نتایج جستجو برای: protocol analysis
تعداد نتایج: 3017806 فیلتر نتایج به سال:
purpose : to report a study design for assessing the cataract surgery outcome methods : we conducted the study in an eye hospital in which over 13,300 cataract extractions are performed annually. sampling framework and recruitment included international classification of diseases (icd)-10-based electronic hospital records of patients who underwent age-related cataract extraction within the prec...
mobile ad hoc networks (manet) are constructed by mobile nodes without access point. since manet has certain constraints, including power shortages, an unstable wireless environment and node mobility, more power-efficient and reliable routing protocols are needed. the olsr protocol is an optimization of the classical link state algorithm. olsr introduces an interesting concept, the multipoint r...
a typical radio frequency identification system (rfid) includes one reader and a number of tags. the reader transmit to commands to the tags with interrogation radio signals, and tags receive the command and then respond with their identification. readers with interrogation signals can read tags’ responses. in rfid systems, when multiple tags respond to one reader simultaneously, tag collision ...
There has been extensive research on design, implementation and analysis of new dedicated protocols like group protocol, feasible protocol, secure protocol etc to cater communication requirement of distributed system. However there is no predefined strategy that can be readily used for protocol selection. Performance is defined as the efficient use of resources while still meeting the applicati...
Testing a telecommunication protocol often requires protocol log analysis. A protocol log is a sequence of messages with timestamps. Protocol log analysis involves checking that the content of messages and timestamps are correct with respect to the protocol specification. We model the protocol specification using constraint programming (MiniZinc), and we present an approach where a constraint s...
Testing a telecommunication protocol often requires protocol log analysis. A protocol log is a sequence of messages with timestamps. Protocol log analysis involves checking that the content of messages and timestamps are correct with respect to the protocol specification. We model the protocol specification using constraint programming (MiniZinc), and we present an approach where a constraint s...
the methods which are used to analyze microstrip antennas, are divited into three categories: empirical methods, semi-empirical methods and full-wave analysis. empirical and semi-empirical methods are generally based on some fundamental simplifying assumptions about quality of surface current distribution and substrate thickness. thses simplificatioms cause low accuracy in field evaluation. ful...
System states space based on Kripke structure can be exhausted by model checking, thus system key property described by temporal logic can be automatically verified. Presently model checking has been widely used in hardware validation and network protocol analysis. Sliding window protocol is a classical receive-send protocol, which is used in TCP/IP protocol group. In this paper, we propose the...
Objective Stuttering is a disorder in fluency that is identified through involuntary interruptions in continuous speech. There are different types of the disorder, including growth stuttering with acquired and malingering origins. With respect to the law of exemption of stuttering individuals from military service, the issue of malingering is quite common. Since there is no standard tool to...
This paper describes the CAVES attestation protocol and presents a toolsupported analysis showing that the runs of the protocol achieve stated goals. The goals are stated formally by annotating the protocol with logical formulas using the rely-guarantee method. The protocol analysis tool used is the Cryptographic Protocol Shape Analyzer.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید