB Liaison Service: Evaluation over its initial 2.5 years." Journal of Clinical and Translational Science 3, s1 (March 2019): 116–17. http://dx.doi.org/10.1017/cts.2019.266.

Full text
Abstract:
OBJECTIVES/SPECIFIC AIMS: National concerns about IRB-related research delays have led to re-assessment of IRB review processes at institutional levels. We sought to address whether a dedicated IRB Liaison Service at the Irving Institute’s central location could provide additional useful staff support to the investigator community for interactions with the IRB at various levels of protocol submission. METHODS/STUDY POPULATION: We evaluated the results of a user satisfaction survey and performed a focused in-depth analysis of Liaison Service impact. An online tracking and satisfaction survey was implemented for researchers to complete following each consultation. The goal was to gauge the uses, user types and usefulness of the Service, and to follow-up with researchers who might have additional questions. Data was gathered about users of the Service and their affiliations, and the topics and questions that were discussed. A terse summary was drafted to categorize each consultation that was conducted during office hour sessions. Additionally, surveys were emailed to researchers to gauge their experience with the Service and their overall satisfaction. Users completed the survey either in person at the end of the consultation, or by email request sent immediately following each in-person consultation. The impact of the IRB Liaison Service on IRB protocol approval times was analyzed for a random sub-sample of protocols for which consultations were provided. Consultations for studies with an associated IRB protocol number (i.e., at least initially submitted) from May 2015-June 2017 had been assigned a number in an Excel file. Using a randomization formula, a subset of 90 protocols was identified for further analysis. Protocols that did not result in an IRB submission and duplicate entries were removed. The final dataset consisted of 67 protocols. Those protocols were assessed by type of review process (expedited versus full board review), by status (new submission, first return, second return, etc.), and by which of the seven IRB committees completed the review. Consultations for each protocol included in this subset were reviewed using the notes about that consultation. IRB records in Columbia’s online research oversight system, Rascal, were also reviewed to assess the timing of and issues raised in subsequent IRB review. Factors examined included whether the protocol was approved at next submission and if not, whether questions raised in subsequent IRB returns were related to the topics discussed in the consultation. RESULTS/ANTICIPATED RESULTS: Since its inception in January 2015 through June 2017 (2.5 years), a total of 501 in-person consultations have been performed, usually 25-30 per month. Users were primarily study coordinators and investigators. Most requests concerned new protocol development, policy questions or assistance in addressing IRB comments from submitted protocols. Survey response rate was 43%. Results of 215 competed satisfaction surveys were 100% positive. Of 67 unique protocols analyzed for outcomes of the consultation, 73% were subsequently approved within 14 days. DISCUSSION/SIGNIFICANCE OF IMPACT: Overall, we have found the Liaison Service to be a popular addition to research support, and plan to continue the service. We will continue to evaluate its user satisfaction and usefulness. Additional focus will be placed on whether the Service can improve approval times for human subjects research for protocols using the Liaison Service.
APA, Harvard, Vancouver, ISO, and other styles
46

Azrour, Mourade, Mohammed Ouanan, and Yousef Farhaoui. "SIP Authentication Protocols Based On Elliptic Curve Cryptography: Survey and comparison." Indonesian Journal of Electrical Engineering and Computer Science 4, no. 1 (October 1, 2016): 231. http://dx.doi.org/10.11591/ijeecs.v4.i1.pp231-239.

Full text
Abstract:
<p>Session Initiation Protocol (SIP) is the most popular signaling protocol using in order to establish, modify and terminate the session multimedia between different participants. It was selected by the Third Generation Project Partnership (3GPP) as a multimedia application protocol in 3G mobile networks. SIP is the protocol currently used for signaling ToIP calls. The security of SIP is becoming more and more important. Authentication is the most important security service required by SIP. To ensure a secured communication, many SIP authentication protocols have been proposed. This work provides an overview of the proposed schemes based on elliptic curve cryptography. Those proposed schemes are analyzed in security consideration and the computational cost.</p>
APA, Harvard, Vancouver, ISO, and other styles
47

Plichard, Laura, Hervé Capra, Raphaël Mons, Hervé Pella, and Nicolas Lamouroux. "Comparing electrofishing and snorkelling for characterizing fish assemblages over time and space." Canadian Journal of Fisheries and Aquatic Sciences 74, no. 1 (January 2017): 75–86. http://dx.doi.org/10.1139/cjfas-2015-0578.

Full text
Abstract:
Environmental processes and dispersal movements occurring over long distances (10 to 100 km) continually influence local stream fish assemblages. However, electrofishing protocols are classically implemented in short reaches (∼1 km) and are not suited for frequent characterization of assemblages over long distances. We developed a new sampling protocol (SPA: snorkelling point abundance) for characterizing fish assemblages over long distances, using series of sampling points, as often applied in electrofishing (PASE: point abundance samples by electrofishing). Nine pairs of PASE and SPA surveys, repeated in a narrow and in a wide stream, were compared. Greater species abundance, occurrence, and richness were found on PASE, but relative species abundance were comparable between protocols. Assemblages were highly variable over time (between-surveys) on both protocols. The spatial structure of point assemblages (within-survey) was consistent between protocols and related to species’ habitat use (depth, current velocity). For several species, the longitudinal distribution of abundance along reaches was comparable between protocols when surveys were pooled. Overall, SPA could be an alternative to electrofishing for analysing spatial structure over long distances.
APA, Harvard, Vancouver, ISO, and other styles
48

Johansen, Christian, Aulon Mujaj, Hamed Arshad, and Josef Noll. "The Snowden Phone: A Comparative Survey of Secure Instant Messaging Mobile Applications." Security and Communication Networks 2021 (July 10, 2021): 1–30. http://dx.doi.org/10.1155/2021/9965573.

Full text
Abstract:
In recent years, it has come to attention that governments have been doing mass surveillance of personal communications without the consent of the citizens. As a consequence of these revelations, developers have begun releasing new protocols for end-to-end encrypted conversations, extending and making popular the old Off-the-Record protocol. New implementations of such end-to-end encrypted messaging protocols have appeared, and several popular chat applications have been updated to use such protocols. In this survey, we compare six existing applications for end-to-end encrypted instant messaging, namely, Signal, WhatsApp, Wire, Viber, Riot, and Telegram, most of them implementing one of the recent and popular protocols called Signal. We conduct five types of experiments on each of the six applications using the same hardware setup. During these experiments, we test 21 security and usability properties specially relevant for applications (not protocols). The results of our experiments demonstrate that the applications vary in terms of the usability and security properties they provide, and none of them are perfect. In consequence, we make 12 recommendations for improvement of either security, privacy, or usability, suitable for one or more of the tested applications.
APA, Harvard, Vancouver, ISO, and other styles
49

Murugaveni, S., and K. Mahalakshmi. "Survey on Efficient Use of Spatial Reusability in Multhop Wireless Network." International Journal of Engineering & Technology 7, no. 2.24 (April 25, 2018): 431. http://dx.doi.org/10.14419/ijet.v7i2.24.12129.

Full text
Abstract:
The present wireless routing protocols does not increase the end-to-end throughput by reducing the number of hops to deliver a single packet from a source to a destination node. To maintain the proper link among the nodes in multihop wireless ad-hoc networks, the medium access control (MAC) protocol plays a vital role. The spatial reuse and throughput of a multihop network is greatly affected in assessing the level of interference, channel sharing was not expeditiously utilized by the prevailing methodology of the IEEE 802.11.Routing protocols are generally depends on transmission cost, minimizing routing metrics. But they fail to give assurance for increasing end-to-end throughput. The existing protocols don't take spatial reusability of the remote correspondence media into account. This paper overviews numerous techniques to upgrade the effective channel use by enhancing the spatial reuse.
APA, Harvard, Vancouver, ISO, and other styles
50

Habib, Md Arafat, and Sangman Moh. "Game theory-based Routing for Wireless Sensor Networks: A Comparative Survey." Applied Sciences 9, no. 14 (July 19, 2019): 2896. http://dx.doi.org/10.3390/app9142896.

Full text
Abstract:
Wireless sensor networks (WSNs) have become an important and promising technology owing to their wide range of applications in disaster response, battle field surveillance, wildfire monitoring, radioactivity monitoring, etc. In WSNs, routing plays a significant role in delivery latency, energy consumption, and packet delivery ratio. Furthermore, as these applications are used in critical operations with limited irreplaceable batteries, routing protocols are required to be flawless as well as energy efficient. The dynamic environment also requires intelligent and adaptive routing. Game theory is widely used for designing routing protocols in WSNs to achieve not only reduced energy consumption but also increased packet delivery ratio. The core features of efficiently designed game theory-based routing protocols include optimal cluster head selection in hierarchical routing, energy-efficient and delay-aware route discovery, fault-tolerant data delivery, and coalition forming and grouping among nodes for stringent data transfer. In this paper, different routing protocols based on various types of games are extensively reviewed, which have been reported so far for improving energy consumption, delay, route establishment time, packet delivery ratio, and network lifetime. The different game theory-based routing protocols are qualitatively compared with each other in terms of major features, advantages, limitations, and key characteristics. For each protocol, possible applications and future improvements are summarized. Certain important open concerns and challenges are also discussed, along with future research directions.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography