Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "protocol" wg kryterium: Temat


Tytuł:
The safety of modern and traditional communication protocols in vehicles
Autorzy:
Sumorek, A.
Powiązania:
https://bibliotekanauki.pl/articles/411414.pdf
Data publikacji:
2016
Wydawca:
Polska Akademia Nauk. Oddział w Lublinie PAN
Tematy:
Vehicle Communication Protocol
Protocol Safety
Opis:
Communication infrastructure of vehicles sub-assemblies has undergone three phases of development. The first phase was initiated by the need to reduce emission levels. The function of vehicle sub-assemblies health monitoring was introduced simultaneously. This phase took place in the 70s and 80s of the 20th century. The second phase was focused on the elimination of redundant sensors and implementation of new functions of the vehicle. This phase has been particularly noticeable since the beginning of the 21st century. At the moment, there are 2 directions of development. On the one hand, the works are being continued in the scope of autonomous movement of vehicle and, on the otherhand multimedia solutions are being introduced in order to make the time spent in a vehicle more attractive (multimedia, the Internet, …). The present study is focused on the mechanisms of protection applied in communication protocols used in vehicles. Furthermore, it contains the classification of communication methods, characteristics of the basic methods of protection incorporated in the described protocols and the practical cases of security breach. Therefore, it is possible to answer the question why it is possible for third persons to interfere into the communication network of a vehicle and to indicate potential methods of protection against the functioning disturbance in such communication networks.
Źródło:
ECONTECHMOD : An International Quarterly Journal on Economics of Technology and Modelling Processes; 2016, 5, 3; 19-26
2084-5715
Pojawia się w:
ECONTECHMOD : An International Quarterly Journal on Economics of Technology and Modelling Processes
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Assessment of RIP-V1 and OSPF-V2 protocol with consideration of convergence criteria and sending protocols traffic
Autorzy:
Jelodar, H
Nikravesh, P
Powiązania:
https://bibliotekanauki.pl/articles/102613.pdf
Data publikacji:
2014
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
dynamic routing protocols
OSPF protocol
RIP protocol
Opis:
Routing Protocols are underlying principles in networks like internet, transport and mobile. Routing Protocols include a series of rules and algorithms that consider routing metric and select the best way for sending healthy data packets from origin to destination. Dynamic routing protocol compatible to topology has a changeable state. RIP and OSPF are dynamic routing protocol that we consider criteria like convergence and sending protocols traffic assessment RIP first version and OSPF second version. By the test we have done on OPNET stimulation we understood that the OSPF protocol was more efficient than RIP protocol.
Źródło:
Advances in Science and Technology. Research Journal; 2014, 8, 21; 1-4
2299-8624
Pojawia się w:
Advances in Science and Technology. Research Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Improved Framework for Blockchain Application Using Lattice Based Key Agreement Protocol
Autorzy:
Oleiwi, Zahraa Ch.
Dihin, Rasha Ai
Alwan, Ali H.
Powiązania:
https://bibliotekanauki.pl/articles/2200725.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
key agreement protocol
lattice based protocol
mutual authentication
Diffie-Hellman protocol
forward secrecy
Opis:
One of the most recent challenges in communication system and network system is the privacy and security of information and communication session. Blockchain is one of technologies that use in sensing application in different important environments such as healthcare. In healthcare the patient privacy should be protected use high security system. Key agreement protocol based on lattice ensure the authentication and high protection against different types of attack especially impersonation and man in the middle attack where the latticebased protocol is quantum-withstand protocol. Proposed improved framework using lattice based key agreement protocol for application of block chain, with security analysis of many literatures that proposed different protocols has been presented with comparative study. The resultant new framework based on lattice overcome the latency limitation of block chain in the old framework and lowered the computation cost that depend on Elliptic curve Diffie-Hellman. Also, it ensures high privacy and protection of patient’s information.
Źródło:
International Journal of Electronics and Telecommunications; 2023, 69, 1; 5--10
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Etiquette, Diplomatic Protocol and Savoir-Vivre as the Code of Conduct for Police Officers
Autorzy:
Bekulard, Beata
Powiązania:
https://bibliotekanauki.pl/articles/1375134.pdf
Data publikacji:
2020
Wydawca:
Wyższa Szkoła Policji w Szczytnie
Tematy:
etiquette
protocol
diplomatic protocol
ceremonial protocol
savoir-vivre
uniformed services
law enforcement officer
Opis:
Principles of good manners are associated with courtesy, politeness, tact, good behaviour standards, or savoir-vivre. They include a set of specific rules of conduct that are approved of by a given community. Because courtesy plays an important role in shaping interpersonal relations, the knowledge of etiquette by officers of the services subordinate to and supervised by the Minister of the Internal Affairs and Administration in Poland is the basis for functioning in day-to-day service. Unfortunately, the notions and principles of etiquette are often confused with the principles of an official ceremonial protocol in business pragmatics. This article features the basic principles which should be followed, and not only by every police officer. After all, ignorance of the rules of protocol may lead to our being ridiculed, along with the force which we represent, both in professional and private life.
Źródło:
Internal Security; 2020, 12(2); 287-300
2080-5268
Pojawia się w:
Internal Security
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
To nie był protokół Modbus RTU
Autorzy:
Caban, D.
Powiązania:
https://bibliotekanauki.pl/articles/118426.pdf
Data publikacji:
2017
Wydawca:
Politechnika Koszalińska. Wydawnictwo Uczelniane
Tematy:
PLC
protokół komunikacyjny
ramka protokołu
communication protocol
protocol frame
Opis:
In one of previous Research Notes of the Faculty Electronics and Computer Science of the Koszalin University of Technology the article about implementation of Modbus protocol for communication with PLC from one manufacturer was published. The structure of protocol frame, with command for the PLC, was depicted on one of figures. The specific characters were delimiters of the frame. It means that this protocol isn't a Modbus protocol, because other delimiters of the frame are used in the Modbus protocol. Also other elements of the frame are pointing to it.
W jednym z poprzednich numerów Zeszytów Naukowych Wydziału Elektroniki i Informatyki Politechniki Koszalińskiej ukazał się artykuł na temat implementacji protokołu Modbus dla komunikacji ze sterownikiem pewnej firmy. Na jednym z rysunków została przedstawiona budowa ramki tego protokołu, zawierającej polecenie dla sterownika. Znacznikami początku i końca ramki są znaki o ustalonych kodach. To świadczy o tym, że ten protokół nie jest protokołem Modbus, w którym jest stosowana inna zasada zaznaczania granic ramki. Wskazują na to też inne elementy ramki.
Źródło:
Zeszyty Naukowe Wydziału Elektroniki i Informatyki Politechniki Koszalińskiej; 2017, 11; 141-143
1897-7421
Pojawia się w:
Zeszyty Naukowe Wydziału Elektroniki i Informatyki Politechniki Koszalińskiej
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Badanie ultrasonograficzne według protokołów FAST i eFAST
Ultrasound examination according to protocols FAST and eFAST
Autorzy:
Fedak, Andrzej
Świętoń, Faustyna
Powiązania:
https://bibliotekanauki.pl/articles/985964.pdf
Data publikacji:
2019
Wydawca:
Indygo Zahir Media
Tematy:
protokół FAST
protokół eFAST
ultrasonografia
FAST protocol
eFAST protocol
ultrasound
Opis:
W artykule przedstawiono procedurę badania ultrasonografi cznego FAST oraz eFAST.
The ultrasound examination procedure FAST and eFAST is presented in the article.
Źródło:
Inżynier i Fizyk Medyczny; 2019, 8, 3; 163-165
2300-1410
Pojawia się w:
Inżynier i Fizyk Medyczny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
With using fuzzy logic in the MANET
Autorzy:
Jelodar, H
Aramideh, J
Powiązania:
https://bibliotekanauki.pl/articles/102997.pdf
Data publikacji:
2014
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
AODV routing protocol
DSDV routing protocol
fuzzy expert system
MANET
Opis:
Mobile ad hoc networks have consisted of the nodes which are freely displaced. In other words, this network has dynamic topology. Routing protocols find route of forwarding data packets from the source node to the destination node. A routing protocol plays important role in finding the shortest time and the route path. In this paper, considering significance of the subject, attempt has been made to present a model using fuzzy logic approach to evaluate and compare two routing protocols i.e. AODV DSDV using effective factor of the number of nodes based on 2 outputs of delay and throughput rate (totally fuzzy system with four outputs) in order to select one of these two routing protocols properly under different conditions and based on need and goal. To show efficiency and truth of fuzzy system, two protocols have been evaluated completely equally using NS-2 simulator and attempt has been made to prove efficiency of the designed fuzzy system by comparing results of simulation of fuzzy system and NS-2 software.
Źródło:
Advances in Science and Technology. Research Journal; 2014, 8, 22; 19-25
2299-8624
Pojawia się w:
Advances in Science and Technology. Research Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
ARPNetSteg : Network Steganography Using Address Resolution Protocol
Autorzy:
Bedi, Punam
Dua, Arti
Powiązania:
https://bibliotekanauki.pl/articles/1844471.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
network steganography
ARP steganography
covert channel
Address Resolution Protocol
protocol steganography
Opis:
Steganography is a technique that allows hidden transfer of data using some media such as Image, Audio, Video, Network Protocol or a Document, without its existence getting noticed. Over the past few years, a lot of research has been done in the field of Image, Video and Audio Steganography but very little work has been done in Network Steganography. A Network Steganography technique hides data in a Network Data Unit, i.e., a Network Protocol Packet. In this paper we present an algorithm ARPNetSteg that implements Network Steganography using the Address resolution protocol. Our technique is a robust technique that can transfer 44 bits of covert data per ARP reply packet.
Źródło:
International Journal of Electronics and Telecommunications; 2020, 66, 4; 671-677
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Optimization Of Protocol For Biodiesel Production Of Linseed (Linum Usitatissimum L.) Oil
Autorzy:
Ullah, F.
Bano, A.
Ali, S.
Powiązania:
https://bibliotekanauki.pl/articles/779238.pdf
Data publikacji:
2013
Wydawca:
Zachodniopomorski Uniwersytet Technologiczny w Szczecinie. Wydawnictwo Uczelniane ZUT w Szczecinie
Tematy:
linseed
biodiesel
protocol
optimization
Opis:
Attempts were made to optimize variables affecting the yield of linseed oil biodiesel in a base catalyzed transesterification reaction. The variables studied were reaction temperature (40-70oC), catalyst (NaOH) concentration (0.1-1.5%) and reaction time (30-180 min). The conversion of linseed oil into methyl esters was confirmed through analytical methods like 1H NMR, gas chromatography (GC) and refractometer. The maximum biodiesel yield (97š1.045% w/w) was obtained at 0.5% catalyst concentration, 65oC temperature, 180 min reaction time and 6:1 molar ratio of methanol to oil. 1H NMR confirmed the practically obtained % conversion of triglycerides into methyl esters which was further evidenced by refractometer analyses. The refractive index of biodiesel samples was lower than pure linseed oil. GC analysis confirmed the presence of linolenic acid (C18:3) as the dominant fatty acid (68 wt. %) followed by oleic acid (C18:1), linoleic acid (C18:2) and stearic acid (C18:0) respectively. The physical properties of linseed oil biodiesel like specific gravity (0.90 g/cm3) and flash point (177oC) were higher than American Society for Testing and Materials standards (ASTM 6751) for biodiesel. However, kinematic viscosity (3.752 mm2/s) was in the range of ASTM standards.
Źródło:
Polish Journal of Chemical Technology; 2013, 15, 1; 74-77
1509-8117
1899-4741
Pojawia się w:
Polish Journal of Chemical Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analiza porównawcza protokołów BB84 oraz SARG
Comparative analysis of protocols BB84 and SARG
Autorzy:
Sobota, M.
Powiązania:
https://bibliotekanauki.pl/articles/321363.pdf
Data publikacji:
2014
Wydawca:
Politechnika Śląska. Wydawnictwo Politechniki Śląskiej
Tematy:
analiza porównawcza
protokół kwantowy
protokół BB84
protokół SARG
comparative analysis
quantum protocol
BB84 protocol
SARG protocol
Opis:
Artykuł przedstawia analizę porównawczą dwóch kwantowych protokołów uzgadniania klucza szyfrującego: BB84 oraz SARG. Protokół SARG jest rozwinięciem protokołu BB84, usuwa jego brak odporności na niedoskonałość źródła fotonów, które czasem generuje parę identycznych fotonów zamiast pojedynczego fotonu. W pracy opisano budowę obu protokołów.
Article presents comparative analysis of quantum protocols BB84 and SARG. SARG protocol is an extension of BB84 protocol, removes his lack of resistance to imperfect photon sources, which sometimes generates a pair of identical photons instead of a single photon. This paper describes the construction of these two protocols.
Źródło:
Zeszyty Naukowe. Organizacja i Zarządzanie / Politechnika Śląska; 2014, 74; 75-81
1641-3466
Pojawia się w:
Zeszyty Naukowe. Organizacja i Zarządzanie / Politechnika Śląska
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analytical review and study on multipath routing protocols
Autorzy:
More, Shivaprasad
Naik, Udaykumar
Powiązania:
https://bibliotekanauki.pl/articles/2050101.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Instytut Badań Systemowych PAN
Tematy:
multipath routing protocol
Peak Signal to Noise Ratio
geographic routing protocol
Vehicular Ad Hoc Networks
proactive routing protocol
Opis:
Vehicular Ad Hoc Networks (VANET) constitute a promising technology for Intelligent Transport Systems (ITS). VANET are highly dynamic in their nature because of the movements of vehicles, which are acting as nodes. The routing protocol must be designed for dealing with multiple limiting conditions, like link failures, handoffs, and long congestion periods, which is very challenging. The survey of different routing protocols in VANET provides a significant information for building smart ITS. Accordingly, the present survey is devoted to the existing distinct multipath routing protocols. This review article provides a detailed account on 50 research papers, presenting the different kinds of multipath routing protocols, namely proactive routing protocols, ad-hoc-based routing protocols, Greedy Perimeter Stateless Routing (GPSR), hybrid routing protocols, as well as geographic routing protocols. Besides the classification and cursory description, the present study addresses also several of the important parameters, like evaluation metrics, implementation tool, publication year, datasets utilized, Peak Signal to Noise Ratio (PSNR), and packet end-to-end delay with respect to various techniques considered. Eventually, the research gaps and issues of various multipath routing protocols are presented with the intention of pointing out directions for future research.
Źródło:
Control and Cybernetics; 2020, 49, 4; 369-391
0324-8569
Pojawia się w:
Control and Cybernetics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Study on Denial of Service Attacks in Cluster Based Web Servers
Autorzy:
Poornima, A.
Maheshwari, D.
Powiązania:
https://bibliotekanauki.pl/articles/1193575.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
DoS attacks
Flooding
Protocol
Opis:
In today’s computing world Network Security became vulnerable. As many types of attacks makes the system unsecure and reduces the performance of servers. One such attack is - Denial of Service (DoS) attacks. The drawbacks of this attacks end user application accessibility will be diminishing and the request handling capacity of the application server will drastically subsides.
Źródło:
World Scientific News; 2016, 41; 222-229
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Anatomical protocol for gait analysis: joint kinematics measurement and its repeatability
Autorzy:
Żuk, M.
Trzeciak, M.
Powiązania:
https://bibliotekanauki.pl/articles/281538.pdf
Data publikacji:
2017
Wydawca:
Polskie Towarzystwo Mechaniki Teoretycznej i Stosowanej
Tematy:
joint kinematics
gait analysis protocol
repeatability
anatomical protocol
marker-set
motion capture system
Opis:
International Society of Biomechanics has proposed a general reporting standard for joint kinematics based on anatomical reference frames. Nevertheless, the gait analysis protocols based on this standard are still poorly reported. The purpose of the current study is to propose and preliminarily assess the potential of an anatomically based ISB 6-DOF protocol, which combines the ISB reporting standard together with a marker cluster technique. The proposed technical marker set enables full description of the lower limb kinematics (including three-dimensional ankle-foot complex rotations) according to the current biomechanical recommendation. The marker set provides a clinically acceptable inter-trial repeatability and minimal equipment requirements.
Źródło:
Journal of Theoretical and Applied Mechanics; 2017, 55, 1; 369-376
1429-2955
Pojawia się w:
Journal of Theoretical and Applied Mechanics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
HGRP: hybrid grid routing protocol for heterogeneous hierarchical wireless networks
Autorzy:
Shen, Y.
Pei, Q.
Xu, Q.
Xi, N.
Ma, J.
Powiązania:
https://bibliotekanauki.pl/articles/206219.pdf
Data publikacji:
2012
Wydawca:
Polska Akademia Nauk. Instytut Badań Systemowych PAN
Tematy:
hybrid grid routing protocol
mobile ad hoc networks
heterogeneous wireless networks
ad hoc on-demand distance vector routing protocol
zone routing protocol
Opis:
The heterogeneous mobile terminals coexist in the next generation wireless networks. The most common routing schemes for mobile ad hoc networks are designed for homogeneous wireless networks. The heterogeneous wireless network routing protocols are needed urgently in many important applications. This paper improves the routing scheme utilizing different capability of terminals and the Hybrid Grid Routing Protocol (HGRP) is proposed. The network is organized in the grid form, that is, the network deployment area is divided into square cells according to the location. Each cell contains one backbone node and several ordinary nodes. This proposed protocol consists of four parts: grid construction, local routing, global routing, and routing correction. Analysis and simulation results indicate that the proposed protocol has the advantages of lower routing cost, lower energy consumption, smaller delay and higher throughput, compared to AODV and ZRP.
Źródło:
Control and Cybernetics; 2012, 41, 2; 353-371
0324-8569
Pojawia się w:
Control and Cybernetics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Simulation of reconfiguration problems in sensor networks using OMNeT++ software
Autorzy:
Dymora, P.
Mazurek, M.
Płonka, P.
Powiązania:
https://bibliotekanauki.pl/articles/106238.pdf
Data publikacji:
2013
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
sensor networks
reallocation algorithm
failure of network node
network-layer protocol
routing protocol
OMNeT++
Opis:
The paper presents a comparative analysis of reallocation algorithms in a structure of wireless sensor network in the event of a failure of network nodes. The article contains detailed research results of wireless sensor networks technology, with particular emphasis on thte network-layer protocols - routing protocols. In the research the simulation environment OMNeT++ was used to study the properties of reconfiguration and reallocation problems in the wireless sensor networks.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2013, 13, 1; 49-67
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies