Search results for: CRYPTOGRAPHY PROTOCOLS
-
Arabinoxylans: A review on protocols for their recovery, functionalities and roles in food formulations
PublicationArabinoxylans (AXs) are compounds with high nutritional value and applicability, including prebiotics or supplementary ingredients, in food manufacturing industries. Unfortunately, the recovery of AXs may require advanced separation and integrated strategies. Here, an analysis of the emerging techniques to extract AXs from cereals and their by-products is discussed. This review covers distinct methods implemented over the last...
-
CONTACT – communication protocol for family practitioners and specialists
Publication -
RSVP-TE as a reservation protocol for optical networks
PublicationIn this paper, we consider the reservation of optical resources problem. We implement extensions for RSVP-TE (Resource ReSerVation Protocol with Traffic Engineering Extension) to achieve the new functionality for optical resources reservation. Based on ASON/GMPLS architecture we examine an open source implementation KOM RSVP-Engine and extend its functionality according to ITU-T and IETF recommendations. The transport plane consists...
-
AUTOMATED NEGOTIATIONS OVER COLLABORATION PROTOCOL AGREEMENTS
PublicationThe dissertation focuses on the augmentation of proactive document - agents with built-in intelligence to recognize execution context provided by devices visited during a business process, and to reach collaboration agreement despite conflicting requirements. The proposed solution, based on intelligent bargaining using neural networks to improve simple multi-issue negotiation between the document and thedevice, requires practically...
-
The Transmission Protocol of Sensor Ad Hoc Networks
PublicationThis paper presents a secure protocol for a radio Ad Hoc sensor network. This network uses the TDMA multiple access method. The transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.
-
Performance analysis of untraceability protocols for mobile agents using an adaptable framework
PublicationArtykuł przedstawia środowisko oceny wydajności protokołów ochrony przed tropieniem agentów mobilnych oraz wyniki analiz przeprowadzonych za jego pomocą. Chociaż środowisko projektowano i implementowano z myślą o ewaluacji zaproponowanych przez nas protokołów ochrony przed tropieniem, w trakcie badań okazało się, że może ono zostać również wykorzystane do badań całej klasy protokołów bezpieczeństwa dla agentów mobilnych. Chodzi...
-
Performance analysis of mobility protocols and handover algorithms for IP-based networks
PublicationA rapid growth of IP-based networks and services has created the vast collection of resources and functionality available to users by means of a universal method of access - an IP protocol. At the same time, advances in design of mobile electronic devices have allowed them to reach utility level comparable to stationary, desktop computers, while still retaining their mobility advantage. Following this trend multiple extensions...
-
International Journal of Surgery Protocols
Journals -
Current Protocols in Protein Science
Journals -
Current Protocols in Molecular Biology
Journals -
Current Protocols in Cell Biology
Journals -
Current protocols in mouse biology
Journals -
Cold Spring Harbor Protocols
Journals -
Current Protocols in Human Genetics
Journals -
Current protocols in chemical biology
Journals -
Current protocols in plant biology
Journals -
Bound entanglement maximally violating Bell inequalities: quantum entanglement is not fully equivalent to cryptographic security
PublicationW pracy pokazano, że czterokubitowy stan o splątaniu związanym może maksymalnie łamać prostą nierówność Bella podobną do standardowej nierówności CHSH. Prostota rozważanego układu oraz odporność splątania sprawiają, że łamanie to jest obiecujące dla współczesnej technologii eksperymentalnej. Z drugiej strony, splątanie tego stanu nie pozwala na destylację bezpiecznego klucza kryptograficznego, zatem ani splątanie, ani maksymalne...
-
Assessment of the physical fitness of road cyclists in the step and ramp protocols of the incremental test
Publication -
The Ethernet POWERLINK Protocol for smart grids elements integration
Publication -
Ordered multicast protocol based on credited virtual acknowledgment
PublicationPrzedstawiono protokół rozgłaszania dla sieci pakietowych oparty na statystycznym przewidywaniu ruchu aplikacji. Pokazano, że wydajność protokołu zbliżona jest do optymalnej w klasie wykorzystującej potwierdzenia wirtualne.
-
The secure transmission protocol of sensor Ad Hoc network
PublicationThe paper presents a secure protocol of radio Ad Hoc sensor network. This network operates based on TDMA multiple access method. Transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.
-
Zero-knowledge convincing protocol on quantum bit is impossible
PublicationIt is one of fundamental features of quantum formalism that o n one hand it provides a new infor- mation processing resources and on the other hand puts funda mental constraints on the processing of quantum information implying “no-go” theorems for cloni ng [1–3], bit commitment [4, 5] and deleting [6] in quantum theory. Here we ask about possibilit y of “zero knowledge” scenario which, for its simplicity, can be considered as...
-
Interlaboratory Test to Characterize the Cyclic Behavior of Bituminous Interlayers: An Overview of Testing Equipment and Protocols
PublicationThe performance assessment of multi-layered pavements strongly depends on the mechanical behavior of the interface between bituminous layers. So far, comprehensive studies have been carried out mainly using quasi-static laboratory tests focusing on the interlayer shear strength at failure. However, it is generally recognized that cyclic shear testing will lead to the determination of parameters which are more closely linked to...
-
Interlaboratory Test to Characterize the Cyclic Behavior of Bituminous Interlayers: An Overview of Testing Equipment and Protocols
PublicationThe performance assessment of multi-layered pavements strongly depends on the mechanical behavior of the interface between bituminous layers. So far, comprehensive studies have been carried out mainly using quasi-static laboratory tests focusing on the interlayer shear strength at failure. However, it is generally recognized that cyclic shear testing will lead to the determination of parameters which are more closely linked to...
-
mRNA heptaplex protocol for distinguishing between menstrual and peripheral blood
Publication -
Oral ulcers of COVID-19 patients: a scoping review protocol
Publication -
Design of versatile ASIC and protocol tester for CBM readout system
Publication -
An untraceability protocol for mobile agents and its enhanced security study
PublicationArtykuł przedstawia rozszerzoną analizę bezpieczeństwa zaproponowanego przez nas protokołu ochrony przed tropieniem (ang. untraceability protocol) dla agentów mobilnych. Jak dotąd, tak systematyczna analiza bezpieczeństwa nie została przeprowadzona. Co więcej, istniejące znane analizy bezpieczeństwa koncentrują się wyłącznie na atakujących wewnętrznych. Uważamy, że stworzona przez nas lista kontrolna ataków może posłużyć jako...
-
Grade of service determination methodology in IP networks with SIP protocol
PublicationAlthough Grade of Service is very important in VoIP providers evaluation, We wasn't able to find any paper regarding the topic of measuring GoS variables for IP networks utilizing SIP, which are defined like for PSTN/ISDN/GSM networks (post-selection delay, answering delay, release delay, or probability of end-to-end blocking). Due to the lack of research in this field, it was necessary to start from defining measures and cover...
-
Dynamic host configuration protocol for IPv6 improvements for mobile nodes
PublicationIn wireless networks mobile clients change their physical location, which results in changing point of attachment to the network. Such handovers introduce unwanted periods, when node does not have communication capabilities. Depending on many conditions, such events may require reconfiguration of layer 2 (e.g. IEEE 802.16) or both 2 and 3 layers (IPv6). This paper investigates delays introduced in the latter type of handover. IPv6...
-
On efficiency of layer 2 of the radio interface protocol stack in UMTS
PublicationCelem pracy jest szczegółowa analiza funkcjonowania warstwy łącza danych w podsystemie dostępu radiowego UTRAN systemu UMTS i na tej podstawie przedstawienie szeregu zmian i usprawnień oraz wskazówek odnośnie konfiguracji protokołów, jakie należy w tej warstwie zastosować aby zmaksymalizować jej wydajność głównie pod kątem oferowanej przepływności, wprowadzanych opóźnień oraz wsparcia priorytetów przesyłanego ruchu. Teza pracy...
-
MICROPROPAGATION PROTOCOL OF RABBIT FOOT FERN DAVALLIA FEJEENSIS HOOK
Publication -
Distributed Operation of CHP and Hybrid PV Using Consensus Protocol
Publication -
Review of Diameter protocol implementations for realization of communication in NGN networks
PublicationIn the paper Diameter protocol as well as its applications in the context of Next Generation Network (NGN) are described. Diameter message content and Attribute-Value Pairs (AVPs) concept are presented. Critical review of open source Diameter implementations is carried out. The performed analysis takes into consideration programming language, availability, support and documentation aspects. Basing on the review project fulfilling...
-
Methodology of Conformity Testing of VoIP Connections Scenarios for SIP Protocol
PublicationConformity and conformity testing have always had a crucial role in telecommunications. These issues are especially important in VoIP technology with SIP protocol as there are many hardware, software and service implementations. In this paper a methodology of automatic conformity testing of VoIP connections scenarios applying to any IP network is proposed. Example implementation of the methodology as Linux shell scripts is presented....
-
Transmission protocol simulation framework for the resource-constrained sensor network
PublicationIn this paper the simulation framework for simulation of the sensor network protocol is presented. The framework enables the simultaneous development of the sensor network software and the protocol for the wireless data transmission. The advantage of using the framework is the convergence of the simulation with the real software, because the same software is used in real sensor network nodes and in the simulation framework. The...
-
Acute Effects of Different Blood Flow Restriction Protocols on Bar Velocity During the Squat Exercise
Publication -
Comparison of the main bioactive compounds and antioxidants in garlic and white and red onion after treatment protocols
PublicationPolski czosnek, biała i czerwona cebula była blanszowana, gotowana, smażona i poddawana działaniom promieniowania mikrofalowego. Następnie były w nich oznaczane m.in. takie związki jak polifenole, flawonoidy, kwas ascorbinowy i aktywne antyoksydanty. Udowodniono, że blanszowanie, smażenie i poddawanie działaniu promieniowania mikrofalowego nie wpływa znacząco na zmiejszenie zawartości badanych związków w czosnku i cebuli. Wyznaczono...
-
Acute Effects of Varied Back Squat Activation Protocols on Muscle-Tendon Stiffness and Jumping Performance
Publication -
Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences
Journals -
Current Protocols in Nucleic Acid Chemistry
Journals -
Current Protocols in Essential Laboratory Techniques
Journals -
Current Protocols in Stem Cell Biology
Journals -
PROTOCOL FOR IN VITRO MASS PRODUCTION OF NEPHROLEPIS EXALTATA SCHOTT (BOSTON FERN)
Publication -
Subgroup and per-protocol analyses from the Hypertension in the Very Elderly Trial
Publication -
Enhancing Security of Advanced Metering Infrastructure by Introducing Threshold Attendance Protocol
PublicationThe industry pushes towards smart grid systems in order to resolve current limitations of the unidirectional legacy power grid infrastructure. By introducing Advanced Metering Infrastructure (AMI) as an integral part of the smart grid solution, the utility company obtains an invaluable tool to optimize its network, lower the operational costs, and improve quality of service. Unfortunately, introducing two-way communication poses...
-
Experimental certification of an informationally complete quantum measurement in a device-independent protocol
PublicationMinimal informationally complete positive operator-valued measures (MIC-POVMs) are special kinds of measurement in quantum theory in which the statistics of their d2-outcomes are enough to reconstruct any d-dimensional quantum state. For this reason, MIC-POVMs are referred to as standard measurements for quantum information.Here, we report an experiment with entangled photon pairs that certifies, for what we believe is the first...
-
Transmission Protocol Simulation Framework For The Resource-Constrained Wireless Sensor Network
PublicationIn this paper a prototype framework for simulation of wireless sensor network and its protocols are presented. The framework simulates operation of a sensor network with data transmission, which enables simultaneous development of the sensor network software, its hardware and the protocols for wireless data transmission. An advantage of using the framework is converging simulation with the real software. Instead of creating...
-
International Workshop on Group-Oriented Cryptographic Protocols
Conferences -
JMIR Research Protocols
Journals