Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "protocol" wg kryterium: Temat


Tytuł:
The safety of modern and traditional communication protocols in vehicles
Autorzy:
Sumorek, A.
Powiązania:
https://bibliotekanauki.pl/articles/411414.pdf
Data publikacji:
2016
Wydawca:
Polska Akademia Nauk. Oddział w Lublinie PAN
Tematy:
Vehicle Communication Protocol
Protocol Safety
Opis:
Communication infrastructure of vehicles sub-assemblies has undergone three phases of development. The first phase was initiated by the need to reduce emission levels. The function of vehicle sub-assemblies health monitoring was introduced simultaneously. This phase took place in the 70s and 80s of the 20th century. The second phase was focused on the elimination of redundant sensors and implementation of new functions of the vehicle. This phase has been particularly noticeable since the beginning of the 21st century. At the moment, there are 2 directions of development. On the one hand, the works are being continued in the scope of autonomous movement of vehicle and, on the otherhand multimedia solutions are being introduced in order to make the time spent in a vehicle more attractive (multimedia, the Internet, …). The present study is focused on the mechanisms of protection applied in communication protocols used in vehicles. Furthermore, it contains the classification of communication methods, characteristics of the basic methods of protection incorporated in the described protocols and the practical cases of security breach. Therefore, it is possible to answer the question why it is possible for third persons to interfere into the communication network of a vehicle and to indicate potential methods of protection against the functioning disturbance in such communication networks.
Źródło:
ECONTECHMOD : An International Quarterly Journal on Economics of Technology and Modelling Processes; 2016, 5, 3; 19-26
2084-5715
Pojawia się w:
ECONTECHMOD : An International Quarterly Journal on Economics of Technology and Modelling Processes
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Assessment of RIP-V1 and OSPF-V2 protocol with consideration of convergence criteria and sending protocols traffic
Autorzy:
Jelodar, H
Nikravesh, P
Powiązania:
https://bibliotekanauki.pl/articles/102613.pdf
Data publikacji:
2014
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
dynamic routing protocols
OSPF protocol
RIP protocol
Opis:
Routing Protocols are underlying principles in networks like internet, transport and mobile. Routing Protocols include a series of rules and algorithms that consider routing metric and select the best way for sending healthy data packets from origin to destination. Dynamic routing protocol compatible to topology has a changeable state. RIP and OSPF are dynamic routing protocol that we consider criteria like convergence and sending protocols traffic assessment RIP first version and OSPF second version. By the test we have done on OPNET stimulation we understood that the OSPF protocol was more efficient than RIP protocol.
Źródło:
Advances in Science and Technology. Research Journal; 2014, 8, 21; 1-4
2299-8624
Pojawia się w:
Advances in Science and Technology. Research Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Improved Framework for Blockchain Application Using Lattice Based Key Agreement Protocol
Autorzy:
Oleiwi, Zahraa Ch.
Dihin, Rasha Ai
Alwan, Ali H.
Powiązania:
https://bibliotekanauki.pl/articles/2200725.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
key agreement protocol
lattice based protocol
mutual authentication
Diffie-Hellman protocol
forward secrecy
Opis:
One of the most recent challenges in communication system and network system is the privacy and security of information and communication session. Blockchain is one of technologies that use in sensing application in different important environments such as healthcare. In healthcare the patient privacy should be protected use high security system. Key agreement protocol based on lattice ensure the authentication and high protection against different types of attack especially impersonation and man in the middle attack where the latticebased protocol is quantum-withstand protocol. Proposed improved framework using lattice based key agreement protocol for application of block chain, with security analysis of many literatures that proposed different protocols has been presented with comparative study. The resultant new framework based on lattice overcome the latency limitation of block chain in the old framework and lowered the computation cost that depend on Elliptic curve Diffie-Hellman. Also, it ensures high privacy and protection of patient’s information.
Źródło:
International Journal of Electronics and Telecommunications; 2023, 69, 1; 5--10
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Etiquette, Diplomatic Protocol and Savoir-Vivre as the Code of Conduct for Police Officers
Autorzy:
Bekulard, Beata
Powiązania:
https://bibliotekanauki.pl/articles/1375134.pdf
Data publikacji:
2020
Wydawca:
Wyższa Szkoła Policji w Szczytnie
Tematy:
etiquette
protocol
diplomatic protocol
ceremonial protocol
savoir-vivre
uniformed services
law enforcement officer
Opis:
Principles of good manners are associated with courtesy, politeness, tact, good behaviour standards, or savoir-vivre. They include a set of specific rules of conduct that are approved of by a given community. Because courtesy plays an important role in shaping interpersonal relations, the knowledge of etiquette by officers of the services subordinate to and supervised by the Minister of the Internal Affairs and Administration in Poland is the basis for functioning in day-to-day service. Unfortunately, the notions and principles of etiquette are often confused with the principles of an official ceremonial protocol in business pragmatics. This article features the basic principles which should be followed, and not only by every police officer. After all, ignorance of the rules of protocol may lead to our being ridiculed, along with the force which we represent, both in professional and private life.
Źródło:
Internal Security; 2020, 12(2); 287-300
2080-5268
Pojawia się w:
Internal Security
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
To nie był protokół Modbus RTU
Autorzy:
Caban, D.
Powiązania:
https://bibliotekanauki.pl/articles/118426.pdf
Data publikacji:
2017
Wydawca:
Politechnika Koszalińska. Wydawnictwo Uczelniane
Tematy:
PLC
protokół komunikacyjny
ramka protokołu
communication protocol
protocol frame
Opis:
In one of previous Research Notes of the Faculty Electronics and Computer Science of the Koszalin University of Technology the article about implementation of Modbus protocol for communication with PLC from one manufacturer was published. The structure of protocol frame, with command for the PLC, was depicted on one of figures. The specific characters were delimiters of the frame. It means that this protocol isn't a Modbus protocol, because other delimiters of the frame are used in the Modbus protocol. Also other elements of the frame are pointing to it.
W jednym z poprzednich numerów Zeszytów Naukowych Wydziału Elektroniki i Informatyki Politechniki Koszalińskiej ukazał się artykuł na temat implementacji protokołu Modbus dla komunikacji ze sterownikiem pewnej firmy. Na jednym z rysunków została przedstawiona budowa ramki tego protokołu, zawierającej polecenie dla sterownika. Znacznikami początku i końca ramki są znaki o ustalonych kodach. To świadczy o tym, że ten protokół nie jest protokołem Modbus, w którym jest stosowana inna zasada zaznaczania granic ramki. Wskazują na to też inne elementy ramki.
Źródło:
Zeszyty Naukowe Wydziału Elektroniki i Informatyki Politechniki Koszalińskiej; 2017, 11; 141-143
1897-7421
Pojawia się w:
Zeszyty Naukowe Wydziału Elektroniki i Informatyki Politechniki Koszalińskiej
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Badanie ultrasonograficzne według protokołów FAST i eFAST
Ultrasound examination according to protocols FAST and eFAST
Autorzy:
Fedak, Andrzej
Świętoń, Faustyna
Powiązania:
https://bibliotekanauki.pl/articles/985964.pdf
Data publikacji:
2019
Wydawca:
Indygo Zahir Media
Tematy:
protokół FAST
protokół eFAST
ultrasonografia
FAST protocol
eFAST protocol
ultrasound
Opis:
W artykule przedstawiono procedurę badania ultrasonografi cznego FAST oraz eFAST.
The ultrasound examination procedure FAST and eFAST is presented in the article.
Źródło:
Inżynier i Fizyk Medyczny; 2019, 8, 3; 163-165
2300-1410
Pojawia się w:
Inżynier i Fizyk Medyczny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
With using fuzzy logic in the MANET
Autorzy:
Jelodar, H
Aramideh, J
Powiązania:
https://bibliotekanauki.pl/articles/102997.pdf
Data publikacji:
2014
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
AODV routing protocol
DSDV routing protocol
fuzzy expert system
MANET
Opis:
Mobile ad hoc networks have consisted of the nodes which are freely displaced. In other words, this network has dynamic topology. Routing protocols find route of forwarding data packets from the source node to the destination node. A routing protocol plays important role in finding the shortest time and the route path. In this paper, considering significance of the subject, attempt has been made to present a model using fuzzy logic approach to evaluate and compare two routing protocols i.e. AODV DSDV using effective factor of the number of nodes based on 2 outputs of delay and throughput rate (totally fuzzy system with four outputs) in order to select one of these two routing protocols properly under different conditions and based on need and goal. To show efficiency and truth of fuzzy system, two protocols have been evaluated completely equally using NS-2 simulator and attempt has been made to prove efficiency of the designed fuzzy system by comparing results of simulation of fuzzy system and NS-2 software.
Źródło:
Advances in Science and Technology. Research Journal; 2014, 8, 22; 19-25
2299-8624
Pojawia się w:
Advances in Science and Technology. Research Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
ARPNetSteg : Network Steganography Using Address Resolution Protocol
Autorzy:
Bedi, Punam
Dua, Arti
Powiązania:
https://bibliotekanauki.pl/articles/1844471.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
network steganography
ARP steganography
covert channel
Address Resolution Protocol
protocol steganography
Opis:
Steganography is a technique that allows hidden transfer of data using some media such as Image, Audio, Video, Network Protocol or a Document, without its existence getting noticed. Over the past few years, a lot of research has been done in the field of Image, Video and Audio Steganography but very little work has been done in Network Steganography. A Network Steganography technique hides data in a Network Data Unit, i.e., a Network Protocol Packet. In this paper we present an algorithm ARPNetSteg that implements Network Steganography using the Address resolution protocol. Our technique is a robust technique that can transfer 44 bits of covert data per ARP reply packet.
Źródło:
International Journal of Electronics and Telecommunications; 2020, 66, 4; 671-677
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Optimization Of Protocol For Biodiesel Production Of Linseed (Linum Usitatissimum L.) Oil
Autorzy:
Ullah, F.
Bano, A.
Ali, S.
Powiązania:
https://bibliotekanauki.pl/articles/779238.pdf
Data publikacji:
2013
Wydawca:
Zachodniopomorski Uniwersytet Technologiczny w Szczecinie. Wydawnictwo Uczelniane ZUT w Szczecinie
Tematy:
linseed
biodiesel
protocol
optimization
Opis:
Attempts were made to optimize variables affecting the yield of linseed oil biodiesel in a base catalyzed transesterification reaction. The variables studied were reaction temperature (40-70oC), catalyst (NaOH) concentration (0.1-1.5%) and reaction time (30-180 min). The conversion of linseed oil into methyl esters was confirmed through analytical methods like 1H NMR, gas chromatography (GC) and refractometer. The maximum biodiesel yield (97š1.045% w/w) was obtained at 0.5% catalyst concentration, 65oC temperature, 180 min reaction time and 6:1 molar ratio of methanol to oil. 1H NMR confirmed the practically obtained % conversion of triglycerides into methyl esters which was further evidenced by refractometer analyses. The refractive index of biodiesel samples was lower than pure linseed oil. GC analysis confirmed the presence of linolenic acid (C18:3) as the dominant fatty acid (68 wt. %) followed by oleic acid (C18:1), linoleic acid (C18:2) and stearic acid (C18:0) respectively. The physical properties of linseed oil biodiesel like specific gravity (0.90 g/cm3) and flash point (177oC) were higher than American Society for Testing and Materials standards (ASTM 6751) for biodiesel. However, kinematic viscosity (3.752 mm2/s) was in the range of ASTM standards.
Źródło:
Polish Journal of Chemical Technology; 2013, 15, 1; 74-77
1509-8117
1899-4741
Pojawia się w:
Polish Journal of Chemical Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analiza porównawcza protokołów BB84 oraz SARG
Comparative analysis of protocols BB84 and SARG
Autorzy:
Sobota, M.
Powiązania:
https://bibliotekanauki.pl/articles/321363.pdf
Data publikacji:
2014
Wydawca:
Politechnika Śląska. Wydawnictwo Politechniki Śląskiej
Tematy:
analiza porównawcza
protokół kwantowy
protokół BB84
protokół SARG
comparative analysis
quantum protocol
BB84 protocol
SARG protocol
Opis:
Artykuł przedstawia analizę porównawczą dwóch kwantowych protokołów uzgadniania klucza szyfrującego: BB84 oraz SARG. Protokół SARG jest rozwinięciem protokołu BB84, usuwa jego brak odporności na niedoskonałość źródła fotonów, które czasem generuje parę identycznych fotonów zamiast pojedynczego fotonu. W pracy opisano budowę obu protokołów.
Article presents comparative analysis of quantum protocols BB84 and SARG. SARG protocol is an extension of BB84 protocol, removes his lack of resistance to imperfect photon sources, which sometimes generates a pair of identical photons instead of a single photon. This paper describes the construction of these two protocols.
Źródło:
Zeszyty Naukowe. Organizacja i Zarządzanie / Politechnika Śląska; 2014, 74; 75-81
1641-3466
Pojawia się w:
Zeszyty Naukowe. Organizacja i Zarządzanie / Politechnika Śląska
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analytical review and study on multipath routing protocols
Autorzy:
More, Shivaprasad
Naik, Udaykumar
Powiązania:
https://bibliotekanauki.pl/articles/2050101.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Instytut Badań Systemowych PAN
Tematy:
multipath routing protocol
Peak Signal to Noise Ratio
geographic routing protocol
Vehicular Ad Hoc Networks
proactive routing protocol
Opis:
Vehicular Ad Hoc Networks (VANET) constitute a promising technology for Intelligent Transport Systems (ITS). VANET are highly dynamic in their nature because of the movements of vehicles, which are acting as nodes. The routing protocol must be designed for dealing with multiple limiting conditions, like link failures, handoffs, and long congestion periods, which is very challenging. The survey of different routing protocols in VANET provides a significant information for building smart ITS. Accordingly, the present survey is devoted to the existing distinct multipath routing protocols. This review article provides a detailed account on 50 research papers, presenting the different kinds of multipath routing protocols, namely proactive routing protocols, ad-hoc-based routing protocols, Greedy Perimeter Stateless Routing (GPSR), hybrid routing protocols, as well as geographic routing protocols. Besides the classification and cursory description, the present study addresses also several of the important parameters, like evaluation metrics, implementation tool, publication year, datasets utilized, Peak Signal to Noise Ratio (PSNR), and packet end-to-end delay with respect to various techniques considered. Eventually, the research gaps and issues of various multipath routing protocols are presented with the intention of pointing out directions for future research.
Źródło:
Control and Cybernetics; 2020, 49, 4; 369-391
0324-8569
Pojawia się w:
Control and Cybernetics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Study on Denial of Service Attacks in Cluster Based Web Servers
Autorzy:
Poornima, A.
Maheshwari, D.
Powiązania:
https://bibliotekanauki.pl/articles/1193575.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
DoS attacks
Flooding
Protocol
Opis:
In today’s computing world Network Security became vulnerable. As many types of attacks makes the system unsecure and reduces the performance of servers. One such attack is - Denial of Service (DoS) attacks. The drawbacks of this attacks end user application accessibility will be diminishing and the request handling capacity of the application server will drastically subsides.
Źródło:
World Scientific News; 2016, 41; 222-229
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Anatomical protocol for gait analysis: joint kinematics measurement and its repeatability
Autorzy:
Żuk, M.
Trzeciak, M.
Powiązania:
https://bibliotekanauki.pl/articles/281538.pdf
Data publikacji:
2017
Wydawca:
Polskie Towarzystwo Mechaniki Teoretycznej i Stosowanej
Tematy:
joint kinematics
gait analysis protocol
repeatability
anatomical protocol
marker-set
motion capture system
Opis:
International Society of Biomechanics has proposed a general reporting standard for joint kinematics based on anatomical reference frames. Nevertheless, the gait analysis protocols based on this standard are still poorly reported. The purpose of the current study is to propose and preliminarily assess the potential of an anatomically based ISB 6-DOF protocol, which combines the ISB reporting standard together with a marker cluster technique. The proposed technical marker set enables full description of the lower limb kinematics (including three-dimensional ankle-foot complex rotations) according to the current biomechanical recommendation. The marker set provides a clinically acceptable inter-trial repeatability and minimal equipment requirements.
Źródło:
Journal of Theoretical and Applied Mechanics; 2017, 55, 1; 369-376
1429-2955
Pojawia się w:
Journal of Theoretical and Applied Mechanics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
HGRP: hybrid grid routing protocol for heterogeneous hierarchical wireless networks
Autorzy:
Shen, Y.
Pei, Q.
Xu, Q.
Xi, N.
Ma, J.
Powiązania:
https://bibliotekanauki.pl/articles/206219.pdf
Data publikacji:
2012
Wydawca:
Polska Akademia Nauk. Instytut Badań Systemowych PAN
Tematy:
hybrid grid routing protocol
mobile ad hoc networks
heterogeneous wireless networks
ad hoc on-demand distance vector routing protocol
zone routing protocol
Opis:
The heterogeneous mobile terminals coexist in the next generation wireless networks. The most common routing schemes for mobile ad hoc networks are designed for homogeneous wireless networks. The heterogeneous wireless network routing protocols are needed urgently in many important applications. This paper improves the routing scheme utilizing different capability of terminals and the Hybrid Grid Routing Protocol (HGRP) is proposed. The network is organized in the grid form, that is, the network deployment area is divided into square cells according to the location. Each cell contains one backbone node and several ordinary nodes. This proposed protocol consists of four parts: grid construction, local routing, global routing, and routing correction. Analysis and simulation results indicate that the proposed protocol has the advantages of lower routing cost, lower energy consumption, smaller delay and higher throughput, compared to AODV and ZRP.
Źródło:
Control and Cybernetics; 2012, 41, 2; 353-371
0324-8569
Pojawia się w:
Control and Cybernetics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Simulation of reconfiguration problems in sensor networks using OMNeT++ software
Autorzy:
Dymora, P.
Mazurek, M.
Płonka, P.
Powiązania:
https://bibliotekanauki.pl/articles/106238.pdf
Data publikacji:
2013
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
sensor networks
reallocation algorithm
failure of network node
network-layer protocol
routing protocol
OMNeT++
Opis:
The paper presents a comparative analysis of reallocation algorithms in a structure of wireless sensor network in the event of a failure of network nodes. The article contains detailed research results of wireless sensor networks technology, with particular emphasis on thte network-layer protocols - routing protocols. In the research the simulation environment OMNeT++ was used to study the properties of reconfiguration and reallocation problems in the wireless sensor networks.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2013, 13, 1; 49-67
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Porównanie wydajności protokołu WebSocket i HTTP
Comparison of WebSocket and HTTP protocol performance
Autorzy:
Łasocha, Wojciech Paweł
Badurowicz, Marcin
Powiązania:
https://bibliotekanauki.pl/articles/2055110.pdf
Data publikacji:
2021
Wydawca:
Politechnika Lubelska. Instytut Informatyki
Tematy:
websocket protocol
http protocol
protocols performance comparison
protokół websocket
protokół http
porównanie wydajności protokołów
Opis:
Celem autora tego artykułu jest porównanie wydajności protokołu WebSocket i HTTP. W tym celu wykorzystano sprzęt pracujący w sieci LAN oraz samodzielnie wykonaną aplikację testującą. Za jej pomocą zmierzono czas wysyłania oraz pobierania/odbierania 100-znakowych tekstów w określonej liczbie kopii z uwzględnieniem szybkości laptopów i przeglądarek WWW. Z przeprowadzonych badań wynika, że przy transmisji powyżej 100 kopii danych za pomocą protokołu WebSocket (w porównaniu do HTTP) można uzyskać wzrost wydajności o kilkaset procent. Ponadto udowodniono, że dodawanie nadmiarowych narzutów do żądań HTTP może go bardzo spowalniać. Natomiast szyfrowanie TLS ma znikomy wpływ na szybkość obu protokołów. Wywnioskowano, że protokół WebSocket dobrze sprawdzi się w przesyłaniu setek lub tysięcy małych porcji danych na sekundę, gdyż w przypadku mniejszej ich liczby w zupełności wystarczy zwykłe odpytywanie HTTP.
The purpose of the author of this article is to compare the performance of the WebSocket and HTTP protocols. For this purpose, LAN equipment and a self-made testing application were used. It was used to measure the time of sending and downloading/receiving 100-character texts in a specified number of copies, considering the speed of laptops and web browsers. The conducted research shows that when transmitting more than 100 copies of data using the WebSocket protocol (compared to HTTP), performance can be increased by several hundred percent. In addition, it has been proven that adding excess overhead to HTTP requests can slow it down considerably. In contrast, TLS encryption has little effect on the speed of both protocols. It was concluded that the WebSocket protocol is good for sending hundreds or thousands of small serving of data per second, because for a smaller number of them, a simple HTTP polling is absolutely enough.
Źródło:
Journal of Computer Sciences Institute; 2021, 19; 67--74
2544-0764
Pojawia się w:
Journal of Computer Sciences Institute
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Protokół przesłuchania jako źródło historyczne
Autorzy:
Śmietanka-Kruszelnicki, Ryszard
Powiązania:
https://bibliotekanauki.pl/articles/477671.pdf
Data publikacji:
2003
Wydawca:
Instytut Pamięci Narodowej, Komisja Ścigania Zbrodni przeciwko Narodowi Polskiemu
Tematy:
historical source
interrogation protocol
interrogatory
Źródło:
Pamięć i Sprawiedliwość; 2003, 1(3); 199-207
1427-7476
Pojawia się w:
Pamięć i Sprawiedliwość
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Data Exchange Protokol in REPSAIL
Autorzy:
Gucma, M.
Hatłas, P.
Powiązania:
https://bibliotekanauki.pl/articles/320771.pdf
Data publikacji:
2017
Wydawca:
Polskie Forum Nawigacyjne
Tematy:
hybrid yacht
protocol
data exchange
Opis:
Article presents implantation and theoretical considerations of data exchange protocol developed for the RepSail project, where main objective was design and building innovative hybrid yacht. One of problems during the design process was improper functioning of data exchange protocols that were available in the commercially available devices to mention navigation purpose NMEA183 or 2000 as well as automation dedicated ones (CAN and similar). Author shows the basis of the dedicated format of exchange for in board devices.
W artykule przedstawiono podstawy teoretyczne dla budowy protokołu wymiany danych opracowanego w ramach projektu RepSail. Jednym z podstawowych problemów, jaki napotkano podczas realizacji, było niewłaściwe działanie protokołów dostępnych w komercyjnych urządzeniach nawigacyjnych jak NMEA0183 czy 2000 lub w układach automatyki jak CAN.
Źródło:
Annual of Navigation; 2017, 24; 221-229
1640-8632
Pojawia się w:
Annual of Navigation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Proposal of a protocol for training in cardiopulmonary resuscitation in football
Propuesta de un protocolo para la formación sobre reanimación cardiopulmonar en fútbol
Autorzy:
Fernández Alquézar, Oscar
Navarro Guillén, Juan
Sánchez Miguel, Rocío
Zaragozà Biot, Mª Carmen
Alfaro Royo, Mª Cristina
Cárdenas Beltrán, Carmen Natividad
Powiązania:
https://bibliotekanauki.pl/articles/1491072.pdf
Data publikacji:
2019-12-09
Wydawca:
Atena Research Association
Tematy:
Protocol
cardiopulmonary resuscitation
training
football
Opis:
Objectives: A protocol for training in cardiopulmonary resuscitation in football is proposed. The protocol aims to train professionals in the field of football, as well as assess whether their training has been effective. The final objective is that, if necessary, they are able to carry out an intervention prior to the arrival of specialized care. Methods: The protocol is aimed at professionals in the field of football, as coaches or assistants, among others. The protocol consists of three phases: 1) Initial evaluation. 2) Training 3) Final evaluation. To obtain a positive evaluation, the participants must obtain a positive evaluation in all the evaluation criteria. Findings: It is expected that the percentage of participants with a positive evaluation after the training is significantly higher (p <0.05) than the percentage of participants with a positive evaluation before training, a result that will confirm the effectiveness of the proposed protocol for training on cardiopulmonary resuscitation in football. Conclusions: This protocol could be extrapolated to other sports and situations outside the sports field, such as shopping centers or schools.
Źródło:
Atena Journal of Public Health; 2019, 1; 4-4
2695-5911
Pojawia się w:
Atena Journal of Public Health
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
An Authenticated Routing Protocol for Wireless Ad Hoc Network Based on Small World Model
Autorzy:
Wang, Daxing
Xu, Leying
Powiązania:
https://bibliotekanauki.pl/articles/1844509.pdf
Data publikacji:
2021
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
small world model
wireless ad hoc network
routing protocol
authentication theory
AODV routing protocol
Opis:
Compared with traditional cellular networks, wireless ad hoc networks do not have trusted entities such as routers, since every node in the network is expected to participate in the routing function. Therefore, routing protocols need to be specifically designed for wireless ad hoc networks. In this work, we propose an authenticated routing protocol based on small world model (ARSW). With the idea originating from the small world theory, the operation of the protocol we proposed is simple and flexible. Our simulation results show the proposed ARSW not only increases packet delivery ratio, but also reduces packet delivery delay. In particularly, Using authentication theory, the proposed ARSW improves communication security.
Źródło:
International Journal of Electronics and Telecommunications; 2021, 67, 3; 425-430
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Meeting Businessmen Problem: Requirements and Limitations
Autorzy:
Challita, K.
Powiązania:
https://bibliotekanauki.pl/articles/106198.pdf
Data publikacji:
2012
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
videoconference
audioconference
cryptographic protocol
remote communication
Opis:
Let us assume that some businessmen wish to have a meeting. For this to happen, they usually have to meet somewhere. If they cannot meet physically, then they can take part in a video (or audio) conference to discuss whatever needs to be discussed. But what if their meeting is meant to be private? In this case they need a cryptographic protocol that allows them to exchange their ideas remotely, while keeping them secure from any potential eavesdropper. In this paper we list all the necessary requirements that a cryptographic protocol must have in order to allow several businessmen to exchange their ideas securely over the Internet. Moreover, and based on the standard taxonomy of cryptographic protocols, we suggest several approaches on how to design cryptographic protocols that enable us to achieve our aim. Finally, we propose the design of a protocol that solves the meeting businessmen problem.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2012, 12, 1; 67-77
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The use of the enhanced recovery after surgery (ERAS) protocol in patients undergoing laparoscopic surgery for colorectal cancer – a comparative analysis of patients aged above 80 and below 55
Autorzy:
Pędziwiatr, Michał
Pisarska, Magdalena
Wierdak, Mateusz
Major, Piotr
Rubinkiewicz, Mateusz
Kisielewski, Michał
Matyja, Maciej
Lasek, Anna
Budzyński, Andrzej
Powiązania:
https://bibliotekanauki.pl/articles/1394301.pdf
Data publikacji:
2015
Wydawca:
Index Copernicus International
Tematy:
ERAS protocol
fast track protocol
postoperative care
colorectal cancer
colorectal surgery
advanced age
laparoscopic surgery
Opis:
Age is one of the principal risk factors for colorectal adenocarcinoma. To date, older patients were believed to achieve worse treatment results in comparison with younger patients due to reduced vital capacity. However, papers have emerged in recent years which confirm that the combination of laparoscopy and postoperative care based on the ERAS protocol improves treatment results and may be particularly beneficial also for elderly patients. The aim of the study was to compare the outcomes of laparoscopic surgery for colorectal cancer in combination with the ERAS protocol in patients aged above 80 and below 55. Material and methods. The analysis included patients aged above 80 and below 55 undergoing elective laparoscopic colorectal resection for cancer at the 2nd Department of General Surgery of the Jagiellonian University. They were divided into two groups according to their age: ≥80 years of age (group 1) and ≤55 years of age (group 2). Both groups were compared with regard to the outcome of surgery: length hospital stay, complications, hospital readmissions, degree of compliance with the ERAS protocol, and recovery parameters (tolerance of oral nutrition, mobilisation, need for opioids, restored gastrointestinal function). Results. Group 1 comprised 34 patients and group 2, 43 patients. No differences were found between both groups in terms of gender, BMI, tumour progression or surgical parameters. Older patients typically had higher ASA scores. No statistically significant differences were found with regard to the length hospital stay following surgery (5.4 vs 7 days, p=0.446481), the occurrence of complications (23.5% vs 37.2%, p=0.14579) or hospital readmissions (2.9% vs 2.4%). The degree of compliance with the ERAS protocol in group 1 and 2 was 85.2% and 83.0%, respectively (p=0.482558). Additionally, recovery parameters such as tolerance of oral nutrition (82.4% vs 72.1%, p=0.28628) and mobilisation (94.1% vs 83.7%, p=0.14510) within 24 hours of surgery did not differ among the groups. However, a smaller proportion of older patients required opioids in comparison with younger patients (26.5% vs 55.8%, p=0.00891). Conclusions. Similar levels of compliance with the ERAS protocol may be achieved among patients aged ≥80 and younger patients. When laparoscopy is combined with the ERAS protocol, age does not seem to be a significant factor that could account for worse utcomes. Therefore, older patients should not be excluded from perioperative care based on ERAS principles.
Źródło:
Polish Journal of Surgery; 2015, 87, 11; 565-572
0032-373X
2299-2847
Pojawia się w:
Polish Journal of Surgery
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On the modelling of Kerberos protocol in the Quality of Protection Modelling Language (QoP-ML)
Autorzy:
Księżopolski, B.
Rusinek, D.
Wierzbicki, A.
Powiązania:
https://bibliotekanauki.pl/articles/106194.pdf
Data publikacji:
2012
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
Kerberos cryptographic protocol
Quality of Protection
QoP
Quality of Protection Modelling Language
QoP-ML
cryptographic protocol
Opis:
The security modelling of IT systems is a very complicated task. One of the issues which must be analysed is the performance of IT systems. In many cases the guaranteed security level is too high in relation to the real threats. The overestimation of security measures can decrease system performance. The paper presents the analysis of Kerberos cryptographic protocol in terms of quality of protection performed by Quality of Protection Modelling Language (QoP-ML). The analysis concerns the availability attribute. In the article the Kerberos protocol was modelled and the QoP analysis of two selected versions was performed.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2012, 12, 4; 69-81
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The art of diplomacy in the context of contemporary international relations
Autorzy:
Wizimirska, K.
Powiązania:
https://bibliotekanauki.pl/articles/348475.pdf
Data publikacji:
2016
Wydawca:
Akademia Wojsk Lądowych imienia generała Tadeusza Kościuszki
Tematy:
multilateral diplomacy
international relations
diplomatic protocol
Opis:
While considering the issues associated with diplomacy it can be stated that its establishment in the context of international relations is a key element. However, in the description of international interactions diplomacy represents just one of the aspects in this area. This paper presents the information concerning the theory of international relations as a scientific discipline dealing with the cultural, economic and political reality. It clarifies who the participants of international interactions are, what interactions come into play and which methods, tools and techniques can be employed to achieve the set objectives. In the contemporary international arena relations between the states are being manifested in numerous forms and, therefore, the knowledge of the basic modi operandi used by their diplomatic service representatives is an essential aspect leading to the resolution of potential disputes and conflicts.
Źródło:
Zeszyty Naukowe / Wyższa Szkoła Oficerska Wojsk Lądowych im. gen. T. Kościuszki; 2016, 4; 88-105
1731-8157
Pojawia się w:
Zeszyty Naukowe / Wyższa Szkoła Oficerska Wojsk Lądowych im. gen. T. Kościuszki
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Application of a hash function to discourage MAC-layer misbehaviour in wireless LANs
Autorzy:
Konorski, J.
Kurant, M.
Powiązania:
https://bibliotekanauki.pl/articles/958119.pdf
Data publikacji:
2004
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
wireless LAN
MAC protocol
noncooperative setting
Opis:
Contention-based MAC protocols for wireless ad hoc LANs rely on random deferment of packet transmissions to avoid collisions. By selfishly modifying the probabilities of deferments greedy stations can grab more bandwidth than regular stations that apply standard-prescribed probabilities. To discourage such misbehaviour we propose a protocol called RT-hash whereby the winner of a contention is determined using a public hash function of the channel feedback. RT-hash is effective in a full hearability topology, assuming that improper timing of control frames is detectable and that greedy stations do not resort to malicious actions. Simulation experiments show that RT-hash protects regular stations' bandwidth share against various sophisticated greedy strategies of deferment selection; as such it may contribute to MAC-layer network security.
Źródło:
Journal of Telecommunications and Information Technology; 2004, 2; 38-46
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Protocols for The Meeting Businessmen Problem
Autorzy:
Challita, K.
Powiązania:
https://bibliotekanauki.pl/articles/106246.pdf
Data publikacji:
2013
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
videoconference
audioconference
cryptographic protocol
remote communication
Opis:
Assume that some businessmen wish to have a meeting. For this to occur, they usually have to meet somewhere. If they cannot meet physically, then they can take part in a video (or audio) conference to discuss whatever needs to be discussed. But what if their meeting is meant to be private? In this case they need a cryptographic protocol that allows them to exchange their ideas remotely, while keeping them secure from any potential eavesdropper. In this paper we list all the necessary requirements that a cryptographic protocol must have in order to allow several businessmen to exchange their ideas securely over the Internet. Moreover, and based on the standard taxonomy of cryptographic protocols, we suggest several approaches on how to design cryptographic protocols that enable us to achieve our aim. Finally, we propose the design of a protocol that solves the meeting businessmen problem.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2013, 13, 1; 37-47
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Protokół oględzin i otwarcia zwłok
Protocol of corpse inspection and autopsy
Autorzy:
Podraza-Majewska, Natalia
Powiązania:
https://bibliotekanauki.pl/articles/2196897.pdf
Data publikacji:
2021
Wydawca:
Kancelaria Sejmu. Biuro Analiz Sejmowych
Tematy:
Code of Criminal Procedure
corpse
protocol
Opis:
A protocol on corpse inspection and autopsy is prepared and signed by all persons participating in these activities. The lack of a signature can be supplemented after performing the corpse inspection and autopsy. The refusal to sign should be recorded in the protocol. The lack of a signature or such an annotation makes it inadmissible to refer to the protocol in a criminal trial.
Źródło:
Zeszyty Prawnicze BAS; 2021, 4(72); 137-145
1896-9852
2082-064X
Pojawia się w:
Zeszyty Prawnicze BAS
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
CAPSL and MuCAPSL
Autorzy:
Millen, J.K.
Denker, G.
Powiązania:
https://bibliotekanauki.pl/articles/309409.pdf
Data publikacji:
2002
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
protokół kryptograficzny
kryptografia
bezpieczeństwo
CAPSL
MuCAPSL
cryptographic protocol specification
cryptographic protocol analysis
secure group communication
multicast
Opis:
Secure communication generally begins with a connection establishment phase in which messages are exchanged by client and server protocol software to generate, share, and use secret data or keys. This message exchange is referred to as an authentication or key distribution cryptographic protocol. CAPSL is a formal language for specifying cryptographic protocols. It is also useful for addressing the correctness of the protocols on an abstract level, rather than the strength of the underlying cryptographic algorithms. We outline the design principles of CAPSL and its integrated specification and analysis environment. Protocols for secure group management are essential in applications that are concerned with confidential authenticated communication among coalition members, authenticated group decisions, or the secure administration of group membership and access control. We will also discuss our progress on designing a new extension of CAPSL for multicast protocols, called MuCAPSL.
Źródło:
Journal of Telecommunications and Information Technology; 2002, 4; 16-27
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Planning the introduction of IPv6 in NATO
Autorzy:
Goode, R.
Powiązania:
https://bibliotekanauki.pl/articles/308004.pdf
Data publikacji:
2006
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
Internet Protocol
IPv6
transition
NATO
CIS
Opis:
The NATO wide area network provides secure IP services to NATO commands and agencies, and offers information exchange gateways to nations and coalition operations. The IP services support the NATO-wide deployment of core automated information systems (AIS), and the placement of specific functional area services (e.g., intelligence, logistics, C2IS for the services, etc.) at commands. To maintain and improve interoperability within NATO and with partners, NATO will transition from version four of the Internet Protocol (IPv4) to version six (IPv6). The transition to IPv6 will involve the IP network, the information exchange gateways, the core AIS, the functional area services, and the supporting CIS infrastructure. The IPv6 naming and addressing plan being developed supports the NATO command structure and interoperability with NATO partners. The critical issue in the planning process is to support the incremental introduction of IPv6 whilst maintaining network security and reliable interworking with existing IPv4 systems and limiting increases in operations and maintenance costs. To minimise costs and maximise effectiveness NATO is planning the transition in a timescale that is commensurate with commercial adoption in NATO countries, the technology refreshment points for major systems, and the availability of IPv6 security components. New NATO projects will prepare for the transition by detailing their IPv6 upgrade path and procuring dual stack (IPv4 and IPv6) equipment. NATO will develop and adopt standardised approaches for IPv6 protocols and network design.
Źródło:
Journal of Telecommunications and Information Technology; 2006, 3; 33-37
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Probability timed automata for investigating communication processes
Autorzy:
Piech, H.
Grodzki, G.
Powiązania:
https://bibliotekanauki.pl/articles/331047.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Zielonogórski. Oficyna Wydawnicza
Tematy:
protocol logic
probabilistic timed automata
communication security
Opis:
Exploitation characteristics behaves as a decreasing valors factor (DVF) which can be connected with degradation processes. It is a structure that consists of independent attributes which represent situations generally connected with a given exploitation factor. The multi-attribute structure contains attributes directly and indirectly referring to the main factor. Attribute states, by definition, can only maintain or decrease their values. Such situations are met in security, reliability, exploitation, fatigues and many complex one-directed or irreversible processes. The main goal refers to protocol security analysis during the realization of the communication run that specifies the assessment of the level of current and oncoming threats connected with cryptography authentication. In the communication run, the operations of different protocols mutually interleave. Our concept is based on the algorithm of attributes correction during exploitation process realization (Blanchet et al., 2008). The monitoring and correcting procedures make it possible to provide forecast information about possible threats on the basis of the structure of the current attribute values.
Źródło:
International Journal of Applied Mathematics and Computer Science; 2015, 25, 2; 403-414
1641-876X
2083-8492
Pojawia się w:
International Journal of Applied Mathematics and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Measuring systems based on Modbus protocol within plant Ethernet network
Systemy pomiarowe oparte na protokole Modbus w sieci Ethernet zakładu produkcyjnego
Autorzy:
Marek, M.
Powiązania:
https://bibliotekanauki.pl/articles/154749.pdf
Data publikacji:
2014
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
Ethernet
Modbus protocol
SCADA
PLC
protokół Modbus
Opis:
Measurement systems are important tools for the maintenance group. Due to the modularity of automation equipment, diversity of sensors and measuring devices, such systems can be individually adapted. The article presents two measurement systems, implemented in the car plant for two press lines. The article contents is focused on configuration of Modbus communication between PLCs of two different suppliers and measuring devices. As a final result, the part of SCADA visualization was presented. The benefits of having this type of system and possibility of its development are substantial from the perspective of diagnostics as well as purely economic reasons.
Systemy pomiarowe są istotnym usprawnieniem prac służb utrzymania ruchu, szczególnie w przypadku produkcji wielkoseryjnej. Eliminują konieczność ręcznych pomiarów i umożliwiają wykrycie prawdopodobieństwa awarii na podstawie analizy trendów. Ze względu na modułowość urządzeń automatyki, mnogość rozwiązań czujników i urządzeń pomiarowych, system tego typu może być indywidualnie dostosowany do potrzeb zakładu [1]. W artykule zostały przedstawione dwa systemy pomiarowe, zaimplementowane w fabryce samochodów osobowych na wydziale tłoczni dla dwóch linii pras, monitorujące wartości parametrów sprężonego powietrza oraz drgań elementów mechanicznych napędu pras. Zaprezentowano schematy systemu (rys. 1) w świetle zakładowej sieci Ethernet. Wskazano użyte w systemach elementy, w szczególności moduły komunikacyjne sterowników PLC. W sposób szczególny opisano sposób konfiguracji komunikacji protokołem Modbus [3, 6] pomiędzy sterownikiem PLC oraz urządzeniami pomiarowymi dla dwóch typów sterowników [2, 4, 5]. Przedstawiono różnice w procesie konfiguracji obu sterowników i ich modułów (rys. 2, 3, 4). Zarysowano również sposób przetwarzania pozyskanych danych. Jako efekt końcowy w artykule zamieszczono fragment wizualizacji SCADA (rys. 5) z Systemu Kontroli i Monitorowania Procesu Produkcyjnego fabryki. Podsumowując proces realizacji założeń projektu, wskazano możliwości rozwoju systemów tego typu. Opisano, w jaki sposób można wykorzystać pozyskane dane, jakie korzyści niesie ze sobą posiadanie w zakładzie tego typu systemu, zarówno z perspektywy diagnostyki i eksploatacji maszyn, jak i powodów czysto ekonomicznych.
Źródło:
Pomiary Automatyka Kontrola; 2014, R. 60, nr 6, 6; 385-387
0032-4140
Pojawia się w:
Pomiary Automatyka Kontrola
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Authentication over Internet Protocol
Autorzy:
Apiecionek, Ł.
Czerniak, J. M.
Romantowski, M.
Ewald, D.
Tsizh, B.
Zarzycki, H.
Dobrosielski, W. T.
Powiązania:
https://bibliotekanauki.pl/articles/202193.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
network security
communication
Internet Protocol
DoS attacks
Opis:
Defending against DoS (denial of service) attacks has become a great challenge, especially for institutions that provide access to their services in the public network. State-of-the-art identity concealing tools and vast number of computers connected to the network require ensuring appropriate means for entities at risk to enable defence from the particular type of threats. This article presents a concept of user authentication in IP communication. The concept consists in providing the receiver with the possibility to determine sender՚s identity at the Internet layer level. This provides both the capability of defence against DoS attacks and possibility of utilizing the presented model over existing Internet network, which is directly responsible for transmission. The authors hope that the concept is a significant step in the perception of public network data transmission.
Źródło:
Bulletin of the Polish Academy of Sciences. Technical Sciences; 2020, 68, 2; 245-253
0239-7528
Pojawia się w:
Bulletin of the Polish Academy of Sciences. Technical Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Moving towards IPV6
Zmierzając do protokołu IPV6
Autorzy:
Machalek, A.
Powiązania:
https://bibliotekanauki.pl/articles/298318.pdf
Data publikacji:
2012
Wydawca:
Uniwersytet Warmińsko-Mazurski w Olsztynie
Tematy:
IPv4
IPv6
bezszwowa komunikacja
TETRA
Internet Protocol version 4
Internet Protocol version 6
seamless communication
Opis:
This document describes the possibilities for Internet Protocol communications in crisis situations. Its main goal is to show IPv4 and IPv6 solutions developed during the lifetime of the SECRICOM project. Communications technologies in current use are showing their limitations. Whether reacting to a small incident or a great catastrophe, first responders increasingly need to share information such as video, images or other data. Society's evolving expectations concerning safety can be compared with the development of Internet protocols. We examine IP-based communication for crisis management, and show that it is ready to bind together currently fragmented technologies such as TETRA and analogue radios, providing a new dimension of interoperability, including cross-border communication.
W artykule przedstawiono możliwości wykorzystania protokołu IP (w wersji 4 i 6) w zarządzaniu kryzysowym, ze szczególnym uwzględnieniem rozwiązań wytworzonych w ramach realizacji projektu SECRICOM. Zauważa się, że zbliżamy się do limitów możliwości obecnie wykorzystywanych technologii komunikacyjnych. Podczas akcji ratunkowych - zarówno niewielkich incydentów, jak i wielkich katastrof - u służb ratunkowych w coraz większym stopniu występuje zapotrzebowanie na wymianę informacji pod różnymi postaciami (np. wideo, zdjęcia oraz inne informacje). Zwiększające się oczekiwania społeczeństwa wobec aspektów związanych z bezpieczeństwem mogą być skonfrontowane z możliwościami rozwijającej się technologii. W artykule omówiono łączność w zarządzaniu kryzysowym opartą na protokole IP. Autor zauważa, że podejście takie jest już realizowalne oraz ma potencjał umożliwienia wymiany informacji między różnorodnymi i rozproszonymi sieciami (np. TETRA, systemami analogowymi), wprowadzając nowy wymiar interoperacyjności, także w komunikacji międzygraniczej.
Źródło:
Technical Sciences / University of Warmia and Mazury in Olsztyn; 2012, 15(1); 155-160
1505-4675
2083-4527
Pojawia się w:
Technical Sciences / University of Warmia and Mazury in Olsztyn
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analiza porównawcza protokołów przesyłania wiadomościasynchronicznych w systemach kolejkowych
Comparative analysis of transfer protocols asynchronous messages on systems queuing
Autorzy:
Derlatka, Grzegorz
Kopniak, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/24083634.pdf
Data publikacji:
2023
Wydawca:
Politechnika Lubelska. Instytut Informatyki
Tematy:
message broker
asynchronous communication
amqp protocol
mqtt protocol
system kolejkowy
broker komunikatów
komunikacja asynchroniczna
protokół AMQP
protokół MQTT
Opis:
W tym artykule została przedstawiona analiza wydajności dwóch protokołów obsługiwanych przez systemy kolejkowe, tj. protokołu MQTT (ang. MQ Telemetry Transport) oraz AMQP (ang. Advanced Message Queuing Protocol). Analiza ta została przeprowadzona z użyciem dwóch brokerów wiadomości - ActiveMQ oraz RabbitMQ. Analizie został poddany czas przesłania wiadomości wyznaczony na podstawie czasu wysłania i odebrania komunikatu dla obu protokołów w obu przytoczonych systemach kolejkowych. Testy zostały przeprowadzone przy pomocy własnych aplikacji napisanych w języku Java oraz szkielecie aplikacji Spring.
This article presents an analysis of the performance of two protocols supported by queuing systems, i.e. MQTT and AMQP. This analysis was performed using two message brokers - ActiveMQ and RabbitMQ. The time of sending the message was analyzed, determined on the basis of the time of sending and receiving the message for both protocols in both of the above-mentioned queuing systems. The tests were carried out using proprietary applications written in Java and the Spring application framework.
Źródło:
Journal of Computer Sciences Institute; 2023, 26; 29--32
2544-0764
Pojawia się w:
Journal of Computer Sciences Institute
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Time server based on NMEA and SNTP Protocols
Autorzy:
Łukasik, Z.
Nowakowski, W.
Ciszewski, T.
Powiązania:
https://bibliotekanauki.pl/articles/116756.pdf
Data publikacji:
2020
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
time service
NMEA Protocol
SNTP Protocol
time server
time synchronization
Computer Network
GPS receiver
Universal Time Coordinated (UTC)
Opis:
Modern technical ship systems very often use information and communication technologies. One of the basic requirements of these systems is ensuring time synchronization that aim is to coordinate clocks of all devices working in a computer network. This requirement results from, among others, the necessity to log events with a unified timestamp. To achieve this goal, most frequently expensive time servers are used. This article presents an easy method of time synchronization, which can serve as a reserve or alternative solution to the methods currently used. That is why a proprietary software has been developed, allowing to expand the functionality of a PC so that it can operate as a time server. A time reference in proposed solution would be provided by a GPS receiver. The developed application allows, with the use of the NMEA protocol, to synchronize the current time with the GPS receiver and then, with the help of the SNTP protocol, to distribute it to all network devices operating on the ship.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2020, 14, 2; 453-458
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Network Management in Non-classified Data Hiding System Using Master Resident over Hidden Layer
Autorzy:
Sawicki, K.
Piotrkowski, Z.
Powiązania:
https://bibliotekanauki.pl/articles/309523.pdf
Data publikacji:
2011
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
hidden protocol bridge
hidden protocol interpreter
master resident
non-classified data hiding system
steganography
voice over IP
watermarking
Opis:
The paper presents a practical implementation of the non-classified data hiding system (NDHS) understood as a military platform for information warfare that takes advantage of the hidden data transmission for voice connections in order to gain informational lead over a potential enemy. The NDHS performs here as a botnet network that is managed by the hidden transmission controller referred to as the master resident. Research studies are dedicated to investigation of various connections in heterogeneous links as well as functionalities of such components as hidden protocol bridges and the master resident.
Źródło:
Journal of Telecommunications and Information Technology; 2011, 1; 11-16
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Examination of robust D - stability of TCP - DCR protocol
Autorzy:
Klamka, J.
Tańcula, J.
Powiązania:
https://bibliotekanauki.pl/articles/375704.pdf
Data publikacji:
2012
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
computer networks
D-stability
TCP-DCR protocol
Opis:
This paper presents non-linear mathematical model of a computer network with a part of wireless network. The article contains an analysis of the stability of the network based on TCP-DCR, which is a modification of the traditional TCP. Block diagram of the network model was converted to a form in order to investigate the D-stability using the method of the space of uncertain parameters. Robust D-stability is calculated for constant delays values.
W pracy przedstawiono nieliniowy model matematyczny sieci komputerowej w postaci układu dwóch równań różniczkowych ze skupionym zmiennym w czasie opóźnieniem we współrzędnych stanu. Przedstawiono model w postaci schematu blokowego, a następnie dokonano przekształceń schematu zgodnie z linearyzacją równań. Wydajność aplikacji w dużym stopniu zależy od stosowanego w sieci algorytmu zarządzania kolejką. Aktywne zarządzanie kolejką (Active Queue Management) w rozpatrywanym modelu sieci komputerowej polega na zastosowaniu algorytmu RED (Random Early Detection) w sprzężeniu zwrotnym. Jeśli przyjąć, że sieć komputerowa jest specyficznym układem dynamicznym to możemy poddać badaniu stabilnści taki układ. Analityczne metody badania D-stabilności mogą być trudne do sprawdzenia, dlatego w niniejszej pracy zaproponowano metody graficzne znane z literatury. Przedstawiono również przykłady liczbowe badania stabilności dla rzeczywistej sieci komputerowej. Wykorzystano metodę częstotliwościową oraz metodę przestrzeni niepewnych parametrów quasi-wielomianów, która jest rozwinięciem klasycznej metody podziału D. Polega ona na wyznaczeniu w przestrzeni niepewnych parametrów quasi-wielomianów zbioru takich wartósci niepewnych parametrów, dla których jest on asymptotycznie stabilny. Przy użyciu tej metody określono granice obszaru odpornej D-stabilności. Wyznaczenie granic stabilności układu pozwoli zaprojektować sieć bezprzewodową bardziej wydajną, szybszą i odporną na błędy.
Źródło:
Theoretical and Applied Informatics; 2012, 24, 4; 327-344
1896-5334
Pojawia się w:
Theoretical and Applied Informatics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Guillain-Barré syndrome: Possible complication of the flu vaccine?
Síndrome de Guillain-Barré: ¿Posible complicación de la vacuna antigripal?
Autorzy:
Alfaro Royo, Mª Cristina
Zaragozà Biot, Mª Carmen
Navarro Guillén, Juan
Fernández Alquézar, Oscar
Cárdenas Beltrán, Carmen Natividad
Sánchez Miguel, Rocío
Powiązania:
https://bibliotekanauki.pl/articles/1491073.pdf
Data publikacji:
2019-12-09
Wydawca:
Atena Research Association
Tematy:
Guillain-Barré syndrome
Flu vaccine
Research protocol
Opis:
Objectives: The objective of this article is to establish a research protocol to determine if there is an association between the flu vaccine and Guillain-Barré Syndrome (GBS). Methods: A case-control study will be carried out to determine whether or not there is a relationship between the flu vaccine and the GBS. For each case of GBS a control of the same sex and of similar age will be selected, and it will be determined if they have been exposed to the flu vaccine, in order to determine whether this vaccine increases the risk of suffering from GBS. Findings: The flu vaccine is not expected to be associated with an increased risk of GBS. Such a result would be of great importance for the patients and for the healthcare system. It would contribute decisively to reassure the general population, especially the risk groups that can benefit from flu vaccine, being able to inform them of its safety. Conclusions: It is recommended to carry out this protocol in different health centers to obtain reliable conclusions about the possible association between flu vaccine and GBS.  
Źródło:
Atena Journal of Public Health; 2019, 1; 3-3
2695-5911
Pojawia się w:
Atena Journal of Public Health
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A New Efficient Authenticated and Key Agreement Scheme for SIP Using Digital Signature Algorithm on Elliptic Curves
Autorzy:
Jebrane, A.
Toumanari, A.
Meddah, N.
Bousseta, M.
Powiązania:
https://bibliotekanauki.pl/articles/958109.pdf
Data publikacji:
2017
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
authentication
key agreement
session initiation protocol
VoIP
Opis:
Voice over Internet Protocol (VoIP) has been recently one of the more popular applications in Internet technology. It benefits lower cost of equipment, operation, and better integration with data applications than voice communications over telephone networks. However, the voice packets delivered over the Internet are not protected. The session initiation protocol (SIP) is widely used signaling protocol that controls communications on the Internet, typically using hypertext transport protocol (HTTP) digest authentication, which is vulnerable to many forms of attacks. This paper proposes a new secure authentication and key agreement scheme based on Digital Signature Algorithm (DSA) and Elliptic Curve Cryptography (ECC) named (ECDSA). Security analysis demonstrates that the proposed scheme can resist various attacks and it can be applied to authenticate the users with different SIP domains.
Źródło:
Journal of Telecommunications and Information Technology; 2017, 2; 62-68
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The impact of batch flotation tests on the industrial plant prediction
Autorzy:
Vallejos, Paulina
Powiązania:
https://bibliotekanauki.pl/articles/24603655.pdf
Data publikacji:
2023
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
batch flotation
rougher banks
standard protocol
operating condition
Opis:
To predict the metallurgical results of industrial plants, laboratory batch flotation tests are carried out, relating both operations through scale-up factors. However, robust scale-up procedures and well-defined laboratory protocols are necessary to reach reliable results at industrial scale. In this paper, results from different flotation batch tests are presented, analysing the effect of batch protocol in terms of operating conditions, operator, ore type, water quality, and others on the metallurgical response. Additionally, the ability of batch responses to describe industrial operations and determine scale-up factors was analysed. Then, a sensitivity analysis was carried out, considering the effect of batch and industrial conditions on the estimation of scale-up factors. Results showed that the batch response significantly changes, depending on the operating conditions, flotation operator, and batch flotation machine, even for the same cell design. Additionally, it was observed that the batch recovery significantly changes when modifying ore type and water quality, which can cause changes in batch and/or industrial operation, affecting the scale-up factors. In addition, results showed that the scale-up factors varied significantly by changing operating conditions in a batch cell. This also occurs in plants when metallurgical performance changes, for example, due to a modification in launder design and/or operating condition, to increase recovery, or due to control limitations that prevent efficient metallurgical performance.
Źródło:
Physicochemical Problems of Mineral Processing; 2023, 59, 5; art. no. 177609
1643-1049
2084-4735
Pojawia się w:
Physicochemical Problems of Mineral Processing
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Załącznik do protokołu posiedzenia organu administracji publicznej
Annex to the minutes of the meeting of the state authority
Autorzy:
Górecki, Paweł
Powiązania:
https://bibliotekanauki.pl/articles/1590916.pdf
Data publikacji:
2016
Wydawca:
Uniwersytet Szczeciński. Wydawnictwo Naukowe Uniwersytetu Szczecińskiego
Tematy:
administrative procedure
protocol
annex
postępowanie administracyjne
protokół
załącznik
Opis:
Protokół posiedzenia organu orzekającego jest dokumentem urzędowym i zgodnie z art. 76 k.p.a. stanowi dowód tego, co zostało w nim urzędowo stwierdzone. Tym samym niebagatelne znaczenie ma załącznik do protokołu, który jest częścią protokołu. Oznacza to, że załącznik będzie nie tylko narzędziem pozwalającym na precyzyjne przedstawienie informacji pochodzących od autora, ale także będzie miał istotne znaczenie w sferze postępowania wyjaśniającego i postępowania odwoławczego.
The minutes of a meeting of state authorities are an official document. Thus, of considerable importance is the annex which is part of the minutes. This means that the annex is not only a tool to present accurate information, but also will have important implications for investigation and appeal.
Źródło:
Studia Administracyjne; 2016, 8; 19-28
2080-5209
2353-284X
Pojawia się w:
Studia Administracyjne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Efficacy of interferential current on relieving pain of musculoskeletal origin - protocol of a systematic review and meta-analysis undertaken
Autorzy:
Hussein, H.M.
Alshammari, R.
Al-Barak, S.
Alshammari, N.
Alajlan, S.
Powiązania:
https://bibliotekanauki.pl/articles/2097426.pdf
Data publikacji:
2020
Wydawca:
Instytut Medycyny Wsi
Tematy:
interferential current
pain
musculoskeletal pain
systematic review
protocol
Opis:
Introduction and Objective. Interferential current IFC is one of the common electrotherapeutic modalities used in the treatment of painful conditions. Patients with musculoskeletal pain seek medical help in order to reduce their pain that could be achieved using IFC. The current review aims to analyze the recently available information regarding the efficacy of the IFC in alleviating the pain of musculoskeletal origin. State of knowledge. IFC, as one of the medium frequency currents, has the advantage of being more comfortable and deeply penetrating so that it can reach deeper painful tissues. It has been proposed that IFC can relieve pain through stimulating different body mechanisms, such as the gate mechanism and the release of body opioids. However, the evidence behind the effectiveness of IFC as a pain-relieving modality for musculoskeletal pain has been poorly studied and still not conclusive. Conclusions. This systematic review will summarize the effects of IFC on relieving musculoskeletal pain as reported through improvement in visual analog scale, numeric pain rating scale, or the McGill pain questionnaire. Through searching multiple databases and including randomized controlled trials published during the last ten years, the findings of the current systematic review and meta-analysis will establish the quality of the recently available evidence and demonstrate if there will be a need for further studies.
Źródło:
Journal of Pre-Clinical and Clinical Research; 2020, 14, 3; 69-72
1898-2395
Pojawia się w:
Journal of Pre-Clinical and Clinical Research
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Dokumentowanie czynności przesłuchania w polskim procesie karnym
Documentation of interrogation in Polish criminal proceeding
Autorzy:
Jagiełło, Dariusz
Powiązania:
https://bibliotekanauki.pl/articles/697111.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Opolski
Tematy:
interrogation
protocol
criminal proceedings
preparatory proceedings
start activities
Opis:
Interrogation is a process-criminal act, without which it could not proceed, and finally no criminal proceedings could be concluded. The further course of investigation depends on the facts determined in its course. These facts determine the adoption or confirmation of forensic versions verified at subsequent stages of the proceedings. Therefore, documenting this activity is very important, and – at the same time – hard evidence, so that its course is not effectively undermined by the parties to the proceedings. Knowledge of the techniques of logging, the choice of the moment of its commencement, the transfer of the presented emotions and behaviors of the participants to the most accurate content is a necessary knowledge.
Źródło:
Opolskie Studia Administracyjno-Prawne; 2018, 16, 2; 83-98
2658-1922
Pojawia się w:
Opolskie Studia Administracyjno-Prawne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Trivial file transfer protocol (TFTP)
Podstawy technologii TFTP
Autorzy:
WOŁOSZYN, Jacek
Powiązania:
https://bibliotekanauki.pl/articles/457265.pdf
Data publikacji:
2012
Wydawca:
Uniwersytet Rzeszowski
Tematy:
file transfer protocol
TFTP
informatyka
protokół transferu plików
Opis:
This article provides a description of the operation of TFTP, beginning with an overview description of the protocol, its history and motivation, and the relevant standards that describe it. I discuss its operation in general terms, cover how TFTP clients and servers communicate, and explain TFTP messaging in detail. I then discuss TFTP options and the TFTP option negotiation mechanism. The article concludes by showing the various TFTP message formats. File Transfer Protocol (FTP) implements a full set of commands and reply functionalities that enables a user to perform a wide range of file movement and manipulation tasks. Although FTP is ideal as a general-purpose protocol for file transfer between computers, on certain types of hardware, it is too complex to implement easily and provides more capabilities than are really needed. In cases where only the most basic file transfer functions are required while simplicity and small program size is of paramount importance, a companion to FTP called the Trivial File Transfer Protocol (TFTP) can be used.
W artykule tym przedstawiono opis protokołu TFTP. Należy go uważać za dopełnienie protokołu FTP i używać w przypadku, kiedy istotną rolę odgrywa jego mała złożoność. Ze względu na jego „lekkość” idealne wydaje się być zastosowanie go w systemach o małych mocach obliczeniowych. Opisano mechanizm działania protokołu oraz główne różnice pomiędzy protokołami TFTP oraz FTP.
Źródło:
Edukacja-Technika-Informatyka; 2012, 3, 2; 247-256
2080-9069
Pojawia się w:
Edukacja-Technika-Informatyka
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Conventional energy efficient routing protocols in wireless sensor networks
Autorzy:
Al-Rawi, Muaayed F.
Powiązania:
https://bibliotekanauki.pl/articles/117843.pdf
Data publikacji:
2020
Wydawca:
Polskie Towarzystwo Promocji Wiedzy
Tematy:
WSN
routing protocol
energy efficient
protokół routingu
energooszczędność
Opis:
Wireless sensor network is a significant piece of wireless communication. It is a gathering of an enormous number of sensor nodes that are set in remote spots. The sensors have ability to do a typical undertaking. So energy exhaustion plays a significant job in keeping up a stable network. To build the system lifetime, a different energy effective algorithm is required which expands the network lifetime and makes the network more energy productive. For the augmenting, the lifetime of the network diverse routing technique has been utilized which help in expanding the lifetime of the network. This article portrays the diverse routing protocol which helps in energy efficient routing in a wireless sensor network.
Źródło:
Applied Computer Science; 2020, 16, 3; 80-87
1895-3735
Pojawia się w:
Applied Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Diplomatic Counterculture as a Tool of the Soviet Foreign Policy
Autorzy:
Zakharova, Oksana
Powiązania:
https://bibliotekanauki.pl/articles/1931344.pdf
Data publikacji:
2020-09-30
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
international relations
state image
protocol
diplomatic etiquette
ceremonial
Opis:
The article deals with the study of the issue of diplomatic counterculture the definition of which the author introduces into scientific use. The breach of protocol takes place either due to its ignorance, which is non-typical for professional politicians, or for a public demonstration of zero tolerance to particular political objectives. In this context, the meeting of the Polish charge d’affaires with a representative of the People’s Commissariat for Foreign Affairs (NKID) in Moscow dated February 1, 1995 is of special interest. The latter demanded from the diplomat to comment behavior of some members of the diplomatic corps, who didn’t stand up when signing the Internationale (anthem in that period) during one of the official events. Another NKID’s complaint against the diplomatic corps concerned the reluctance of diplomats to stand up for greeting the Soviet vozhds (leaders), including J.V. Stalin who didn’t hold any official leadership post in the system of the Soviet state. In the author’s opinion, J.V. Stalin was one among Soviet politicians of the most sophisticated improvisers, professionally manipulating the norms of diplomatic protocol and etiquette. In 1939, J. Ribbentrop had talked about vozhd as a man with extraordinary power. Stalin managed to daze Minister of Foreign Affairs of German and, in August 1942, Prime Minister of the United Kingdom W. Churchill marked Stalin’s hospitality at a dinner in the Kremlin and offered to drink to his health. It has been found that one of the blatant cases of diplomatic counterculture is the conduct of N.S. Khrushchev during the meeting at the United Nations General Assembly in 1960. “Shoe diplomacy” didn’t raise the credibility of the Soviet leader in the minds of the global community. The ignorance of protocol rules may lead to the loss of the reputation of a government leader, and as a consequence, negatively affect the country’s image, its attractiveness, which is a hallmark of the “softpower” of the state.
Źródło:
Krakowskie Studia Małopolskie; 2020, 3(27); 7-21
1643-6911
Pojawia się w:
Krakowskie Studia Małopolskie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A proposed mapping architecture between IAX and Jingle protocols
Autorzy:
Haj-Aliwi, H. S.
Sumari, P.
Powiązania:
https://bibliotekanauki.pl/articles/103177.pdf
Data publikacji:
2016
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
signaling protocol
mapping architecture
IAX
Jingle
translation gateway
Opis:
Nowadays, Multimedia Communication has improved rapidly to allow people to communicate via the Internet. However, Internet users cannot communicate with each other unless they use the same chatting applications since each chatting application uses a certain signaling protocol to make the media call. The mapping architecture is a very critical issue since it solves the communication problems between any two protocols, as well as it enables people around the world to make a voice/video call even if they use different chatting applications. Providing the interoperability between different signaling protocols and multimedia applications takes the advantages of more than one protocol. Many mapping architectures have been proposed to ease exchanging the media between at least two users without facing any difficulties such as SIP-Jingle, IAX-RSW, H.323-MGCP, etc. However, the design of any of the existing mapping architectures has some weaknesses related to larger delay, time consuming, and security matters. The only way to overcome these problems is to propose an efficient mapping architecture. This paper proposed a new mapping architecture between Inter-Asterisk eXchange Protocol and Jingle Protocol. The proposed mapping architecture consists of IAX domain (IAX client, IAX server, IAX-to-Jingle gateway), and Jingle domain (Jingle client, Jingle server, Jingle-to-IAX gateway). The tasks of the translation gateways are represented by the URI conversion, media capability exchange, translator of call setup and teardown signals, and real time media transmission.
Źródło:
Advances in Science and Technology. Research Journal; 2016, 10, 29; 141-146
2299-8624
Pojawia się w:
Advances in Science and Technology. Research Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Configurable Secured Adaptive Routing Protocol for Mobile Wireless Sensor Networks
Autorzy:
Alnaser, Ahmed
Al-Junaid, Hessa
Almesaeed, Reham
Powiązania:
https://bibliotekanauki.pl/articles/2134047.pdf
Data publikacji:
2022
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
routing protocol
mobile wireless sensor networks
WSN
security
Opis:
This paper aims at designing, building, and simulating a secured routing protocol to defend against packet dropping attacks in mobile WSNs (MWSNs). This research addresses the gap in the literature by proposing Configurable Secured Adaptive Routing Protocol (CSARP). CSARP has four levels of protection to allow suitability for different types of network applications. The protocol allows the network admin to configure the required protection level and the ratio of cluster heads to all nodes. The protocol has an adaptive feature, which allows for better protection and preventing the spread of the threats in the network. The conducted CSARP simulations with different conditions showed the ability of CSARP to identify all malicious nodes and remove them from the network. CSARP provided more than 99.97% packets delivery rate with 0% data packet loss in the existence of 3 malicious nodes in comparison with 3.17% data packet loss without using CSARP. When compared with LEACH, CSARP showed an improvement in extending the lifetime of the network by up to 39.5%. The proposed protocol has proven to be better than the available security solutions in terms of configurability, adaptability, optimization for MWSNs, energy consumption optimization, and the suitability for different MWSNs applications and conditions.
Źródło:
International Journal of Electronics and Telecommunications; 2022, 68, 3; 577--586
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analiza SIECI IP / MPLS w środowisku symulacyjnym Riverbed
Analysis network IP / MPLS in the simulation environment Riverbed
Autorzy:
Podsiadły, D.
Podsiadły, M.
Krzysztoszek, K.
Powiązania:
https://bibliotekanauki.pl/articles/254331.pdf
Data publikacji:
2016
Wydawca:
Instytut Naukowo-Wydawniczy TTS
Tematy:
Riverbed
Multi-Protocol Label Switching
infrastruktura sieciowa
model ISO/OSI
multi-protocol label switching (MPLS)
network infrastructure
ISO/OSI model
Opis:
W artykule autorzy przedstawili wyniki symulacji w środowisku Riverbed, której celem było zbadanie możliwości zarządzania i efektywności działania ruchu sieciowego stosując technologię Multi-Protocol Label Switching (MPLS). Symulacja zawierała obsługę przepływu danych ftp, email, http oraz aplikacji czasu rzeczywistego jak wideokonferencje oraz głos. Artykuł zawiera wyniki porównania technologii oraz analizę parametrów infrastruktury sieciowej: opóźnienie, zmienność opóźnienia, czas reakcji i charakterystyki TCP.
The paper presented the results of the simulation Riverbed environment, whose aim was to examine the management capabilities and efficiency of the network traffic using Multi-Protocol Label Switching (MPLS) technology. The simulation included support for data flow ftp, email, http, and realtime applications like video conferencing and voice. The paper contains the results of technology comparison and analysis of network infrastructure parameters: delay, delay variation, reaction time and the TCP characteristics.
Źródło:
TTS Technika Transportu Szynowego; 2016, 12; 484-489
1232-3829
2543-5728
Pojawia się w:
TTS Technika Transportu Szynowego
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Perspektywy międzynarodowych negocjacji klimatycznych w świetle wyników konferencji COP17 w Durbanie
Prospects for international climate change negotiations after COP17 in Durban
Autorzy:
Sobolewski, Mirosław
Powiązania:
https://bibliotekanauki.pl/articles/16539508.pdf
Data publikacji:
2012
Wydawca:
Kancelaria Sejmu. Biuro Analiz Sejmowych
Tematy:
climate policy
climate negotiations
UNFCCC
Kyoto Protocol
COP17
Opis:
The author presents the origins and evolution of the negotiation process within the framework of the UN Framework Convention on Climate Change. An overview of greenhouse gas emission trends and future emission projections serves as a background for analysis of the main international agreements: UNFCCC and Kyoto Protocol. Particular attention is paid to the outcomes of the 2009 COP15 in Copenhagen and to the most recent climate conference in Durban which initiated a new phase of climate talks aiming at the new treaty binding both developed and developing nations.
Źródło:
Studia BAS; 2012, 1(29); 31-54
2080-2404
2082-0658
Pojawia się w:
Studia BAS
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies