نتایج جستجو برای: protocol analysis

تعداد نتایج: 3017806  

Journal: :journal of current ophthalmology 0
حسن هاشمی hassan hashemi هادی زارع مهرجردی hadi z-mehrjardi مرسده مجدی mercede majdi سیدفرزاد محمدی s-farzad mohammadi محمود جباروند mahmood jabbarvand آرش معذوری arash mazouri سیدمهرداد محمدی

purpose : to report a study design for assessing the cataract surgery outcome methods : we conducted the study in an eye hospital in which over 13,300 cataract extractions are performed annually. sampling framework and recruitment included international classification of diseases (icd)-10-based electronic hospital records of patients who underwent age-related cataract extraction within the prec...

Journal: :journal of advances in computer engineering and technology 2015
forouz ghaffarizadeh ahmad khademzadeh

mobile ad hoc networks (manet) are constructed by mobile nodes without access point. since manet has certain constraints, including power shortages, an unstable wireless environment and node mobility, more power-efficient and reliable routing protocols are needed. the olsr protocol is an optimization of the classical link state algorithm. olsr introduces an interesting concept, the multipoint r...

Journal: :journal of advances in computer research 2015
hamidreza alrezaamiri mehdi golsorkhtabaramiri masoud farmanbar hamed naeemaeiaali

a typical radio frequency identification system (rfid) includes one reader and a number of tags. the reader transmit to commands to the tags with interrogation radio signals, and tags receive the command and then respond with their identification. readers with interrogation signals can read tags’ responses. in rfid systems, when multiple tags respond to one reader simultaneously, tag collision ...

2011
Hemangi Laxman Gawand

There has been extensive research on design, implementation and analysis of new dedicated protocols like group protocol, feasible protocol, secure protocol etc to cater communication requirement of distributed system. However there is no predefined strategy that can be readily used for protocol selection. Performance is defined as the efficient use of resources while still meeting the applicati...

2014
Mats Carlsson Olga Grinchtein Justin Pearson

Testing a telecommunication protocol often requires protocol log analysis. A protocol log is a sequence of messages with timestamps. Protocol log analysis involves checking that the content of messages and timestamps are correct with respect to the protocol specification. We model the protocol specification using constraint programming (MiniZinc), and we present an approach where a constraint s...

2014
Mats Carlsson Olga Grinchtein Justin Pearson

Testing a telecommunication protocol often requires protocol log analysis. A protocol log is a sequence of messages with timestamps. Protocol log analysis involves checking that the content of messages and timestamps are correct with respect to the protocol specification. We model the protocol specification using constraint programming (MiniZinc), and we present an approach where a constraint s...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه ارومیه 1377

the methods which are used to analyze microstrip antennas, are divited into three categories: empirical methods, semi-empirical methods and full-wave analysis. empirical and semi-empirical methods are generally based on some fundamental simplifying assumptions about quality of surface current distribution and substrate thickness. thses simplificatioms cause low accuracy in field evaluation. ful...

Journal: :JCP 2009
Yefei Zhao Zongyuan Yang Jinkui Xie Qiang Liu

System states space based on Kripke structure can be exhausted by model checking, thus system key property described by temporal logic can be automatically verified. Presently model checking has been widely used in hardware validation and network protocol analysis. Sliding window protocol is a classical receive-send protocol, which is used in TCP/IP protocol group. In this paper, we propose the...

ژورنال: توانبخشی 2017

Objective Stuttering is a disorder in fluency that is identified through involuntary interruptions in continuous speech. There are different types of the disorder, including growth stuttering with acquired and malingering origins. With respect to the law of exemption of stuttering individuals from military service, the issue of malingering is quite common. Since there is no standard tool to...

Journal: :CoRR 2009
John D. Ramsdell Joshua D. Guttman Jonathan K. Millen Brian O'Hanlon

This paper describes the CAVES attestation protocol and presents a toolsupported analysis showing that the runs of the protocol achieve stated goals. The goals are stated formally by annotating the protocol with logical formulas using the rely-guarantee method. The protocol analysis tool used is the Cryptographic Protocol Shape Analyzer.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید