Добірка наукової літератури з теми "Protools"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Protools".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Protools"

1

Garland, Jack. "APB Tools Sigma1 Surround Matrix Mixer for ProTools TDM." Computer Music Journal 22, no. 3 (1998): 73. http://dx.doi.org/10.2307/3681166.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Shi, Lu-Feng, Karen A. Doherty, Tammy M. Kordas, and Joseph T. Pellegrino. "Short-Term and Long-Term Hearing Aid Benefit and User Satisfaction: A Comparison between Two Fitting Protocols." Journal of the American Academy of Audiology 18, no. 06 (June 2007): 482–95. http://dx.doi.org/10.3766/jaaa.18.6.3.

Повний текст джерела
Анотація:
Currently published hearing aid fitting protocols recommend speech-in-noise testing and loudness measures, but it remains unclear how these measures affect hearing aid benefit and user satisfaction. This study compared two protocols in their effects on benefit and satisfaction. Protocol A included an electroacoustic analysis, real-ear measures, and hearing aid adjustments based on users' comments. Protocol B included all of Protocol A and a speech-in-noise test, loudness discomfort levels, and aided loudness. Thirty-two participants completed the Abbreviated Profile of Hearing Aid Benefit (APHAB) and the Satisfaction with Amplification in Daily Life (SADL) at 45 days and three months post–initial fitting. Fewer hearing aid adjustments were made to the hearing aids for participants fitted with Protocol B than participants fitted with Protocol A, but final gains were similar for both groups. Although similar APHAB scores were obtained for both protocols, SADL scores decreased between 45 days and three months for Protocol A. Los protocoles de amplificación de auxiliares auditivo actualmente publicados recomiendan pruebas de lenguaje en ruido y mediciones de apreciación subjetiva de la intensidad (sonoridad), pero no está claro cómo estas mediciones afectan el beneficio de un auxiliar auditivo y la satisfacción del usuario. El estudio comparó dos protocolos en cuanto a sus efectos sobre beneficio y satisfacción. El Protocolo A incluyó un análisis electroacústico, mediciones de oído real y ajuste en el auxiliar auditivo basados en los comentarios del usuario. El Protocolo B incluyó todas las pruebas del Protocolo A, además de una prueba de audición en ruido, de niveles de molestia en la apreciación subjetiva de la intensidad y de sonoridad amplificada. Treinta y dos participantes completaron el Perfil Abreviado de Beneficio del Auxiliar Auditivo (APHAB) y la prueba de Satisfacción con la Amplificación en la Vida Diaria (SADL) a los 45 días y a los tres meses de la adaptación inicial. Tuvieron que hacerse menos ajustes en el audífono en los auxiliares auditivos de participantes adaptados con el Protocolo B, que en los participantes adaptados con el Protocolo A, pero las ganancias finales fueron similares en ambos grupos. Aunque se obtuvieron puntajes APHAB similares en ambos protocolos, los puntajes SADL disminuyeron entre los 45 días y los tres meses para el Protocolo A.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Miguel Silva Gómez, Miguel, Rubén Darío Hernández, and Juan Carlos Ruge Cárdenas. "Propuesta de una plataforma de pruebas para el análisis de la interacción llanta-pavimento." Revista Clepsidra 9, no. 17 (May 18, 2014): 61–69. http://dx.doi.org/10.26564/19001355.29.

Повний текст джерела
Анотація:
El presente documento muestra el análisis de los métodos para el estudio de la interacción llanta pavimento dentro de la contaminación auditiva, permitiendo diseñar la propuesta de un prototipo tipo tráiler según la norma iso 11819-2. este diseño consiste en la ubicación de cuatro micrófonos cerca de los ejes para adquirir las ondas sonoras que se generan entre el asfalto y las llantas del tráiler, obteniendo la medición de las propiedades acústicas en diferentes tipos de superficies. en la primera etapa del proyecto, se desarrolló el diseño inicial del tráiler con ayuda de la herramienta de software inventor®. posteriormente, se desarrollo la instrumentación electrónica por medio del programa protools®, este sistema contiene una tarjeta de adquisición de audio para cuatro canales y micrófonos capacitivos, que permiten la obtención de las señales de audio características del montaje con el cual se pueden determinar el análisis de los datos y caracterizarlos con los niveles de ruido existentes.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Cameron, Thomas, Doson Chua, Stephen Shalansky, Edwin Tam, and Erica Wang. "Comparison of a Fully Weight-Based Protocol with a Non–Weight-Based Dosage Titration Protocol for IV Unfractionated Heparin: A Before-and-After Study." Canadian Journal of Hospital Pharmacy 76, no. 1 (January 9, 2023): 23–28. http://dx.doi.org/10.4212/cjhp.3265.

Повний текст джерела
Анотація:
Background: Unfractionated heparin (UFH) is used for the prevention and treatment of arterial or venous thromboembolism. The dosage for IV infusion of UFH is generally based on the patient’s weight, with adjustment to a specific target for activated partial thromboplastin time (aPTT). In May 2019, the UFH protocols at the study institution were changed from being fully weight-based (i.e., for both initial dosing and subsequent dosage titrations) to weight-based initial dosing and non–weight-based dosage titrations, but the relative effectiveness of these 2 approaches was not known. Objectives: The primary objective was to compare the effectiveness in achieving therapeutic aPTT with the fully weight-based and non–weight-based dosage titration protocols. The secondary objective was to compare the effectiveness of the non–weight-based dosage titration protocol with that of the previous fully weight-based one for patients with low-target aPTT. Methods: A single-centre, retrospective, observational before-and-after study was conducted for patients receiving therapeutic UFH for any indication. Patients in the “before” group (fully weight-based protocol) were treated from January 2015 to October 2016, and those in the “after” group (non–weight-based titration) from January to October 2020. Results: From a total of 1969 charts screened, 137 patients treated according to the fully weight-based protocols and 130 patients treated according to the non–weight-based titration protocols were included. In terms of the co-primary objective, the median number of dosage adjustments to achieve therapeutic anticoagulation was 1 in both groups (p = 0.48), and the proportion of patients with therapeutic anticoagulation at 24 h was similar (96.2% [125/130] with the non–weight-based titration protocols versus 99.3% [136/137] with the fully weight-based protocols; p = 0.09). Among patients treated according to the low-target UFH protocols, those with the non–weight-based titration protocol were less likely to have therapeutic anticoagulation at first measurement of aPTT than those with the fully weight-based protocol (37.9% [25/66] versus 44.6% [41/92], p = 0.033). Conclusions: This retrospective, observational, before-and-after study showed that the effectiveness of the non–weight-based dosage titration protocols in achieving therapeutic aPTT was similar to that of fully weight-based UFH protocols. RÉSUMÉ Contexte : L’héparine non fractionnée (HNF) est utilisée pour la prévention et le traitement de la thromboembolie artérielle ou veineuse. La posologie de la perfusion par IV d’HNF se base généralement sur le poids du patient, avec un ajustement à un objectif précis du temps moyen de céphaline activée (TCA). En mai 2019, les protocoles d’HNF de l’établissement à l’étude sont passés d’une approche entièrement basée sur le poids (à la fois pour la posologie initiale et les titrages posologiques ultérieurs) à une posologie initiale basée sur le poids, et à des titrages posologiques non basés sur le poids. Cependant, l’efficacité relative de ces 2 approches était inconnue. Objectifs : L’objectif principal de l’étude consistait à comparer dans quelle mesure les protocoles entièrement basés sur le poids et les protocoles de titrage non basés sur le poids étaient efficaces pour atteindre le TCA thérapeutique. L’objectif secondaire consistait quant à lui à comparer l’efficacité du protocole de titrage de dose non basé sur le poids au protocole précédent entièrement basé sur le poids chez les patients ayant une faible cible de TCA. Méthodes : Une étude monocentrique, rétrospective, observationnelle avant-après a été menée chez des patients recevant de l’HNF thérapeutique, toutes indications confondues. Les patients du groupe « Avant » (protocole entièrement basé sur le poids) ont été traités de janvier 2015 à octobre 2016, et ceux du groupe « Après » (protocole de titrage de dose non basé sur le poids) de janvier à octobre 2020. Résultats : À partir de 1969 dossiers examinés, 137 patients traités selon les protocoles entièrement basés sur le poids et 130 patients traités selon les protocoles d’ajustement posologique non basés sur le poids ont été inclus. En ce qui concerne l’objectif co-principal, le nombre médian d’ajustements posologiques pour obtenir une anticoagulation thérapeutique était de 1 dans les deux groupes (p = 0,48), et la part de patients ayant une anticoagulation thérapeutique à 24 h était similaire (96,2 % [125/130] avec les protocoles non basés sur le poids contre 99,3 % [136/137] avec ceux entièrement basés sur le poids [p = 0,09]). Parmi les patients traités selon les protocoles HNF à faible cible, ceux avec le protocole de titrage non basé sur le poids étaient moins susceptibles de connaître une anticoagulation thérapeutique à la première mesure du TCA que ceux avec le protocole entièrement basé sur le poids (37,9 % [25/66] contre 44,6 % [41/92], p = 0,033). Conclusions : Cette étude rétrospective et observationnelle avant-après a montré que l’efficacité des protocoles d’ajustement posologique non basés sur le poids pour obtenir un TCA thérapeutique était similaire à celle des protocoles d’HNF entièrement basés sur le poids.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Peixoto, João Alvarez, André Borin Soares, and Vitor Macedo Ochôa. "Internet das Coisas Industrial: um ensaio de protocolos IoT para manufatura industrial." Revista Eletrônica Científica da UERGS 8, no. 3 (December 23, 2022): 178–87. http://dx.doi.org/10.21674/2448-0479.83.178-187.

Повний текст джерела
Анотація:
Em meio às mudanças no mercado de bens e consumo, provocadas pela transformação digital, exige-se que as máquinas de manufaturas sejam mais interativas entre si e com os painéis de monitoramento em nuvem. As conexões via internet das coisas (IoT) promovem este grau de interação e mobilidade desejados. Contudo, o ambiente industrial reivindica melhor confiabilidade e segurança, visto que a Internet das Coisas Industrial (IIoT) apresenta-se com protocolos e plataformas para este fim. Portanto, conhecer as características de protocolos e plataformas, ante a manufatura, adquire importância. O objetivo deste estudo é caracterizar as funcionalidades dos protocolos MQTT, HTTP e CoAP como uma aplicação de manufatura industrial, com painel de monitoramento nas plataformas Adafruit.IO, Tago.IO e Thinger.IO. É proposto um método para a realização de estudos semelhantes, em sistemas de manufatura interativa, com uso de protocolos e plataformas IIoT. Como forma de conexão da máquina com a internet, é utilizado o módulo ESP8266 NodeMCU. Na aplicação, as plataformas IIoT obtiveram resultados muito semelhantes, podendo ser a elas atribuídas o mesmo grau de importância para o estudo. Os protocolos diferenciaram-se, sendo o protocolo MQTT o que melhor respondeu às funcionalidades do sistema de manufatura proposto, ao oferecer sua comunicação assíncrona, sem necessidade de que os equipamentos estejam constantemente interagindo. Já o protocolo HTTP apresentou melhores recursos em APIs, mas sua conexão síncrona demanda uma boa rede de dados em internet. Por fim, o protocolo CoAP apresentou documentação insuficiente para acesso às plataformas e bibliotecas para uso em módulos microcontroladores. Palavras-chave: Protocolos; IIoT; plataformas; redes; indústria 4.0; programação. Abstract Industrial Internet of Things: a trial of IoT protocols for industrial manufacturing Changes in the goods and consumption market, caused by digital transformation, require manufacturing machines to be more interactive, with each other and with cloud monitoring panels. Connections via the Internet of Things (IoT) promote this desired degree of interaction and mobility, but the industrial environment demands increased reliability and security. The Industrial Internet of Things (IIoT) presents itself with protocols and platforms for this purpose. Knowing the characteristics of protocols and platforms, facing the desired manufacturing, becomes important. The objective of this study is to characterize the functionalities of the MQTT, HTTP and CoAP protocols in an industrial manufacturing application, with a monitoring panel on the Adafruit.IO, Tago.IO and Thinger.IO platforms. A method is proposed for carrying out similar studies in interactive manufacturing systems, using IIoT protocols and platforms. As a way of connecting the machine to the internet, the ESP8266 NodeMCU module is used. In the developed application, the IIoT platforms obtained very similar results, and they can be attributed the same degree of importance for the study. In the evaluation of the protocols, the MQTT protocol was the one that best met the functionalities of the proposed manufacturing system, providing its asynchronous communication, which does not requires the equipment to be constantly interacting. The HTTP protocol has better features in APIs, but its synchronous connection demands a good data network on the internet. The CoAP protocol presented insufficient documentation available for access to platforms and libraries, for use in microcontroller modules. Keywords: Protocols; IIoT; platforms; networks; industry 4.0; programming. Resumen Internet Industrial de las Cosas: un ensayo de protocolos IoT para la fabricación industrial En medio de los cambios en el mercado de bienes y de consumo provocados por la transformación digital, se requiere que las máquinas de fabricación sean más interactivas, tanto entre sí como con los paneles de control en la nube. Las conexiones dela Internet de las Cosas (IoT) promueven este grado deseado de interacción y movilidad, pero el entorno industrial exige una mayor fiabilidad y seguridad. La Internet Industrial de las Cosas (IIoT) se presenta con protocolos y plataformas para este fin. Conocer las características de los protocolos y las plataformas relacionados a la fabricación cobra importancia. El objetivo de este estudio es caracterizar las funcionalidades de los protocolos MQTT, HTTP y CoAP en una aplicación de fabricación industrial, con panel de control en las plataformas Adafruit.IO, Tago.IO y Thinger.IO. Se propone un método para realizar estudios similares, en sistemas de fabricación interactivos, utilizando protocolos y plataformas IIoT. Como forma de conectar la máquina a internet, se utiliza el módulo ESP8266 NodeMCU. En la aplicación, las plataformas IIoT obtuvieron resultados muy similares, pudiendo asignarles el mismo grado de importancia para el estudio. Los protocolos, en cambio, se mostraron diferentes, siendo el MQTT el que mejor respondió a las funcionalidades del sistema de fabricación propuesto, ofreciendo su comunicación asíncrona, no requiriendo que los equipos estén constantemente interactuando. El protocolo HTTP presentaba mejores recursos en las API, pero su conexión sincrónica exige una buena red de datos de internet. Por último, el protocolo CoAP presentó una documentación insuficiente para el acceso a las plataformas y bibliotecas, para su uso en módulos de microcontroladores. Palabras clave: Protocolos; IIoT; plataformas; redes; industria 4.0; programa.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Beattie, Randall C. "Distortion Product Otoacoustic Emissions: Comparison of Sequential versus Simultaneous Presentation of Primary-Tone Pairs." Journal of the American Academy of Audiology 14, no. 09 (October 2003): 471–84. http://dx.doi.org/10.1055/s-0040-1715939.

Повний текст джерела
Анотація:
This Grason-Stadler GSI-60 system for measuring distortion product otoacoustic emissions (DPOAEs) allows the examiner to present one set of primary-tone pairs at a time (i.e., sequential presentation), or to present as many as four sets of primary-tone pairs at a time (i.e., simultaneous presentation). The Sequential and Simultaneous protocols were used to compare administration times, DPOAEs, and noise floors (NFs) on normal-hearing subjects at three frequencies (f2 = 1000, 2000, and 4000 Hz) and eight intensities (L1 = 40–75 dB SPL in 5 dB steps; L2 = 30–65 dB SPL). The Simultaneous protocol was completed in less than half the time (mean = 2 minutes, 21 seconds) required for the Sequential protocol (mean = 5 minutes, 13 seconds). When stimulus intensity (L1) was <60 dB SPL, the Sequential and Simultaneous protocols yielded similar DPOAEs and NFs. However, at the higher L1 intensities, the NFs for the Simultaneous protocol were larger than those for the Sequential protocol. The higher Simultaneous NFs reflect the greater system distortion/noise generated by the GSI-60 instrumentation. Reliability was assessed using the standard error of measurement of the difference between two scores. The data revealed no significant differences between protocols, and suggest that differences between two DPOAEs are statistically significant if they exceed ~7 dB (95% confidence interval). Este sistema Grason-Stadler (GSI-60) para la medición de emisiones otoacústicas por productos de distorsión (DPOAE) permite al examinador la presentación de un juego de pares de tonos primarios al mismo tiempo (p.e., presentación secuencial), o presentar hasta cuatro juegos de pares de tonos primarios a la vez (p.e., presentación simultánea). Se utilizaron los protocolos Secuencial y Simultáneo para comparar los tiempos de administración, las DPOAE y los pisos de ruido (NF) en sujetos normo-oyentes, en tres frecuencias (f2 = 1000, 2000 y 4000 Hz) y ocho intensidades (L1 = 40-75 dB en pasos de 5 dB; L2 = 30-65 dB SPL). El protocolo Simultáneo se completó en menos de la mitad del tiempo (media = 2 minutos, 21 segundos) requerido por el protocolo Secuencial (media = 5 minutos, 13 segundos). Cuando la intensidad del estímulo (L1) fue £60 dB SPL, los protocolos Secuencial y Simultáneo rindieron DPOAE y NF similares. Sin embargo, en las intensidades L1 más altas, los NF para el protocolo Simultáneo fueron mayores que aquellas para el protocolo Secuencial. Los NF Simultáneos más altos reflejan la mayor distorsión/ruido del sistema, generado por la instrumentación del GSI-60. La confiabilidad fue evaluada utilizando el error estándar de medición de la diferencia entre los dos puntajes. Los datos revelaron que no había diferencias significativas entre los protocolos, y sugieren que las diferencias entre dos DPOAE son estadísticamente significativas si exceden ~7 dB (intervalo de confianza del 95%).
Стилі APA, Harvard, Vancouver, ISO та ін.
7

YAKIN, RAHIMUL, SYAHRIZAL SYARIF, and EDI SETIAWAN TEHUTERU. "Perbandingan Kesintasan Tiga Tahun pada Anak Leukemia Limfoblastik Akut antara Protokol Pengobatan 2006 dan 2013." Indonesian Journal of Cancer 11, no. 3 (November 6, 2017): 111. http://dx.doi.org/10.33371/ijoc.v11i3.515.

Повний текст джерела
Анотація:
Treatment of children with Acute lymphoblastic leukemia was developing, currently in Indonesia there are several commonly used protocols such as National protocol (Jakarta), WK-LLA 2000 protocol, LLA protocol 2006 and protocol LLA 2013. The purpose of this study to determine the probability of survival 3 years In children with acute lymphoblastic leukemia between protocols 2006 and 2013. This study used a mix method of retrospective cohorts and in-depth interviews. The population in this study were LLA children aged 1–15 years who received protocol 2006 and 2013 in RSKD Jakarta from 2008–2016 is 68 children with research time from April 2016 until June 2016. Data were analyzed using Cox Regression. The result of this study shows that the 3-year survival probability of LLA remission based on the 2006 treatment protocol is 30% and the treatment protocol of 2013 is 27%. A 3-year survival event remission occurred between 2006 and 2013 treatment protocols of HR 1.57 (90% CI 0.577–4,299), but the difference between the two protocols was not statistically significant with p-value 0.456.The results of in-depth interviews were also obtained in protocols 2006 and 2013 in the same principle but there remain some differences between the both of the treatment schedule and doses are cumulatively increased. The conclusions of these two protocols are in principle the same and there is not much difference in inputs and processes. ABSTRAK Pengobatan pada anak leukemia limfoblastik akut terus dikembangkan. Saat ini, di Indonesia ada beberapa protokol yang lazim digunakan, yaitu protokol Nasional (Jakarta), protokol WK-LLA 2000, protokol LLA 2006, dan protokol LLA 2013. Tujuan studi ini untuk mengetahui probabilitas kesintasan hidup tiga tahun pada anak leukemia limfoblastik akut antara protokol 2006 dan 2013. Studi ini menggunakan mix method, yaitu kohort retrospektif dan wawancara mendalam. Populasi dalam penelitian ini adalah anak LLA usia 1–15 tahun yang mendapatkan protokol 2006 dan 2013 di Rumah Sakit Kanker “Dhramais”/RSKD, Jakarta, dari 2008–2016 sebanyak 68 anak dengan waktu penelitian dari April 2016 sampai Juni 2016. Data dianalisis dengan Cox Regression. Hasil studi menunjukkan probabilitas kesintasan tiga tahun terjadi remisi pada anak LLA berdasarkan protokol pengobatan 2006 sebesar 30% dan protokol pengobatan 2013 sebesar 27%. Peberdaan kesintasan tiga tahun terjadi remisi antara protokol pengobatan 2006 dan 2013 sebesar HR 1,57 (CI 90% 0,577–4,299). Namun, perbedaan antara kedua protokol ini tidak bermakna secara statistik dengan p-value 0,456. Hasil wawancara mendalam juga menunjukkan pada protokol 2006 dan 2013 secara prinsip sama, tetapi tetap ada beberapa perbedaan di antara keduanya, seperti jadwal pengobatan dan dosis secara kumulatif meningkat. Studi ini menyimpulkan bahwa secara prinsip kedua protokol ini sama dan tidak terdapat banyak perbedaan dalam hal input serta proses.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Reges Bessa, Carlos Deyvinson. "PERFORMANCE EVALUATION ANALYSIS OF WIRELESS SENSOR NETWORKS ROUTING PROTOCOLS IN SMART GRIDS." Revista Cientifica TECNIA 26, no. 1 (August 16, 2016): 9. http://dx.doi.org/10.21754/tecnia-250215.02.

Повний текст джерела
Анотація:
ABSTRACTThis work aims to study which wireless sensor network routing protocol is more suitable for Smart Grids applications, through simulation of AODV protocols, AOMDV, DSDV and HTR in the NS2 simulation environment. Was simulated a network based on a residential area with 47 residences, with one node for each residence and one base station, located about 25m from the other nodes. Many parameters, such as packet loss, throughput, delay, jitter and energy consumption were tested. The network was increased to 78 and 93 nodes in order to evaluate the behavior of the protocols in larger networks. The tests proved that the HTR is the routing protocol that has the best results in performance and second best in energy consumption. The DSDV had the worst performance according to the tests.Key words.- Smart grid, QoS analysis, Wireless sensor networks, Routing protocols.RESUMENEste trabajo tiene como objetivo estudiar el protocolo de enrutamiento de la red de sensores inalámbricos es más adecuado para aplicaciones de redes inteligentes, a través de la simulación de protocolos AODV, AOMDV, DSDV y HTR en el entorno de simulación NS2. Se simuló una red basada en una zona residencial con 47 residencias, con un nodo para cada residencia y una estación base, situada a unos 25 metros de los otros nodos. Muchos parámetros, tales como la pérdida de paquetes, rendimiento, retardo, jitter y el consumo de energía se probaron. La red se incrementó a 78 y 93 nodos con el fin de evaluar el comportamiento de los protocolos de redes más grandes. Las pruebas demostraron que el HTR es el protocolo de enrutamiento que tiene los mejores resultados en el rendimiento y el segundo mejor en el consumo de energía. El DSDV tuvo el peor desempeño de acuerdo a las pruebas.Palabras clave.- redes inteligentes, análisis de calidad de servicio, redes de sensores inalámbricas, protocolos de enrutamiento.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Reges Bessa, Carlos Deyvinson. "PERFORMANCE EVALUATION ANALYSIS OF WIRELESS SENSOR NETWORKS ROUTING PROTOCOLS IN SMART GRIDS." Revista Cientifica TECNIA 26, no. 1 (August 16, 2016): 17. http://dx.doi.org/10.21754/tecnia-26012016.02.

Повний текст джерела
Анотація:
ABSTRACTThis work aims to study which wireless sensor network routing protocol is more suitable for Smart Grids applications, through simulation of AODV protocols, AOMDV, DSDV and HTR in the NS2 simulation environment. Was simulated a network based on a residential area with 47 residences, with one node for each residence and one base station, located about 25m from the other nodes. Many parameters, such as packet loss, throughput, delay, jitter and energy consumption were tested. The network was increased to 78 and 93 nodes in order to evaluate the behavior of the protocols in larger networks. The tests proved that the HTR is the routing protocol that has the best results in performance and second best in energy consumption. The DSDV had the worst performance according to the tests.Key words.- Smart grid, QoS analysis, Wireless sensor networks, Routing protocols.RESUMENEste trabajo tiene como objetivo estudiar el protocolo de enrutamiento de la red de sensores inalámbricos es más adecuado para aplicaciones de redes inteligentes, a través de la simulación de protocolos AODV, AOMDV, DSDV y HTR en el entorno de simulación NS2. Se simuló una red basada en una zona residencial con 47 residencias, con un nodo para cada residencia y una estación base, situada a unos 25 metros de los otros nodos. Muchos parámetros, tales como la pérdida de paquetes, rendimiento, retardo, jitter y el consumo de energía se probaron. La red se incrementó a 78 y 93 nodos con el fin de evaluar el comportamiento de los protocolos de redes más grandes. Las pruebas demostraron que el HTR es el protocolo de enrutamiento que tiene los mejores resultados en el rendimiento y el segundo mejor en el consumo de energía. El DSDV tuvo el peor desempeño de acuerdo a las pruebas.Palabras clave.- redes inteligentes, análisis de calidad de servicio, redes de sensores inalámbricas, protocolos de enrutamiento.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Reges Bessa, Carlos Deyvinson, Rodrigo Soares Semente, Xiankleber Cavalcante Benjamim, Talison Augusto Correia de Melo, Felipe Denis Mendonça de Oliveira, Daniel Holanda Noronha, Antônio Eduardo de Morais Silva, André Laurindo Maitelli, and Andrés Ortiz Salazar. "PERFORMANCE EVALUATION ANALYSIS OF WIRELESS SENSOR NETWORKS ROUTING PROTOCOLS IN SMART GRIDS." Revista Cientifica TECNIA 26, no. 1 (November 28, 2016): 17. http://dx.doi.org/10.21754/tecnia.v26i1.2.

Повний текст джерела
Анотація:
ABSTRACTThis work aims to study which wireless sensor network routing protocol is more suitable for Smart Grids applications, through simulation of AODV protocols, AOMDV, DSDV and HTR in the NS2 simulation environment. Was simulated a network based on a residential area with 47 residences, with one node for each residence and one base station, located about 25m from the other nodes. Many parameters, such as packet loss, throughput, delay, jitter and energy consumption were tested. The network was increased to 78 and 93 nodes in order to evaluate the behavior of the protocols in larger networks. The tests proved that the HTR is the routing protocol that has the best results in performance and second best in energy consumption. The DSDV had the worst performance according to the tests.Keywords.- Smart grid, QoS analysis, Wireless sensor networks, Routing protocols.RESUMENEste trabajo tiene como objetivo estudiar el protocolo de enrutamiento de la red de sensores inalámbricos es más adecuado para aplicaciones de redes inteligentes, a través de la simulación de protocolos AODV, AOMDV, DSDV y HTR en el entorno de simulación NS2. Se simuló una red basada en una zona residencial con 47 residencias, con un nodo para cada residencia y una estación base, situada a unos 25 metros de los otros nodos. Muchos parámetros, tales como la pérdida de paquetes, rendimiento, retardo, jitter y el consumo de energía se probaron. La red se incrementó a 78 y 93 nodos con el fin de evaluar el comportamiento de los protocolos de redes más grandes. Las pruebas demostraron que el HTR es el protocolo de enrutamiento que tiene los mejores resultados en el rendimiento y el segundo mejor en el consumo de energía. El DSDV tuvo el peor desempeño de acuerdo a las pruebas.Palabras clave.- redes inteligentes, análisis de calidad de servicio, redes de sensores inalámbricas, protocolos de enrutamiento.
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Protools"

1

Gullová, Soňa. "Společenská etiketa, obchodní a diplomatický protokol." Doctoral thesis, Vysoká škola ekonomická v Praze, 2005. http://www.nusl.cz/ntk/nusl-77056.

Повний текст джерела
Анотація:
The goal of this Thesis is to uncover, characterize, analyze, describe and define selected contemporary rules of etiquette, international business and diplomatic protocol in international business and diplomatic practice and point out the greatest deficiencies witnessed in practice. The research subject of this Thesis is, thus, the formal aspect of international business and diplomatic cooperation. Its output consists of recommendation on how to correctly apply these rules in practice. I would also like my paper to significantly contribute to the general knowledge of this fascinating and commonly useful knowledge. The structure of the Thesis as it was drawn up in context of its goals consists of three main chapters, introduction and conclusion. The first part of the Thesis deals with Social Etiquette. This part is not conceived as general rules of social intercourse. Instead, it concentrates mainly on the elaboration of contemporary general rules of social intercourse and etiquette to in the context of business and entrepreneurial activities, i.e. Business Protocol. The Thesis would also like to provide answers to the following questions: What is the current standard of social intercourse in the Czech Republic? What are the contemporary rules of social intercourse in the Czech Republic and how do they differ from the etiquette abroad? Can we claim that these rules are being observed? What leads our managers, businessman, diplomats etc. to observing these rules? In my Thesis I strive to evaluate contemporary rules applicable to social, business and diplomatic events as well as in written communication and to draw attention the lack of their knowledge. Another partial goal of the Thesis consists of using carried out analyses, evaluations, inquiries via questionnaires and comparative analyses to point out the differences in the rules of social intercourse, conduct and negotiation in different territories. The working hypothesis of this part of the paper is to indicate on the basis of the above mentioned allegations the relationship between the behaviour and conduct of managers of different provenience and the fact that they have different cultural background. Culture is learned not inherited. It is derived from the social environment not from genes and it must be clearly distinguished from human character and the character of individual people. Significant attention is, therefore, paid to the study of international customs and conventions, especially those of the countries which the representatives of Czech firms, enterprises and institutions most come into contact with. The presented Thesis does not have the ambition to come up with a definitive cookbook as to how to conduct oneself in a given situation within a given territory; it merely strives to point out the pitfalls, misunderstandings and blunders in conduct and barriers in communication and in business or any other professional negotiations. Unlike legal acts the rules of Etiquette are not binding. Laws apply to all and the state prosecutes their infringement. Unlike laws, the rules of Etiquette are not enforceable. Their only form of enforcement is the social pressure which the society effectuates on the individual. Thus, the standards of social conduct only apply to those willing to abide by them. The presented paper is an aggregate of the rules and its author's views. Another author's standpoint may differ. The second part of the Thesis concentrates on the sphere of Diplomatic Protocol in international business and diplomatic practice. The presented paper aims at describing the existing system of Foreign Service and diplomatic activities, presenting the diplomatic representations, consulates, missions and other representatives abroad, their functioning as well as their immunities and privileges. Diplomatic Protocol concerns the formal, not the material, content of international relations. Formal rules of social conduct in intercourse with diplomatic representatives of other countries, the etiquette and the ceremonies applied to the intercourse with these representatives form an integral part of the Diplomatic Protocol. In the initial part I define the very term Diplomatic Protocol and I strive to specify is subject. Successively I address individual respective parts of Diplomatic Protocol and diplomatic practice, such as the methods of establishing diplomatic relationships, the roles of diplomatic missions, ranks of diplomatic representatives and their immunities and privileges, the procedure related to the conferment of agrément and the termination of activity of the head of a diplomatic mission, official visits of foreign guests, organisation of international conferences, diplomatic correspondence, consular activities etc. In the course of its elaboration the presented Thesis should also offer answers to the following questions: What is the current international form, role and significance of the Diplomatic Protocol? What leads states to observing signed conventions? Which diplomatic immunities and privileges are at the moment among the most abused or violated? For the accomplishment of the goals set out in this Thesis I shall strive to outline the scale of theoretic approaches and based on the effective layout and international practice express my own conclusions. Among others, the paper also aims at promoting the development of skills of the current diplomat and acquainting them with the norms of diplomatic correspondence. The aforementioned part of the Thesis also sets out another rather easily attained objective: due to the inexistence of comprehensive publications on this topic to become a handbook and reference manual not only for the young adepts of this profession but for all who for some reason take interest in Diplomacy. It was an ambition of the author to assemble and explain terms, which those interested in the practical aspects of Foreign Service, may be confronted with. The paper reflects current diplomatic practice and takes into account Czech circumstances. The author is endeavouring to mediate the information and knowledge she gained through years of practice at representative offices abroad gained during her practical experience at the Ministry of Foreign Affairs and through more than 20 years of practice in academic research and instruction of this area.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Jelinski, Olaf [Verfasser]. "Diplomatisches Protokoll versus Corporate Protocol : Das internationale diplomatische Protokoll im Vergleich zum Protokoll in Unternehmen. Eine Analyse des Protokolls als politische Institution / Olaf Jelinski." Frankfurt a.M. : Peter Lang GmbH, Internationaler Verlag der Wissenschaften, 2017. http://d-nb.info/114209703X/34.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Bandyopadhyay, Amrit. "The smart stone protocol (SSP) design and protocols /." College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3953.

Повний текст джерела
Анотація:
Thesis (M.S.) -- University of Maryland, College Park, 2006.
Thesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Ondráček, David. "Databáze specifikací bezpečnostních protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2008. http://www.nusl.cz/ntk/nusl-235438.

Повний текст джерела
Анотація:
Original protocols, which were created during early development of computer networks, no longer provide sufficient security. This is the reason why new protocols are developed and implemented. The important component of this process is formal verification, which is used to analyze the developed protocols and check whether a successful attack is possible or not. This thesis presents selected security protocols and tools for their formal verification. Further, the selected protocols are specified in LySa calculus and results of their analysis using LySatool are presented and discussed.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Albuquerque, Edison de Queiroz. "Um protocolo multicast bi-direcional para educação a distancia." [s.n.], 2005. http://repositorio.unicamp.br/jspui/handle/REPOSIP/260530.

Повний текст джерела
Анотація:
Orientador: Hugo Enrique Hernandez Figueroa
Tese (doutorado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de Computação
Made available in DSpace on 2018-08-05T07:05:01Z (GMT). No. of bitstreams: 1 Albuquerque_EdisondeQueiroz_D.pdf: 2450262 bytes, checksum: 1142d9b235574921d845ac5246fbe250 (MD5) Previous issue date: 2005
Resumo: Este trabalho está baseado em uma experiência real, vivida no dia-a-dia do nosso trabalho na Empresa Brasileira de Telecomunicações S.A, EMBRATEL, quando da busca de ferramentas capazes de viabilizar o permanente treinamento dos Consultores Técnicos da empresa, localizados em diferentes partes do nosso país, em face da escassez de recursos financeiros e de tempo. Para tanto, iniciamos com uma retrospectiva histórica da Educação a Distância no mundo, seu presente e suas tendências visíveis. Depois, apresentamos uma descrição dos protocolos multicasting existentes, seguido de nossa proposta. Apresentamos, também, uma simulação usando o Simulador ns-2 de maneira a comprovar o correto funcionamento do protocolo proposto e avaliar seu desempenho. O núcleo desta tese é a proposta de um novo protocolo multicasting, elemento essencial para a otimização da rede de suporte, um imperativo para a eficiência de seu funcionamento e, principalmente, da diminuição de seu custo, tendo em vista a situação ideal de se transmitir voz e vídeo para garantir que uma aula a distância será o mais próximo possível de uma aula presencial, conforme aponta o resultado de pesquisas referenciadas no presente texto, uma vez que vídeo é uma aplicação que demanda grande largura de banda
Abstract: This work is based on a real life situation, experienced in our daily work at Empresa Brasileira de Telecomunicações S.A, EMBRATEL, when pursuing tools that would allow the continuous training of its staff of Technical Consultants. The Technical Consultants were spread all over Brasil, a country of continental dimensions. Time and cost were obstac1es to achieve the above mentioned training. This thesis starts providing a short account of the historical milestones on Distance Learning. We added considerations on the state-of-the-art and scenarios of future developments, which were drawn taking into account social and economical policies. Routing and existing multicasting protocols are described and compared with the bidirectional multicast protocol proposed in this thesis. The main purpose of this thesis is the proposal of a new Multicasting Protocol, to support a new concept on which a teacher can be a student on a different subject by taking into account that we aim a Distance Learning environment inside a corporation. The ns-2 Simulator is used to simulate the perfect operation of the proposed protocol and evaluate its performance. The use of video is mandatory in order to achieve a maximum efficiency at c1ass. The rapid switching of video transmission from the teacher to a remote student that asks a question (so that all other students spread around the country can also see who is asking) and back to the teacher is mandatory and is what motivated the development of this new Multicast Protocol
Doutorado
Telecomunicações e Telemática
Doutor em Engenharia Elétrica
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Halfar, Patrik. "Zabezpečený transportní protokol monitorovacích systémů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2010. http://www.nusl.cz/ntk/nusl-237155.

Повний текст джерела
Анотація:
This paper deals with NetFlow protocol and analysis of its properties. There is focused on confidentiality and reliability of the data's transfer. All of the solution observe requirements for lower resources of devices, and impossibility of changes in the exporter except defined parameters.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Gerault, David. "Security analysis of contactless communication protocols." Thesis, Université Clermont Auvergne‎ (2017-2020), 2018. http://www.theses.fr/2018CLFAC103.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Bareš, Jan. "Návrh protokolu hardwarového akcelerátoru náročných výpočtů nad více jádry." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2018. http://www.nusl.cz/ntk/nusl-376928.

Повний текст джерела
Анотація:
This work deals with design of communication protocol for data transmission between control computer and computing cores implemented on FPGA chips. The purpose of the communication is speeding the performance demanding software algorithms of non-stream data processing by their hardware computation on accelerating system. The work defines a terminology used for protocol design and analyses current solutions of given issue. After that the work designs structure of the accelerating system and communication protocol. In the main part the work describes the implementation of the protocol in VHDL language and the simulation of implemented modules. At the end of the work the aplication of designed solution is presented along with possible extension of this work.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Debant, Alexandre. "Symbolic verification of distance-bounding protocols : application to payment protocols." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S057.

Повний текст джерела
Анотація:
L’essor des nouvelles technologies, et en particulier la Communication en Champ Proche (NFC), a permis l’apparition de nouvelles applications. Á ce titre, nous pouvons mentionner le paiement sans contact, les clefs mains libres ou encore les carte d’abonnement dans les transports en commun. Afin de sécuriser l’ensemble de ces applications, des protocoles de sécurité, appelés protocoles délimiteurs de distance on été développés. Ces protocoles ont pour objectif d’assurer la proximité physique des appareils mis en jeu afin protocole cryptographique, protocole de paiement de limiter le risque d’attaque. Dans ce manuscrit, nous présentons diverses approches permettant une analyse formelle de ces protocoles. Dans ce but, nous proposons un modèle symbolique permettant une modélisation précise du temps ainsi que des positions dans l’espace de chaque participant. Nous proposons ensuite deux approches : la première développant une nouvelle procédure de vérification, la seconde permettant la ré-utilisation d’outils existants tels que Proverif. Tout au long de ce manuscrit, nous porterons une attention parti- culières aux protocoles de paiement sans contact
The rise of new technologies, and in particular Near Field Communication (NFC) tags, offers new applications such as contactless payments, key-less entry systems, transport ticketing... Due to their security concerns, new security protocols, called distance-bounding protocols, have been developed to ensure the physical proximity of the de- vices during a session. In order to prevent flaws and attacks, these protocols require formal verification. In this manuscript, we present several techniques that allow for an automatic verification of such protocols. To this aim, we first present a symbolic model which faithfully models time and locations. Then we develop two approaches : either ba- sed on a new verification procedure, or leveraging existing tools like Proverif. Along this manuscript, we pay a particular attention to apply our results to contactless payment protocols
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Maria, Fábio Rogério Tôrres. "Frequência dos diferentes protocolos de extrações nos tratamentos ortodônticos conduzidos na Faculdade de Odontologia de Bauru FOB-USP, nos últimos 35 anos." Universidade de São Paulo, 2010. http://www.teses.usp.br/teses/disponiveis/25/25134/tde-02062011-143725/.

Повний текст джерела
Анотація:
O presente estudo objetivou realizar um levantamento retrospectivo de todos os planejamentos ortodônticos realizados pelo Departamento de Ortodontia (FOB USP) desde 1973, para que pudessem ser avaliados os protocolos de tratamento escolhidos à época, principalmente quanto à decisão de extrações e suas freqüências. A amostra constitui-se inicialmente de 3745 documentações ortodônticas arquivadas pelo Departamento de Ortodontia, das quais 332 documentações foram descartadas seguindo alguns fatores de exclusão, tais como casos transferidos, desistências e informações e exames incompletos. A amostra total de 3413 pacientes foi avaliada de acordo com o protocolo de tratamento escolhido, classificados como: Protocolo 0 (Sem extrações); Protocolo 1 (Extrações de 4 primeiros pré-molares); Protocolo 2 (2 primeiros pré-molares superiores e 2 segundos inferiores); Protocolo 3 (2 pré-molares superiores); Protocolo 4 (4 segundos pré-molares); Protocolo 6 (Incisivos e caninos); Protocolo 7 (Primeiros e segundos molares); Protocolo 8 (extrações atípicas); Protocolo 9 (grupo de agenesias e perdas precoces). Estes protocolos aferidos, foram então divididos em 7 grupos, definidos como 7 intervalos cronológicos a cada 5 anos: Intervalo 1 (1973-1977); Intervalo 2 (1978-1982); Intervalo 3 (1983-1987); Intervalo 4 (1988-1992); Intervalo 5 (1993-1997); Intervalo 6 (1998-2002); Intervalo 7 (2003-2007). Estes intervalos foram então comparados entre si para que as freqüências dos protocolos pudessem definir possíveis tendências predominantes a cada época testada. Os resultados demonstraram diferenças estatisticamente significantes para 7 dos 10 protocolos avaliados entre os intervalos considerados, evidenciando uma grande diferença de freqüência dos principais protocolos de tratamento ao longo destes 35 anos avaliados. Portanto conclui-se que a escolha pelos protocolos de tratamento sofreram influências de filosofias e dogmas vigentes durante os intervalos avaliados.
The purpose of this retrospective study was to evaluate all orthodontic treatment plannings conducted at the Orthodontic Department at Bauru Dental School, University of São Paulo, since 1973, in order to investigate extraction and nonextraction frequency protocols selected at each considered period. The sample comprised initially 3745 records of treated patients, that according to exclusion criteria, reduced the final sample to 3413 documentations. This total sample was evaluated according to the protocol choice, being divided into 10 groups: Protocol 0 (nonextraction group); Protocol 1 (4-first premolar extractions); Protocol 2 (2-maxillary first and 2-mandibular second premolar extractions); Protocol 3 (2-maxillary premolar extractions); Protocol 4 (4-second premolar extractions); Protocol 5 (asymmetric premolar extractions); Protocol 6 (incisor and canine extractions); Protocol 7 (first and second molar extractions); Protocol 8 (atypical extractions) and Protocol 9 (agenesis and previously missing teeth group). These 3413 obtained protocols were divided into seven 5-year intervals: Interval 1 (1973-1977); Interval 2 (1978-1982); Interval 3 (1983-1987); Interval 4 (1988-1992); Interval 5 (1993-1997); Interval 6 (1998-2002); Interval 7 (2003-2007). The frequency of each protocol was compared among the 7 intervals, using the Proportion Test, in order to identify some predominant trends at each tested period. The results showed that 7 frequency protocols were significantly different among the 7 considered intervals, evidencing that the protocols choice was influenced by some dominant philosophies or dogmas during the evaluated periods.
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Protools"

1

Spiropoulos, George. Computer network protocols and protocol proving. Birmingham: University of Birmingham, 1988.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

WAP: A beginner's guide. New York: Osborne/McGraw-Hill, 2001.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

R, Wright Gary, ed. TCP/IP illustrated. Reading, Mass: Addison-Wesley Pub. Co., 1994.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Richard, Stevens W., ed. TCP/IP illustrated, volume 1. 2nd ed. Upper Saddle River, NJ: Addison-Wesley, 2012.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

BGP4: Inter-domain routing in the Internet. Reading, Mass: Addison Wesley, 1999.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Cruz, Frank Da. Kermit, a file transfer protocol. Bedford, Mass: Digital Press, 1987.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Huq, Masum. Effective WAP. San Francisco, Calif: No Starch Press, 2001.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Expert Network Time Protocol. Berkeley: Apress, 2005.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Naugle, Matthew G. Network protocol handbook. New York: McGraw-Hill, 1994.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Marshall, Wilensky, ed. TCP/IP for Dummies. 6th ed. Hoboken: For Dummies [Imprint], 2009.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Protools"

1

Choi, Joonwon, Adam Chlipala, and Arvind. "Hemiola: A DSL and Verification Tools to Guide Design and Proof of Hierarchical Cache-Coherence Protocols." In Computer Aided Verification, 317–39. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13188-2_16.

Повний текст джерела
Анотація:
AbstractCache-coherence protocols have been one of the greatest challenges in formal verification of hardware, due to their central complication of executing multiple memory-access transactions concurrently within a distributed message-passing system. In this paper, we introduce Hemiola, a framework embedded in Coq that guides the user to design protocols that never experience inconsistent interleavings while handling transactions concurrently. The framework provides a DSL, where any protocol designed in the DSL always satisfies the serializability property, allowing a user to verify the protocol assuming that transactions are executed one-at-a-time. Hemiola also provides a novel invariant proof method, for protocols designed in Hemiola, that only requires considering execution histories without interleaved memory accesses. We used Hemiola to design and prove hierarchical MSI and MESI protocols as case studies. We also demonstrated that the case-study protocols are hardware-synthesizable, by using a compilation/synthesis toolchain targeting FPGAs.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Gu, Xiang, and Jianlin Qiu. "Describing Protocol Elements and Protocols with RSL." In Lecture Notes in Electrical Engineering, 741–48. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-26001-8_94.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Lewis, J. A. "Statistical Standards for Protocols and Protocol Deviations." In Cancer Clinical Trials, 27–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 1988. http://dx.doi.org/10.1007/978-3-642-83419-6_4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Balasubramanian, A. R., Javier Esparza, and Mikhail Raskin. "Finding Cut-Offs in Leaderless Rendez-Vous Protocols is Easy." In Lecture Notes in Computer Science, 42–61. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71995-1_3.

Повний текст джерела
Анотація:
AbstractIn rendez-vous protocols an arbitrarily large number of indistinguishable finite-state agents interact in pairs. The cut-off problem asks if there exists a number B such that all initial configurations of the protocol with at least B agents in a given initial state can reach a final configuration with all agents in a given final state. In a recent paper [17], Horn and Sangnier prove that the cut-off problem is equivalent to the Petri net reachability problem for protocols with a leader, and in "Image missing" for leaderless protocols. Further, for the special class of symmetric protocols they reduce these bounds to "Image missing" and "Image missing" , respectively. The problem of lowering these upper bounds or finding matching lower bounds is left open. We show that the cut-off problem is "Image missing" -complete for leaderless protocols, "Image missing" -complete for symmetric protocols with a leader, and in "Image missing" for leaderless symmetric protocols, thereby solving all the problems left open in [17].
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Issariyakul, Teerawat, and Ekram Hossain. "Transport Control Protocols Part 2: Transmission Control Protocol." In Introduction to Network Simulator NS2, 229–72. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4614-1406-3_10.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Yang, Ke, Meihua Xiao, Zifan Song, and Ri Ouyang. "Deriving Security Protocols Based on Protocol Derivation System." In Communications in Computer and Information Science, 172–84. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1877-2_12.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Khurana, Surinder, and Manmeet Singh. "Vampire Attacks in Wireless Ad-hoc Networks." In Advances in Wireless Technologies and Telecommunication, 462–81. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0501-3.ch019.

Повний текст джерела
Анотація:
The advancements made in the field of wireless networks have led the technology to the use of wireless ad-hoc networks in mainstream routines. The performance of these networks is heavily depends on routing protocols. Various routing protocols have been proposed. However, these protocols are prone to various type of attacks. This chapter discusses the vampire attack that is a risk to the energy resources of the wireless ad-hoc networks which drain the energy of the network by sending protocol compliant messages. In this chapter, we identify various categories of vampire attacks. This chapter discusses a secure sensor routing protocol designed to be invulnerable to various attacks but its topology discovery phase is vulnerable to the vampire attacks. This chapter also presents a modification to the protocol's topology discovery phase to detect the nodes performing vampire attacks and prevent the network from these attacks.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

"Networking Fundamentals." In Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention, 106–18. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7628-0.ch004.

Повний текст джерела
Анотація:
This chapter introduces to basics of computer networking and associated widely used essential networking communication protocols. The chapter provides the comparison of OSI and TCP model along with details of internet layer protocols including internet protocol (IP), IP addressing schemes, internet control messaging protocol (ICMP), etc. Next, the chapter discusses transport layer protocols transmission control protocol (TCP) and user datagram protocol (UDP) in detail. Application layer protocols including dynamic host control protocol (DHCP), secure shell (SSH), file transfer protocol (FTP), trivial FTP (TFTP), simple network management protocol (SNMP), hyper text transfer protocol secure (HTTPS), network time protocol (NTP), domain name system (DNS), and simple mail transfer protocol (SMTP) are also explained in this chapter. One just cannot attack a networking protocol without knowing how it works. Having a solid introduction about computer networking and network protocols is fundamental in the ethical hacking world. This chapter quickly revisits all essential concepts related to computer networking.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Henderson, Andrea, David Levine, Darryl Millis, and Marti Drum. "Protocol Development and Protocols." In Canine Rehabilitation and Physical Therapy, 669–729. Elsevier, 2014. http://dx.doi.org/10.1016/b978-1-4377-0309-2.00038-7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

"Protocols and Protocol Deviations." In Introduction to Randomized Controlled Clinical Trials, Second Edition, 183–91. Chapman and Hall/CRC, 2006. http://dx.doi.org/10.1201/9781420011302.ch10.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Protools"

1

"Organization – ProTools 2020." In 2020 IEEE/ACM International Workshop on HPC User Support Tools (HUST) and Workshop on Programming and Performance Visualization Tools (ProTools). IEEE, 2020. http://dx.doi.org/10.1109/hustprotools51951.2020.00007.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

"Message from the ProTools 2019 Workshop Chairs." In 2019 IEEE/ACM International Workshop on Programming and Performance Visualization Tools (ProTools). IEEE, 2019. http://dx.doi.org/10.1109/protools49597.2019.00004.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

"Message from the ProTools 2021 Workshop Chairs." In 2021 IEEE/ACM International Workshop on Programming and Performance Visualization Tools (ProTools). IEEE, 2021. http://dx.doi.org/10.1109/protools54808.2021.00004.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

"Message from the ProTools 2020 Workshop Chairs." In 2020 IEEE/ACM International Workshop on HPC User Support Tools (HUST) and Workshop on Programming and Performance Visualization Tools (ProTools). IEEE, 2020. http://dx.doi.org/10.1109/hustprotools51951.2020.00005.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

"[Title page]." In 2019 IEEE/ACM International Workshop on Programming and Performance Visualization Tools (ProTools). IEEE, 2019. http://dx.doi.org/10.1109/protools49597.2019.00001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

"[Copyright notice]." In 2019 IEEE/ACM International Workshop on Programming and Performance Visualization Tools (ProTools). IEEE, 2019. http://dx.doi.org/10.1109/protools49597.2019.00002.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

"Table of contents." In 2019 IEEE/ACM International Workshop on Programming and Performance Visualization Tools (ProTools). IEEE, 2019. http://dx.doi.org/10.1109/protools49597.2019.00003.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

"Organization." In 2019 IEEE/ACM International Workshop on Programming and Performance Visualization Tools (ProTools). IEEE, 2019. http://dx.doi.org/10.1109/protools49597.2019.00005.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Zhang, Hui, and Jeffrey Hollingsworth. "Understanding the Performance of GPGPU Applications from a Data-Centric View." In 2019 IEEE/ACM International Workshop on Programming and Performance Visualization Tools (ProTools). IEEE, 2019. http://dx.doi.org/10.1109/protools49597.2019.00006.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Cruz, Miguel Tairum, Daniel Ruiz, and Roxana Rusitoru. "Asvie: A Timing-Agnostic SVE Optimization Methodology." In 2019 IEEE/ACM International Workshop on Programming and Performance Visualization Tools (ProTools). IEEE, 2019. http://dx.doi.org/10.1109/protools49597.2019.00007.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Protools"

1

Williams, C., P. F. Reynolds, and B. de Supinoki. Delta Coherence Protocols: The Home Update Protocol. Office of Scientific and Technical Information (OSTI), July 2000. http://dx.doi.org/10.2172/793578.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Tubesing, Philip. Protocols for Uranium Carbon Analysis - Testing Protocol Summary. Office of Scientific and Technical Information (OSTI), May 2021. http://dx.doi.org/10.2172/1783513.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Eastlake, D. The Protocol versus Document Points of View in Computer Protocols. RFC Editor, October 2004. http://dx.doi.org/10.17487/rfc3930.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Quak, Evert-jan. Lessons Learned from Community-based Management of Acute Malnutrition (CMAM) Programmes that Operate in Fragile or Conflict Affected Settings. Institute of Development Studies (IDS), September 2021. http://dx.doi.org/10.19088/k4d.2021.133.

Повний текст джерела
Анотація:
This rapid review synthesises the literature on how community-based management of acute malnutrition (CMAM) programmes could be adapted in settings of conflict and fragility. It identifies multiple factors affecting the quality and effectiveness of CMAM services including the health system, community engagement and linkages with other programmes, including education, sanitation, and early childhood development. Family MUAC (Mid-Upper Arm Circumference) is a useful tool to increase community participation and detect early cases of moderate acute malnutrition (MAM) and severe acute malnutrition (SAM) more effectively and less likely to require inpatient care. The literature does not say a lot about m-Health solutions (using mobile devises and applications) in data collection and surveillance systems. Many of the above-mentioned issues are relevant for CMAM programmes in settings of non-emergency, emergency, conflict and fragility. However, there are special circumstance in conflict and fragile settings that need adaptation and simplification of the standard protocols. Because of a broken or partly broken health system in settings of conflict and fragility, local governments are not able to fund access to adequate inpatient and outpatient treatment centres. NGOs and humanitarian agencies are often able to set up stand-alone outpatient therapeutic programmes or mobile centres in the most affected regions. The training of community health volunteers (CHVs) is important and implementing Family MUAC. Importantly, research shows that: Low literacy of CHVs is not a problem to achieve good nutritional outcomes as long as protocols are simplified. Combined/simplified protocols are not inferior to standard protocols. However, due to complexities and low funding, treatment is focused on SAM and availability for children with MAM is far less prioritised, until they deteriorate to SAM. There is widespread confusion about combined/simplified protocol terminology and content, because there is no coherence at the global level.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Pstuty, Norbert, Mark Duffy, Dennis Skidds, Tanya Silveira, Andrea Habeck, Katherine Ames, and Glenn Liu. Northeast Coastal and Barrier Network Geomorphological Monitoring Protocol: Part I—Ocean Shoreline Position, Version 2. National Park Service, June 2022. http://dx.doi.org/10.36967/2293713.

Повний текст джерела
Анотація:
Following a review of Vital Signs – indicators of ecosystem health – in the coastal parks of the Northeast Coastal and Barrier Network (NCBN), knowledge of shoreline change was ranked as the top variable for monitoring. Shoreline change is a basic element in the management of any coastal system because it contributes to the understanding of the functioning of the natural resources and to the administration of the cultural resources within the parks. Collection of information on the vectors of change relies on the establishment of a rigorous system of protocols to monitor elements of the coastal geomorphology that are guided by three basic principles: 1) all of the elements in the protocols are to be based on scientific principles; 2) the products of the monitoring must relate to issues of importance to park management; and 3) the application of the protocols must be capable of implementation at the local level within the NCBN. Changes in ocean shoreline position are recognized as interacting with many other elements of the Ocean Beach-Dune Ecosystem and are thus both driving and responding to the variety of natural and cultural factors active at the coast at a variety of temporal and spatial scales. The direction and magnitude of shoreline change can be monitored through the application of a protocol that tracks the spatial position of the neap-tide, high tide swash line under well-defined conditions of temporal sampling. Spring and fall surveys conducted in accordance with standard operating procedures will generate consistent and comparable shoreline position data sets that can be incorporated within a data matrix and subsequently analyzed for temporal and spatial variations. The Ocean Shoreline Position Monitoring Protocol will be applied to six parks in the NCBN: Assateague Island National Seashore, Cape Cod National Seashore, Fire Island National Seashore, Gateway National Recreation Area, George Washington Birthplace National Monument, and Sagamore Hill National Historic Site. Monitoring will be accomplished with a Global Positioning System (GPS )/ Global Navigation Satellite System (GNSS) unit capable of sub-meter horizontal accuracy that is usually mounted on an off-road vehicle and driven along the swash line. Under the guidance of a set of Standard Operating Procedures (SOPs) (Psuty et al., 2022), the monitoring will generate comparable data sets. The protocol will produce shoreline change metrics following the methodology of the Digital Shoreline Analysis System developed by the United States Geological Survey. Annual Data Summaries and Trend Reports will present and analyze the collected data sets. All collected data will undergo rigorous quality-assurance and quality-control procedures and will be archived at the offices of the NCBN. All monitoring products will be made available via the National Park Service’s Integrated Resource Management Applications Portal.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Galvin, J., and K. McCloghrie. Security Protocols for version 2 of the Simple Network Management Protocol (SNMPv2). RFC Editor, April 1993. http://dx.doi.org/10.17487/rfc1446.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Harrington, D. Guidelines for Considering Operations and Management of New Protocols and Protocol Extensions. RFC Editor, November 2009. http://dx.doi.org/10.17487/rfc5706.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Meadows, Catherine. Extending Formal Cryptographic Protocol Analysis Techniques for Group Protocols and Low-Level Cryptographic Primitives. Fort Belvoir, VA: Defense Technical Information Center, January 2000. http://dx.doi.org/10.21236/ada464085.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Enlow, Michelle Bosquet, Richard J. Chung, Melissa A. Parisi, Sharon K. Sagiv, Margaret A. Sheridan, Annemarie Stroustrup, Rosalind J. Wright, et al. Standard Measurement Protocols for Pediatric Development Research in the PhenX Toolkit. RTI Press, September 2022. http://dx.doi.org/10.3768/rtipress.2022.mr.0049.2209.

Повний текст джерела
Анотація:
A challenge in conducting pediatric research is selecting reliable, valid measurement protocols, across a range of domains, that are appropriate for the developmental level of the study population. The purpose of this report is to introduce the research community to the Pediatric Development Research Domain of the National Institutes of Health (NIH)–supported PhenX Toolkit (consensus measures for Phenotypes and eXposures). The PhenX Toolkit provides a catalog of recommended measurement protocols to address a wide range of research topics that are suitable for inclusion in a variety of study designs. In 2018, the Pediatric Development Working Group of experts identified 18 well-established protocols of pediatric development for inclusion in the Toolkit to complement existing protocols. Collectively, the protocols assess parenting, child care attendance and quality, peer relationships, home environment, neonatal abstinence, emotional and behavioral functioning, and other factors that influence child development. The Toolkit provides detailed data collection protocols, data dictionaries, and worksheets to help investigators incorporate these protocols into their study designs. Using standard protocols in studies with pediatric participants will support consistent data collection, improve data quality, and facilitate cross-study analyses to ultimately improve child health.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Casado-Trigo, Manuel. Reseña: Historia del ceremonial y del protocolo/ Review:History of Ceremonial and Protocol. Revista Internacional de Relaciones Públicas, December 2016. http://dx.doi.org/10.5783/rirp-12-2016-13-231-236.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії