期刊文献+
共找到39,235篇文章
< 1 2 250 >
每页显示 20 50 100
Multi-Sensor Estimation for Unreliable Wireless Networks with Contention-Based Protocols 被引量:1
1
作者 Shou-Wan Gao Peng-Peng Chen +1 位作者 Xu Yang Qiang Niu 《Journal of Computer Science & Technology》 SCIE EI CSCD 2018年第5期1072-1085,共14页
The state estimation plays an irreplaceable role in many real applications since it lays the foundation for decision-making and control. This paper studies the multi-sensor estimation problem for a contention-based un... The state estimation plays an irreplaceable role in many real applications since it lays the foundation for decision-making and control. This paper studies the multi-sensor estimation problem for a contention-based unreliable wireless network. At each time step, no more than one sensor can communicate with the base station due to the potential contention and collision. In addition, data packets may be lost during transmission since wireless channels are unreliable. A novel packet arrival model is proposed which simultaneously takes into account the above two issues. Two scenarios of wireless sensor networks (WSNs) are considered: the sensors transmit the raw measurements directly and the sensors send the local estimation instead. Based on the obtained packet arrival model, necessary and sufficient stability conditions of the estimation at the base station side are provided for both network scenarios. In particular, all offered stability conditions are expressed by simple inequalities in terms of the packet arrival rates and the spectral radius of the system matrix. Their relationships with existing related results are also discussed. Finally, the proposed results are demonstrated by simulation examples and an environment monitoring prototype system. 展开更多
关键词 wireless sensor network packet loss state estimation contention-based protocol
原文传递
Contention-Based Beaconless Real-Time Routing Protocol for Wireless Sensor Networks
2
作者 Chao Huang Guoli Wang 《Wireless Sensor Network》 2010年第7期528-537,共10页
This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at ... This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at each hop through integrating the contention and neighbor table mechanisms. More precisely, CBRR maintains a neighbor table via the contention mechanism being dependent on wireless broadcast instead of beacons. Comprehensive simulations show that CBRR can not only achieve higher performance in static networks, but also work well for dynamic networks. 展开更多
关键词 Wireless Sensor Network REAL-TIME Routing protocol contention-based Scheme Beaconless
在线阅读 下载PDF
Tuning the Coefficients of Thermal Expansion of the Crystallized Cordierite Glasses by Thermal Treatment Protocols
3
作者 DUAN Qiang KE Xuefei +1 位作者 QIAO Ang TAO Haizheng 《Journal of Wuhan University of Technology(Materials Science)》 2025年第5期1239-1243,共5页
Focusing on the ultralow expansion functionality of the crystalized glass containing the cordierite crystal phase with the molar composition 20.7MgO·20.7Al_(2)O_(3)·51.6SiO_(2)·7.0TiO_(2),we systematica... Focusing on the ultralow expansion functionality of the crystalized glass containing the cordierite crystal phase with the molar composition 20.7MgO·20.7Al_(2)O_(3)·51.6SiO_(2)·7.0TiO_(2),we systematically investigated impacts of thermal treatment protocols on T dependence of coefficients of thermal expansion(CTE).Except for the phase compositions,morphology is identified as another important factor to control the T dependence of CTE.By using X-ray diffraction and scanning electron microscope,various modes of T dependence of CTE for crystallized glasses are ascribed to their different phase compositions and microstructure with finely dispersed nanoparticles.These understanding contributes to the further modification of CTE of the crystalized glass by altering their thermal treatment scenarios. 展开更多
关键词 coefficients of thermal expansion crystalized glass CORDIERITE thermal treatment protocols
原文传递
Improving nursing care protocols for diabetic patients through a systematic review and meta-analysis of recent years
4
作者 Mónica Grande-Alonso María Barbado García +2 位作者 Soledad Cristóbal-Aguado Soledad Aguado-Henche Rafael Moreno-Gómez-Toledano 《World Journal of Diabetes》 2025年第2期257-269,共13页
BACKGROUND Diabetes mellitus has become one of the major pandemics of the 21st century.In this scenario,nursing interventions are essential for improving self-care and quality of life in patients with type 2 diabetes ... BACKGROUND Diabetes mellitus has become one of the major pandemics of the 21st century.In this scenario,nursing interventions are essential for improving self-care and quality of life in patients with type 2 diabetes mellitus.Nursing interventions are crucial for managing the disease and preventing complications.AIM To analyse nursing interventions in recent years through a systematic review and meta-analysis and to propose improvements in care plans.METHODS This study conducted a systematic review and meta-analysis of the impact of nursing interventions on quantitative glycaemic variables,such as glycated haemoglobin and fasting plasma glucose.RESULTS After confirming that the combined effect of all studies from the past 5 years positively impacts quantitative variables,a descriptive analysis of the studies with the most significant changes was conducted.Based on this,an improvement in diabetic patient care protocols has been proposed through follow-up plans tailored to the patient’s technological skills.CONCLUSION The combined results obtained and the proposal for improvement developed in this manuscript could help to improve the quality of life of many people around the world. 展开更多
关键词 Diabetes mellitus Nursing interventions Systematic review META-ANALYSIS protocol enhancement proposal
暂未订购
Impact of differentiation protocols on the functionality of mesenchymal stem cells derived from induced pluripotent stem cells
5
作者 Nidaa A Ababneh Enas Alwohoush +14 位作者 Razan AlDiqs Mohammad A Ismail Ban Al-Kurdi Raghda Barham Renata Al-Atoom Fairouz Nairat Sabal Al Hadidi Suha Whaibi Mohammad H Gharandouq Suzan Zalloum Sofian Al Shboul Talal Al-Qaisi Areej Abuhammad Tareq Saleh Abdalla Awidi 《World Journal of Stem Cells》 2025年第12期109-125,共17页
BACKGROUND The discovery of induced pluripotent stem cells revolutionized regenerative medicine,providing a source for generating induced pluripotent stem cell-derived mesenchymal stem cells(iMSCs).AIM To evaluate and... BACKGROUND The discovery of induced pluripotent stem cells revolutionized regenerative medicine,providing a source for generating induced pluripotent stem cell-derived mesenchymal stem cells(iMSCs).AIM To evaluate and compare five iMSC differentiation protocols,assessing their efficiency,phenotypic characteristics,and functional properties relative to primary mesenchymal stem cells(MSCs).METHODS Five iMSC differentiation protocols were assessed:SB431542-based differentiation(iMSC1,iMSC3),an iMatrix-free method(iMSC2),growth factor supplementation(iMSC4),and embryoid body formation with retinoic acid(EB-iMSC).iMSC identity was confirmed according to the International Society for Cell&Gene Therapy 2006 criteria,requiring expression of surface markers(CD105,CD73,CD90)and absence of pluripotency markers.Functional assays were conducted to evaluate differentiation potential(osteogenic and adipogenic),proliferation,mitochondrial function,reactive oxygen species,senescence,and migration.RESULTS All iMSC types expressed MSC markers and lacked pluripotency markers.EBiMSC and iMSC2 showed enhanced osteogenesis(runt-related transcription factor 2;P≤0.01 and P≤0.0001,respectively),while adipogenic potential was reduced in iMSC2(Adipsin;P≤0.01)and EB-iMSC(Adipsin and peroxisome proliferatoractivated receptor gamma;P≤0.0001 and P≤0.01,respectively).Proliferation was comparable or superior to bone marrow MSCs,except in iMSC1,with iMSC4 showing the highest rate(MTT assay;P values ranged from 0.01 to 0.001).Despite reduced mitochondrial health in iMSC3 and iMSC4(P≤0.001),reactive oxygen species levels were lower in all iMSCs(P values ranged from 0.001 to 0.0001),and senescence was significantly reduced in all iMSCs with the exception of iMSC1(P values ranged from 0.01 to 0.0001).Migration was most reduced in iMSC4(P≤0.001 at 24 hours and P≤0.0001 at 48 hours).CONCLUSION While all protocols generated functional iMSCs,variations in differentiation,proliferation,and function emphasize the impact of protocol selection.These findings contribute to optimizing iMSC generation for research and clinical applications. 展开更多
关键词 Induced pluripotent stem cells Induced mesenchymal stem cells Regenerative medicine Differentiation protocols Tissue engineering
暂未订购
ProRE:A Protocol Message Structure Reconstruction Method Based on Execution Slice Embedding
6
作者 Yuyao Huang Hui Shu Fei Kang 《Computers, Materials & Continua》 2026年第3期936-960,共25页
Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,inclu... Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,including malware analysis and protocol fuzzing.However,existing methods suffer from inaccurate field boundary delineation and lack hierarchical relationship recovery,resulting in imprecise and incomplete reconstructions.In this paper,we propose ProRE,a novel method for reconstructing protocol field structures based on program execution slice embedding.ProRE extracts code slices from protocol parsing at runtime,converts them into embedding vectors using a data flow-sensitive assembly language model,and performs hierarchical clustering to recover complete protocol field structures.Evaluation on two datasets containing 12 protocols shows that ProRE achieves an average F1 score of 0.85 and a cophenetic correlation coefficient of 0.189,improving by 19%and 0.126%respectively over state-of-the-art methods(including BinPRE,Tupni,Netlifter,and QwQ-32B-preview),demonstrating significant superiority in both accuracy and completeness of field structure recovery.Case studies further validate the effectiveness of ProRE in practical malware analysis scenarios. 展开更多
关键词 protocol reverse engineering program slicing code embedding hierarchical clustering
在线阅读 下载PDF
Fresh Arrival--Rwanda-China avocado export protocol is a milestone in growing agricultural partnership
7
作者 ALAFATI MUGABO 《ChinAfrica》 2026年第1期46-47,共2页
Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajecto... Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajectory of the country’s trade. 展开更多
关键词 China trade protocol Rwanda agricultural partnership fresh avocado exports
原文传递
A Contention-Based MAC and Routing Protocol for Wireless Sensor Network
8
作者 Chung Yee Haw Azlan Awang Fawnizu Azmadi Hussin 《Wireless Sensor Network》 2023年第1期1-32,共32页
Advance development of wireless technologies and micro-sensor systems have enabled Wireless Sensor Network (WSN) to emerge as a leading solution in many crucial sensor-based applications. WSN deploys numerous resource... Advance development of wireless technologies and micro-sensor systems have enabled Wireless Sensor Network (WSN) to emerge as a leading solution in many crucial sensor-based applications. WSN deploys numerous resource-constrained sensor nodes which have limited power supply, memory and computation capability in a harsh environment. Inefficient routing strategy results in degraded network performance in terms of reliability, latency and energy efficiency. In this paper, a cross-layer design, Contention-based MAC and Routing protocol is proposed, termed Contention/SNIR-Based Forwarding (CSBF) protocol. CSBF utilizes the geographical information of sensor nodes to effectively guide the routing direction towards destination node, thereby enhancing reliability. Furthermore, Signal-to-Noise-plus-Interference Ratio (SNIR) metric is used as a routing parameter to guarantee high quality link for data transmission. A Contention-Winner Relay scheme is utilized to reduce the delays caused by the contention procedure. Energy efficiency is also improved by introducing sleep mode technique in CSBF. The simulation work is carried out via OMNeT++ network simulator. The performance of CSBF is compared with other existing routing protocols such as AODV and DSDV in terms of packet delivery ratio (PDR), average end-to-end (ETE) delay and energy consumption per packet. Simulation results highlight that CSBF outperforms AODV and DSDV protocols in respect of PDR and energy efficiency. CSBF also has the most consistent overall network performance. 展开更多
关键词 Wireless Sensor Network Inefficient Routing Strategy Cross-Layer Design CSBF protocol Geographical Information SNIR Metric
在线阅读 下载PDF
Robust Hyper-Polarization Protocol of Nuclear Spins via Magic Sequence
9
作者 Haiyang Li Yongju Li +1 位作者 Hao Liao Ping Wang 《Chinese Physics Letters》 2026年第1期105-128,共24页
Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to thei... Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to their small gyromagnetic ratios.A promising approach to achieving high nuclear spin polarization is transferring the polarization of electrons to nuclear spins.The nitrogen-vacancy(NV)center in diamond has emerged as a highly effective medium for this purpose,and various hyperpolarization protocols have been developed.Among these,the pulsed polarization(PulsePol)method has been extensively studied due to its robustness against static energy shifts of the electron spin.In this work,we present a novel polarization protocol and uncover a family of magic sequences for hyperpolarizing nuclear spins,with PulsePol emerging as a special case of our general approach.Notably,we demonstrate that some of these magic sequences exhibit significantly greater robustness compared to the PulsePol protocol in the presence of finite half𝜋pulse duration of the protocol,Rabi and detuning errors.This enhanced robustness positions our protocol as a more suitable candidate for hyper-polarizing nuclear spins species with large gyromagnetic ratios and also ensures better compatibility with high-efficiency readout techniques at high magnetic fields.Additionally,the generality of our protocol allows for its direct application to other solid-state quantum systems beyond the NV center. 展开更多
关键词 transferring polarization electrons hyperpolarization protocols quantum information technologiesas nuclear spins pulse polarization nuclear spin polarization magic sequences nuclear magnetic resonance
原文传递
FORMAL PROOF OF RELATIVE STRENGTH OF SECURITY AMONG ECK2007 MODEL AND OTHER PROOF MODELS FOR KEY AGREEMENT PROTOCOLS 被引量:2
10
作者 夏金月 王建东 +2 位作者 方黎明 任勇军 卞仕柱 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2008年第4期282-288,共7页
The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model ... The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model (BPR2000) and the Canetti & Krawczyk (2001) model (CK2001) are given. The relative strength of security among these models is analyzed. To support the implication or non-implication relation among these models, the formal proof or the counter-example is provided. 展开更多
关键词 CRYPTOGRAPHY security data key agreement protocol proof model
在线阅读 下载PDF
Development and Verification of Simulation Model Based on Real MANET Experiments for Transport Layer Protocols (UDP and TCP) 被引量:2
11
作者 Joarder Mohammad Mustafa Kamal Mohammad Shahidul Hasan +1 位作者 Alison L. Griffiths Hongnian Yu 《International Journal of Automation and computing》 EI CSCD 2013年第1期53-63,共11页
There is a lack of appropriate guidelines for realistic user traces, mobility models, routing protocols, considerations of real-life challenges, etc. for general-purpose mobile ad hoc networks (MANET). In this paper... There is a lack of appropriate guidelines for realistic user traces, mobility models, routing protocols, considerations of real-life challenges, etc. for general-purpose mobile ad hoc networks (MANET). In this paper, four laptops are used in an open field environment in four scenarios to evaluate the performances of Internet control message protocol (ICMP) based ping and transmission control protocol (TCP) based streaming video applications using optimised link state routing (OLSR) implementation in an IEEE 802.11g wireless network. Corresponding simulations are developed in Network Simulator ns-2 by setting simulation parameters according to the real experiments. Difficulties faced to regenerate real-life scenarios have been discussed and the gaps between reality and simulation are identified. A setup guideline to produce realistic simulation results has been established. 展开更多
关键词 Mobile ad-hoc networks (MANET) real-life experiment Internet control message protocol (ICMP) user datagram protocol (UDP) transmission control protocol (TCP) optimised link state routing (OLSR) NS-2
原文传递
Routing Protocols for Transmitting Large Databases or Multi databases Systems 被引量:2
12
作者 He Hong, Ma Shao han Computer Science Department of Shandong University, Jinan 250100, China 《Wuhan University Journal of Natural Sciences》 CAS 2001年第Z1期448-450,共3页
Most knowledgeable people agree that networking and routing technologies have been around about 25 years. Routing is simultaneously the most complicated function of a network and the most important. It is of the same ... Most knowledgeable people agree that networking and routing technologies have been around about 25 years. Routing is simultaneously the most complicated function of a network and the most important. It is of the same kind that more than 70% of computer application fields are MIS applications. So the challenge in building and using a MIS in the network is developing the means to find, access, and communicate large databases or multi databases systems. Because general databases are not time continuous, in fact, they can not be streaming, so we can't obtain reliable and secure quality of service by deleting some unimportant datagrams in the databases transmission. In this article, we will discuss which kind of routing protocol is the best type for large databases or multi databases systems transmission in the networks. 展开更多
关键词 NETWORK routing protocol DATABASES TRANSMISSION
在线阅读 下载PDF
Analysis of Multichannel ALOHA and CSMA Protocols-Normal and Slotted Versions 被引量:2
13
作者 李英涛 郝川 张乃通 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 1996年第3期44-46,共3页
The performance of ALOHA, Non-Persistent CSMA protocols and their slotted versions in Packet Radio Network is analyzed in consideration of the time of propagation delay, the time of radio transformation from receiving... The performance of ALOHA, Non-Persistent CSMA protocols and their slotted versions in Packet Radio Network is analyzed in consideration of the time of propagation delay, the time of radio transformation from receiving state to transmitting state, and the time for the radio to sense the carrier. The analysis shows that these parameters are the main factors deteriorating the performance of the protocols, especially for CSMA. The multichannel mode efficiently decreases the effects of these factors and the system capacity is changeable conveniently. Comparing curves and some simulation results are given. 展开更多
关键词 ss: Packet radio network MULTICHANNEL MULTIPLE-ACCESS protocol
在线阅读 下载PDF
Location-Based Routing Protocols for Wireless Sensor Networks: A Survey 被引量:6
14
作者 Arun Kumar Hnin Yu Shwe +1 位作者 Kai Juan Wong Peter H. J. Chong 《Wireless Sensor Network》 2017年第1期25-72,共48页
Recently, location-based routings in wireless sensor networks (WSNs) are attracting a lot of interest in the research community, especially because of its scalability. In location-based routing, the network size is sc... Recently, location-based routings in wireless sensor networks (WSNs) are attracting a lot of interest in the research community, especially because of its scalability. In location-based routing, the network size is scalable without increasing the signalling overhead as routing decisions are inherently localized. Here, each node is aware of its position in the network through some positioning device like GPS and uses this information in the routing mechanism. In this paper, we first discuss the basics of WSNs including the architecture of the network, energy consumption for the components of a typical sensor node, and draw a detailed picture of classification of location-based routing protocols. Then, we present a systematic and comprehensive taxonomy of location-based routing protocols, mostly for sensor networks. All the schemes are subsequently discussed in depth. Finally, we conclude the paper with some insights on potential research directions for location-based routing in WSNs. 展开更多
关键词 Location-Based protocol GEOGRAPHIC ROUTING WIRELESS Sensor Networks Energy CONSERVATION ROUTING
在线阅读 下载PDF
Nonlinear consensus protocols for multi-agent systems based on centre manifold reduction 被引量:2
15
作者 李玉梅 关新平 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第8期3355-3366,共12页
Nonlinear consensus protocols for dynamic directed networks of multi-agent systems with fixed and switching topologies are investigated separately in this paper. Based on the centre manifold reduction technique, nonli... Nonlinear consensus protocols for dynamic directed networks of multi-agent systems with fixed and switching topologies are investigated separately in this paper. Based on the centre manifold reduction technique, nonlinear consensus protocols are presented. We prove that a group of agents can reach a β-consensus, the value of which is the group decision value varying from the minimum and the maximum values of the initial states of the agents. Moreover, we derive the conditions to guarantee that all the agents reach a β-consensus on a desired group decision value. Finally, a simulation study concerning the vertical alignment manoeuvere of a team of unmanned air vehicles is performed. Simulation results show that the nonlinear consensus protocols proposed are more effective than the linear protocols for the formation control of the agents and they are an improvement over existing protocols. 展开更多
关键词 nonlinear consensus protocol centre manifold reduction multi-agent systems switching topology
原文传递
Survey on recent advances in IoT application layer protocols and machine learning scope for research directions 被引量:3
16
作者 Praveen Kumar Donta Satish Narayana Srirama +1 位作者 Tarachand Amgoth Chandra Sekhara Rao Annavarapu 《Digital Communications and Networks》 SCIE CSCD 2022年第5期727-744,共18页
The Internet of Things(IoT)has been growing over the past few years due to its flexibility and ease of use in real-time applications.The IoT's foremost task is ensuring that there is proper communication among dif... The Internet of Things(IoT)has been growing over the past few years due to its flexibility and ease of use in real-time applications.The IoT's foremost task is ensuring that there is proper communication among different types of applications and devices,and that the application layer protocols fulfill this necessity.However,as the number of applications grows,it is necessary to modify or enhance the application layer protocols according to specific IoT applications,allowing specific issues to be addressed,such as dynamic adaption to network conditions and interoperability.Recently,several IoT application layer protocols have been enhanced and modified according to application requirements.However,no existing survey articles focus on these protocols.In this article,we survey traditional and recent advances in IoT application layer protocols,as well as relevant real-time applications and their adapted application layer protocols for improving performance.As changing the nature of protocols for each application is unrealistic,machine learning offers means of making protocols intelligent and is able to adapt dynamically.In this context,we focus on providing open challenges to drive IoT application layer protocols in such a direction. 展开更多
关键词 Internet of things Machine learning Application layer Request-response protocols Publish-subscribe protocols
在线阅读 下载PDF
An Overview of Anti-Collision Protocols for Radio Frequency Identification Devices 被引量:8
17
作者 QIAN Zhihong WANG Xue 《China Communications》 SCIE CSCD 2014年第11期44-59,共16页
Radio frequency identification(RFID) is a new type of non-contact automatic identification technology.Due to its low energy consumption,low cost,and its adaptability to harsh environments,it has been applied to many f... Radio frequency identification(RFID) is a new type of non-contact automatic identification technology.Due to its low energy consumption,low cost,and its adaptability to harsh environments,it has been applied to many fields.In the RFID systems,data collision is inevitable when the reader sends a communication request and multiple tags respond with simultaneous data transmission.Data collision is prone to causing problems such as:identification delay,spectrum resource waste,a decreased system throughput rate,etc.Therefore,an efficient,stable anti-collision protocol is crucial for RFID systems.This research analysed the current research into RFID anticollision protocols and summarised means for its improvement through the mechanism of implementation of different types anticollision protocols.Finally,a new direction is proposed for the future development of RFID anti-collision protocol systems. 展开更多
关键词 radio frequency identification automatic identification data collision anticollision protocol.
在线阅读 下载PDF
A New Relay Attack on Distance Bounding Protocols and Its Solution with Time-Stamped Authentication for RFID 被引量:2
18
作者 WEI Guoheng ZHANG Huanguo WANG Ya 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第1期37-46,共10页
Relay attack is one of the most threatening challenges against radio frequency identification(RFID) now. Distance bounding protocols have been introduced to thwart relay attacks. They form a family of challenge-resp... Relay attack is one of the most threatening challenges against radio frequency identification(RFID) now. Distance bounding protocols have been introduced to thwart relay attacks. They form a family of challenge-response authentication protocols and confirm the round-trip time at the Rapid Bit Exchange phase. They enable a reader to authenticate and to establish an upper bound on the physical distance to an entrusted tag. We design an effective attack against a family of such protocols to launch the spoofing attacks within effective distance successfully, which demonstrates that existing protocols cannot eliminate such attacks completely. The thesis proposes a new program with time- stamping verification to correct the defect and verify the effectiveness. 展开更多
关键词 radio frequency identification(RFID) distance bounding protocol relay attack rapid bit exchange
原文传递
Correlation dimension based nonlinear analysis of network traffics with different application protocols 被引量:1
19
作者 王俊松 袁静 +1 位作者 李强 袁睿翕 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第5期174-178,共5页
This paper uses a correlation dimension based nonlinear analysis approach to analyse the dynamics of network traffics with three different application protocols-HTTP, FTP and SMTP. First, the phase space is reconstruc... This paper uses a correlation dimension based nonlinear analysis approach to analyse the dynamics of network traffics with three different application protocols-HTTP, FTP and SMTP. First, the phase space is reconstructed and the embedding parameters are obtained by the mutual information method. Secondly, the correlation dimensions of three different traffics are calculated and the results of analysis have demonstrated that the dynamics of the three different application protocol traffics is different from each other in nature, i.e. HTTP and FTP traffics are chaotic, furthermore, the former is more complex than the later; on the other hand, SMTP traffic is stochastic. It is shown that correlation dimension approach is an efficient method to understand and to characterize the nonlinear dynamics of HTTP, FTP and SMTP protocol network traffics. This analysis provided insight into and a more accurate understanding of nonlinear dynamics of internet traffics which have a complex mixture of chaotic and stochastic components. 展开更多
关键词 application protocol network traffic correlation dimension CHAOS
原文传递
A Comparative Analysis of Tools for Verification of Security Protocols 被引量:2
20
作者 Nitish Dalal Jenny Shah +1 位作者 Khushboo Hisaria Devesh Jinwala 《International Journal of Communications, Network and System Sciences》 2010年第10期779-787,共9页
The area of formal verification of protocols has gained substantial importance in the recent years. The research results and subsequent applications have amply demonstrated that the formal verification tools have inde... The area of formal verification of protocols has gained substantial importance in the recent years. The research results and subsequent applications have amply demonstrated that the formal verification tools have indeed helped correct the protocols even after being standardized. However, the standard protocol verification tools and techniques do not verify the security properties of a cryptographic protocol. This has resulted in the emergence of the security protocol verifiers to fill the need. In this paper, taking the two popular security verification tools namely Scyther and ProVerif as the basis, we identify a few security protocols and implement them in both Scyther and ProVerif, to aptly evaluate the tools, in terms of the security properties of the selected protocols. In the process, we not only characteristically present a comparative evaluation of the two tools, but also reveal interesting security properties of the protocols selected, showing their strengths and weaknesses. To the best of our knowledge, this is a unique attempt to juxtapose and evaluate the two verification tools using the selected security protocols. 展开更多
关键词 FORMAL VERIFICATION SECURITY protocols ATTACKS
暂未订购
上一页 1 2 250 下一页 到第
使用帮助 返回顶部