Literatura científica selecionada sobre o tema "Computer network protocols"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Computer network protocols".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Artigos de revistas sobre o assunto "Computer network protocols"

1

Hasan, Ammar, Tarik A. Rashid, Birzo Ismael, and Nawzad K. AL-Salihi. "Transmission Control Protocol Performance Monitoring for Simulated Wired University Computer Network using OPNET." UKH Journal of Science and Engineering 3, no. 1 (May 22, 2019): 18–28. http://dx.doi.org/10.25079/ukhjse.v3n1y2019.pp18-28.

Texto completo da fonte
Resumo:
Computer networks need protocols to govern all transmission and presentation processes. The transmission control protocol (TCP) is one of the most important protocols that have the compatibility to work with all types of computer networks, overcoming all architectural and operating system differences. Nowadays, networks depend on the TCP protocol to control data flow between all types of connected computers, whether it is client or server, over any type of media whether it is wired or wireless networks, for all network topologies. A simulation of a university campus network has been conducted
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Keller, Ariane, Daniel Borkmann, Stephan Neuhaus, and Markus Happe. "Self-Awareness in Computer Networks." International Journal of Reconfigurable Computing 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/692076.

Texto completo da fonte
Resumo:
The Internet architecture works well for a wide variety of communication scenarios. However, its flexibility is limited because it was initially designed to provide communication links between a few static nodes in a homogeneous network and did not attempt to solve the challenges of today’s dynamic network environments. Although the Internet has evolved to a global system of interconnected computer networks, which links together billions of heterogeneous compute nodes, its static architecture remained more or less the same. Nowadays the diversity in networked devices, communication requirement
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Neeru Kumari and Dr. Tilak Raj. "OSPF Metric Convergence and Variation Analysis During Redistribution with Routing Information Protocol." International Research Journal on Advanced Engineering and Management (IRJAEM) 2, no. 06 (June 22, 2024): 1985–91. http://dx.doi.org/10.47392/irjaem.2024.0293.

Texto completo da fonte
Resumo:
Open Shortest Path First networking protocol falls under the category of Interior gateway routing protocols and is multi-vendor supported. The task of OSPF like any other routing protocol is to calculate the best path between source IP address and destination IP address within the organisation computer network. There are various other routing protocols like Routing Information Protocol, Border Gateway Protocol, Intermediate System - Intermediate System (IS-IS), Enhanced Interior Gateway Routing Protocol, etc. which are used in computer network. Routing protocols have different algorithms throu
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Alfaresa, Yuansa, Bongga Arifwidodo, and Fauza Khair. "Automate IGP and EGP Routing Protocol Configuration using a Network Automation Library." Jurnal Online Informatika 8, no. 2 (December 28, 2023): 222–31. http://dx.doi.org/10.15575/join.v8i2.1157.

Texto completo da fonte
Resumo:
Data communication is sending data from client to client through a computer network. The increasing use of data communication makes computer networks more complex. Complex computer networks make it difficult for network administrators to configure them, especially routing protocol configuration. Network administrators are in charge of configuring routing protocols and managing networks. In addition, the more devices on the network, the greater the chance of human error from the administrator. Therefore, network automation is one solution that helps network administrators overcome this. This st
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Mardedi, Lalu Zazuli Azhar, and Khairan Marzuki. "Network Rancang Bangun Jaringan Komputer LAN Berdasarkan Perbandingan Kinerja Routing Protokol EIGRP dan Routing Protokol OSPF." MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 18, no. 2 (May 29, 2019): 202–10. http://dx.doi.org/10.30812/matrik.v18i2.372.

Texto completo da fonte
Resumo:
Nowadays computer networks are growing rapidly and internet usage is increasing everyday. The need to design an internet network cannot be separated from the routing protocol which functions to integrate all computers with the highest flexibility. Routing is one part that provides effective performance in the network. In comparing the performance of EIGRP and OSPF routing protocols, the implementation of EIGRP and OSPF must be implemented when building a network, so administrators easily know the difference in the performance values of the two routing protocols. The discussion in this study is
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Borisov, Ruslan K., Sergey S. Zhulikov, Maksim N. Smirnov, Yuliya S. Turchaninova, Sergey I. Khrenov, Roman P. Besedin, and Aleksandr V. Dubinin. "Power Equipment Interaction with Network Devices Supporting Internet Application-level Protocols." Vestnik MEI, no. 6 (2021): 59–65. http://dx.doi.org/10.24160/1993-6982-2021-6-59-65.

Texto completo da fonte
Resumo:
The implementation of interaction between high-voltage power equipment with computer network devices in monitoring systems involves the use of proprietary Internet protocols that do not meet the criteria of free software and are not always compatible with the Internet protocols of personal computers. To solve this problem, it is proposed to use an intermediate link between the industrial and computer networks. This link is a network bridge built using the PPP protocol, which unites automatic devices equipped with UART interfaces with a computer network of the 802.11n (Wi-Fi) standard. The arti
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Romaniuc, Alexandru-Gabriel, Vlad-Cosmin Vasile, and Elena-Monica Borda. "Study of Methods and Techniques for Manipulating the Time Synchronization Component of NTP Servers in Computer Networks." International conference KNOWLEDGE-BASED ORGANIZATION 29, no. 3 (June 1, 2023): 71–77. http://dx.doi.org/10.2478/kbo-2023-0078.

Texto completo da fonte
Resumo:
Abstract In computer networks as well as in many other domains, time synchronization is carried out by some dedicated devices called time servers that uses network protocols, such as NTP (Network Time Protocol), PTP (Precision Time Protocol) or SNTP (Simple Network Time Protocol). Many domains and applications, such as, computer networks, security protocols, telecommunications, network services, and many others, depend on accurate time synchronization. According to the CVE (Common Vulnerabilities and Exposures) databases, between 2001-2022, more than 150 time synchronization protocols vulnerab
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Muhammad Shahzaib Saeed. "Survey of Network Protocols." Lahore Garrison University Research Journal of Computer Science and Information Technology 3, no. 2 (June 28, 2019): 15–19. http://dx.doi.org/10.54692/lgurjcsit.2019.030273.

Texto completo da fonte
Resumo:
IPv4 is the network protocols of the present Internet, which is characterized by the Internet Engineering Task Force (IETF). Network protocols characterize guidelines, polices and traditions for communication between system devices. Every advanced protocol for computer organization utilizer a packet switching system to send and get the message. The protocols are intended to conquer the activities of any enemy that can lose the sent message, discretionarily change the fields of the sent message, and replay old messages. In the web, the colossal measure of information and the immense number of v
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Deepak Malik and Dr. Bijendra Singh. "Optimizing OSPF Cost Value for Best Path Selection Using Metric-Type Variation." International Research Journal on Advanced Engineering Hub (IRJAEH) 2, no. 06 (June 25, 2024): 1845–54. http://dx.doi.org/10.47392/irjaeh.2024.0254.

Texto completo da fonte
Resumo:
Open Shortest Path First (OSPF) is a multi-vendor routing standard. Any routing protocol's goal is to discover the optimum path between source and destination addresses inside a computer network. Other routing protocols include Routing Information Protocol (RIP), Border Gateway Protocol (BGP), Enhanced Interior Gateway Routing Protocol (EIGRP), and IS-IS. which are also used in computer networking. Each routing protocol has different set of rules through which they calculate the best path selection. OSPF is often used with the combination of these routing protocol because of its flexible desig
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Majid, Nuur Wachid Abdul, and Syifaul Fuada. "RIP VS. OSPF ROUTING PROTOCOLS: WHICH ONE IS THE BEST FOR A REAL-TIME COMPUTER NETWORK?" Simetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer 11, no. 1 (April 30, 2020): 249–56. http://dx.doi.org/10.24176/simet.v11i1.3796.

Texto completo da fonte
Resumo:
The development of modern computer networks for internet access makes routing protocols needed, and it has an essential role in a real-time system. Therefore, the best and most effective routes can be reached. In this short article, we discuss the comparison of two popular routing protocols, i.e., Routing Information Protocol (RIP) and Open Shortest Path First (OSPF) using two network simulators, i.e., Graphical Network Simulator-3 (GNS3) and Enterprise Network Simulation Platform (ENSP). Both of OSPF and RIP routing protocols can be used in the same topology and have differences in the connec
Estilos ABNT, Harvard, Vancouver, APA, etc.
Mais fontes

Teses / dissertações sobre o assunto "Computer network protocols"

1

alyanbaawi, ashraf. "DESIGN OF EFFICIENT MULTICAST ROUTING PROTOCOLS FOR COMPUTER NETWORKS." OpenSIUC, 2020. https://opensiuc.lib.siu.edu/dissertations/1775.

Texto completo da fonte
Resumo:
Multicasting can be done in two different ways: source based tree approach andshared tree approach. Shared tree approach is preferred over source-based treeapproach because in the later construction of minimum cost tree per source is neededunlike a single shared tree in the former approach. However, in shared tree approach asingle core needs to handle the entire traffic load resulting in degraded multicastperformance. Besides, it also suffers from „single point failure‟. Multicast is acommunication between one or multiple senders and multiple receivers, which used asa way of sending IP datagra
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Lu, Ching-sung. "Automated validation of communication protocols /." The Ohio State University, 1986. http://rave.ohiolink.edu/etdc/view?acc_num=osu148726702499786.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Zissopoulos, Athanassios. "On buffer allocation in transport protocols." Thesis, McGill University, 1987. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=66245.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Dahlgren, Jeremy. "Efficient failure detection protocols for point-to-point communication networks /." Online version of thesis, 2004. https://ritdml.rit.edu/dspace/handle/1850/2752.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Sundaresan, Latha. "Simple network management protocol /." Online version of thesis, 1995. http://hdl.handle.net/1850/12254.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Jayakeerthy, Arunkumar Thippur Lim Alvin S. "Query-localized route repair mechanism for ad-hoc on-demand distance vector routing algorithm." Auburn, Ala, 2009. http://hdl.handle.net/10415/1608.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Ford, Daniel Alexander. "Semi-automatic implementation of network protocols." Thesis, University of British Columbia, 1985. http://hdl.handle.net/2429/24665.

Texto completo da fonte
Resumo:
A compiler which achieves automatic implementation of network protocols by transforming specifications written in FDT into C programs is presented. A brief introduction to the the fundamentals of FDT, a standard language developed by ISO/TC97/SC 16/WG 1 Subgroup B for specifying network protocols, is given. We then present an overview of the compiler and discuss the problem of PASCAL to C translation. Transformation of a FDT specification into code is explained and illustrated by two implementation examples. The first example illustrates the implementation strategy by tracing the processing of
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Berglund, Anders. "On the understanding of computer network protocols." Licentiate thesis, Uppsala universitet, Avdelningen för datorteknik, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-86076.

Texto completo da fonte
Resumo:
How students learn about network protocols is studied in a project-centred, internationally distributed, university course in computer systems taught jointly by two universities. Insights into students' understanding of basic concepts within computer networks are gained through an empirical phenomenographic research approach. The use of phenomenography as a research approach makes it possible to learn about computer science, as it is experienced by the students. The context in which the research is carried out and issues concerning by whom the context is experienced, are investigated and form
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Alexander, David. "A Network Metadata Infrastructure for Locating Network Devices." Ohio University / OhioLINK, 2004. http://www.ohiolink.edu/etd/view.cgi?ohiou1088176648.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Baronikian, Haig. "Modelling and analysis of a computer conferencing system." Thesis, McGill University, 1987. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=63756.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Mais fontes

Livros sobre o assunto "Computer network protocols"

1

G, Naugle Matthew, ed. Network protocols. New York: McGraw-Hill, 1999.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Spiropoulos, George. Computer network protocols and protocol proving. Birmingham: University of Birmingham, 1988.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

A, Sunshine Carl, ed. Computer network architecturesand protocols. 2nd ed. New York: Plenum, 1989.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Marsden, Brian W. Communication network protocols. 2nd ed. Bromley, Kent, England: Chartwell-Bratt, 1986.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Marsden, Brian W. Communication network protocols. [Bromley]: Chartwell-Bratt, 1985.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Sunshine, Carl A., ed. Computer Network Architectures and Protocols. Boston, MA: Springer US, 1989. http://dx.doi.org/10.1007/978-1-4613-0809-6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

A, Sunshine Carl, ed. Computer network architectures and protocols. 2nd ed. New York: Plenum Press, 1989.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Naugle, Matthew G. Network protocol handbook. New York: McGraw-Hill, 1994.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Hartpence, Bruce. Packet guide to core network protocols. Sebastopol, Calif: O'Reilly Media, 2011.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Black, Uyless D. TCP/IP and related protocols. 2nd ed. New York: McGraw-Hill, 1995.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Mais fontes

Capítulos de livros sobre o assunto "Computer network protocols"

1

Kizza, Joseph Migga. "Computer Network Security Protocols." In Guide to Computer Network Security, 359–89. London: Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_17.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Kizza, Joseph Migga. "Computer Network Security Protocols." In Texts in Computer Science, 367–98. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38141-7_17.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Kizza, Joseph Migga. "Computer Network Security Protocols." In Guide to Computer Network Security, 357–86. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4543-1_17.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Kizza, Joseph Migga. "Computer Network Security Protocols." In Guide to Computer Network Security, 365–96. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_17.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Kizza, Joseph Migga. "Computer Network Security Protocols." In Texts in Computer Science, 409–41. Cham: Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-47549-8_18.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Harrim, Muhannad, Mohamed El-Wakil, and Ala Al-Fuqaha. "Network Layer Protocols." In Handbook of Computer Networks, 40–62. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2011. http://dx.doi.org/10.1002/9781118256053.ch4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Schwartz, Mischa, and Thomas E. Stern. "Routing Protocols." In Computer Network Architectures and Protocols, 239–71. Boston, MA: Springer US, 1989. http://dx.doi.org/10.1007/978-1-4613-0809-6_9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Gerla, Mario, and Leonard Kleinrock. "Flow Control Protocols." In Computer Network Architectures and Protocols, 273–328. Boston, MA: Springer US, 1989. http://dx.doi.org/10.1007/978-1-4613-0809-6_10.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Ciubotaru, Bogdan, and Gabriel-Miro Muntean. "Network Communications Protocols and Services." In Computer Communications and Networks, 29–52. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5292-7_3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Bertine, H. V. "Physical Interfaces and Protocols." In Computer Network Architectures and Protocols, 39–80. Boston, MA: Springer US, 1989. http://dx.doi.org/10.1007/978-1-4613-0809-6_3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Trabalhos de conferências sobre o assunto "Computer network protocols"

1

Geromel, Paulo A., and Sergio T. Kofuji. "Avaliação do U-Net em Clusters com Rede Myrinet." In Simpósio Brasileiro de Arquitetura de Computadores e Processamento de Alto Desempenho. Sociedade Brasileira de Computação, 1998. http://dx.doi.org/10.5753/sbac-pad.1998.22667.

Texto completo da fonte
Resumo:
Clusters of computers and workstations interconnected by high speed networks are widely used in high performance computing. Although high speed networks have the best latency and throughput, these features are not properly used by conventional communication protocol implementations. A possible solution for such a problem is found in Light-Weight Protocols. These protocols are stated in a User-Level aproach, where the communication tasks are directly processed in user space, instead of being processed inside operating system kernel, using a communication library. This paper evaluates the perfon
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Youssef, M. W. "Securing computer networks communication by modifying computer network communication protocols." In 2011 11th International Conference on ITS Telecommunications (ITST). IEEE, 2011. http://dx.doi.org/10.1109/itst.2011.6060130.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Vakaliuk, Tetiana, Oleksii Chyzhmotria, Olena Chyzhmotria, Dmytro Antoniuk, Valerii Kontsedailo, and Viacheslav Kryvohyzha. "Simulator of Computer Networks and Basic Network Protocols." In 5th Workshop for Young Scientists in Computer Science & Software Engineering. SCITEPRESS - Science and Technology Publications, 2022. http://dx.doi.org/10.5220/0012009800003561.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Kalai, Yael Tauman, Xin Li, Anup Rao, and David Zuckerman. "Network Extractor Protocols." In 2008 IEEE 49th Annual IEEE Symposium on Foundations of Computer Science (FOCS). IEEE, 2008. http://dx.doi.org/10.1109/focs.2008.73.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Afek, Yehuda, Baruch Awerbuch, and Eli Gafni. "Applying static network protocols to dynamic networks." In 28th Annual Symposium on Foundations of Computer Science. IEEE, 1987. http://dx.doi.org/10.1109/sfcs.1987.7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Teymourlouei, Haydar, and Vareva E. Harris. "Neural Networks and Network Protocols to Predict Network Behavior." In 2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME). IEEE, 2022. http://dx.doi.org/10.1109/iceccme55909.2022.9988685.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Li, Kuang-Yu J., and B. Keith Jenkins. "A Collisionless Wavelength-Division Multiple Access Protocol for Free-Space Cellular Hypercube Parallel Computer Systems." In Optical Computing. Washington, D.C.: Optica Publishing Group, 1995. http://dx.doi.org/10.1364/optcomp.1995.otha3.

Texto completo da fonte
Resumo:
The performance of a MIMD parallel computer is critically impacted by the interconnection network performance, which in turn is determined by the network topology, implementation hardware, and communication protocol. Cellular hypercube (CH) interconnection networks, with emphasis on a symmetric cellular hypercube (SCH) network, were studied for the system discussed in this paper because they can exploit the communication locality observed in parallel applications [1], are reasonably scalable due to their O(logN) connectivities, and can be implemented with moderate requirements on the number of
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Aslanyan, Levon, Hasmik Sahakyan, Vladimir Romanov, Georges Da Costa, and Rahim Kacimi. "Large Network Target Coverage Protocols." In 2019 Computer Science and Information Technologies (CSIT). IEEE, 2019. http://dx.doi.org/10.1109/csitechnol.2019.8895058.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Godfrey, Brighten. "Session details: Network protocols." In SIGMETRICS '11: ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems. New York, NY, USA: ACM, 2011. http://dx.doi.org/10.1145/3253098.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Vinodh Kumar, B., and J. Ramesh. "Automotive in vehicle network protocols." In 2014 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2014. http://dx.doi.org/10.1109/iccci.2014.6921836.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Relatórios de organizações sobre o assunto "Computer network protocols"

1

Allende López, Marcos, Diego López, Sergio Cerón, Antonio Leal, Adrián Pareja, Marcelo Da Silva, Alejandro Pardo, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, June 2021. http://dx.doi.org/10.18235/0003313.

Texto completo da fonte
Resumo:
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Cambridge Quantum Computing (CQC), and Tecnológico de Monterrey to identify and eliminate quantum threats in blockchain networks. The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms. When quantum computers become robust enough to run Shor's algorithm on a large scale, the most used asymmetric algorithms, utilized for digital signatures and message encryption, such as RSA, (EC)DSA, and (EC)DH
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

LI, Zhendong, Hangjian Qiu, xiaoqian Wang, chengcheng Zhang, and Yuejuan Zhang. Comparative Efficacy of 5 non-pharmaceutical Therapies For Adults With Post-stroke Cognitive Impairment: Protocol For A Bayesian Network Analysis Based on 55 Randomized Controlled Trials. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, June 2022. http://dx.doi.org/10.37766/inplasy2022.6.0036.

Texto completo da fonte
Resumo:
Review question / Objective: This study will provide evidence-based references for the efficacy of 5 different non-pharmaceutical therapies in the treatment of post-stroke cognitive impairment(PSCI). 1. Types of studies. Only randomized controlled trials (RCTs) of Transcranial Magnetic Stimulation(TMS), Transcranial Direct Current Stimulation(tDCS), Acupuncture, Virtual Reality Exposure Therapy(VR) and Computer-assisted cognitive rehabilitation(CA) for PSCI will be recruited. Additionally, Studies should be available in full papers as well as peer reviewed and the original data should be clear
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!