Search results for "Protocol"

showing 10 items of 1808 documents

Towards integrated operations for ships

2013

Maritime customers will benefit greatly from integrated operations between ship and shore. It requires integrating diverse information services within a variety of communication environments, which is a complex task. The common approach to dealing with complex tasks is to use a divide-and-conquer policy and solve problems independently. Since there are mainly two challenges involved - interoperability among heterogeneous applications and connectivity through difficult maritime networks, to handle them separately has become useful. While interoperability and connectivity solutions work well individually, if we put them together in the maritime context, problems arise. We b services based int…

Network architectureComputer sciencecomputer.internet_protocolDistributed computingInteroperabilityContext (language use)Service-oriented architectureIntegrated operationscomputer.software_genreSoftware deploymentMediationInformation systemWeb servicecomputerImplementation2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC)
researchProduct

Towards a relation oriented service architecture

2010

Over the past three decades, the Internet has evolved from a point to point, open, academic network to an applications and services oriented critical infrastructure. The Internet has become a vital component of society today, from its simple origin as an academic research project. During this transition, numerous applications and usages of the network emerged that cannot be efficiently implemented by adhering to the original design tenets of the Internet. Some of the tenets have been broken, others diluted and new ones are emerging to accommodate new paradigms. Moreover, applications and services have been moving slowly but consistently towards a uniform model based on Service Oriented Appr…

Network architecturecomputer.internet_protocolbusiness.industryComputer scienceQuality of serviceInteroperabilityService-oriented architectureComputer securitycomputer.software_genreBackward compatibilityWorld Wide WebNext-generation networkThe InternetSoftware architecturebusinesscomputer2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010)
researchProduct

FUZZY TCP: A PRELIMINARY STUDY

2002

Implementing efficient TCP for the Internet necessarily has to cope with the problem that the source does not know in advance which window allocation policy should be the best to use for a given network condition. In this paper, an on-line adaptive fuzzy system is used at the source in an objective to find the best possible weighted combination among the available policies.

Network congestionMathematical optimizationEngineeringTCP accelerationbusiness.industryDistributed computingHSTCPZeta-TCPTCP tuningTCP delayed acknowledgmentbusinessCommunications protocolFuzzy logicIFAC Proceedings Volumes
researchProduct

Transport Protocols for Remote Programming of Network Robots within the context of Telelaboratories for Education: A Comparative Analysis

2007

Within the context of tele-laboratories for education the use of the Internet as communication media permits any researcher/student to perform remote experiments in a simple and reliable manner. Moreover, this situation introduces many interesting issues like network protocols for Internet robots, the effects of variable bandwidth and time-delays on telerobotics, etc. In this paper we present a comparative analysis of using several Internet transport protocols when performing a remote experiment within the UJI Industrial Telelaboratory. TCP, UDP, Trinomial and TEAR protocols are analyzed using the NS2 simulator. Conclusions show a set of characteristics the authors of this paper consider ve…

Network congestionSIMPLE (military communications protocol)business.industryComputer scienceInternet layerDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSThe InternetContext (language use)businessCommunications protocolProtocol (object-oriented programming)Computer network2007 16th International Conference on Computer Communications and Networks
researchProduct

Performance Evaluation of CANIT Algorithm in Presence of Congestion Losses

2001

In this paper, we analize by queuing-simulation CANIT (Congestion Avoidance with Normalized Interval of Time) algorithm performances in presence of congestion losses. In a former work [3], we proposed the algorithm (CANIT) for TCP (Transmission Control Protocol) congestion avoidance phase in order to improve fairness during this phase, and we showed that using CANIT algorithm in an environment without loss, instead of standard congestion avoidance algorithm improves both congestion avoidance fairness and bandwith utilization for long RTT connections. In this paper, we consider congestion losses and show that the fairness as well as the bandwith utilization are more efficient when using CANI…

Network congestionTraffic congestionComputer scienceTransmission Control ProtocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSFairness measureTCP tuningCongestion windowRound-trip delay timeInterval (mathematics)H-TCPTCP congestion-avoidance algorithmAlgorithm
researchProduct

Feasibility of FPGA accelerated IPsec on cloud

2018

Abstract Hardware acceleration for famous VPN solution, IPsec, has been widely researched already. Still it is not fully covered and the increasing latency, throughput, and feature requirements need further evaluation. We propose an IPsec accelerator architecture in an FPGA and explain the details that need to be considered for a production ready design. This research considers the IPsec packet processing without IKE to be offloaded on an FPGA in an SDN network. Related work performance rates in 64 byte packet size for throughput is 1–2 Gbps with 0.2 ms latency in software, and 1–4 Gbps with unknown latencies for hardware solutions. Our proposed architecture is capable to host 1000 concurre…

Network securityComputer Networks and CommunicationsComputer sciencecomputer.internet_protocolPacket processingCloud computing02 engineering and technologycomputer.software_genreEncryptionGeneralLiterature_MISCELLANEOUSArtificial IntelligenceServer0202 electrical engineering electronic engineering information engineeringField-programmable gate arrayVirtual network0505 lawbusiness.industryNetwork packet05 social sciencesComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020208 electrical & electronic engineeringByteVirtualization020202 computer hardware & architectureHardware and ArchitectureEmbedded systemIPsec050501 criminologyHardware accelerationbusinesscomputerSoftwareMicroprocessors and Microsystems
researchProduct

Controlled education of patients after stroke (ceops)-nurse-led multimodal and long-term interventional program involving a patient''s caregiver to o…

2018

Background Setting up a follow-up secondary prevention program after stroke is difficult due to motor and cognitive impairment, but necessary to prevent recurrence and improve patients’ quality of life. To involve a referent nurse and a caregiver from the patient’s social circle in nurse-led multimodal and long-term management of risk factors after stroke could be an advantage due to their easier access to the patient and family. The aim of this study is to compare the benefit of optimized follow up by nursing personnel from the vascular neurology department including therapeutic follow up, and an interventional program directed to the patient and a caregiving member of their social circle,…

Neurologic ExaminationPatient Care TeamTime FactorsNurseSecondary prevention[SDV]Life Sciences [q-bio]Stroke RehabilitationRecovery of FunctionCombined Modality TherapyNurse's RoleMultimodal intervention;Family caregiver;Nurse;Secondary prevention;Stroke[SDV] Life Sciences [q-bio]StrokeStudy ProtocolDisability EvaluationLeadershipTreatment OutcomeCaregiversPatient Education as TopicMultimodal interventionHumansFranceFamily caregiverRandomized Controlled Trials as Topic
researchProduct

A Sliding Window-Based Method to Detect Selective Constraints in Protein-Coding Genes and Its Application to RNA Viruses

2002

Here we present a new sliding window-based method specially designed to detect selective constraints in specific regions of a multiple protein-coding sequence alignment. In contrast to previous window-based procedures, our method is based on a nonarbitrary statistical approach to find the appropriate codon-window size to test deviations of synonymous (d(S)) and nonsynonymous (d(N)) nucleotide substitutions from the expectation. The probabilities of d(N) and d(S) are obtained from simulated data and used to detect significant deviations of d(N) and d(S) in a specific window region of the real sequence alignment. The nonsynonymous-to-synonymous rate ratio (w = d(N)/d(S)) was used to highlight…

Nonsynonymous substitutionGenes ViralSequence alignmentBiologyGenes envEvolution MolecularViral ProteinsSliding window protocolGeneticsRNA VirusesSelection GeneticMolecular BiologyGenePhylogenyEcology Evolution Behavior and SystematicsSelection (genetic algorithm)GeneticsBase SequenceReproducibility of ResultsContrast (statistics)RNAWindow (computing)Genes gagFoot-and-Mouth Disease VirusDNA ViralHIV-1Capsid ProteinsSequence AlignmentAlgorithmJournal of Molecular Evolution
researchProduct

Edició de les notícies de Gaspar Eiximeno (1489-1492)

1995

Noticias histórico-topográficasUNESCO::HISTORIA::Historia por épocas::Historia antiguaEdiciónProtocolos notarialesNotarios:HISTORIA::Historia por épocas::Historia antigua [UNESCO]
researchProduct

Multiple register synchronization with a high-speed serial link using the Aurora protocol

2013

In this work, the development and characterization of a multiple synchronous registers interface communicating with a high-speed serial link and using the Aurora protocol is presented. A detailed description of the developing process and the characterization methods and hardware test benches are also included. This interface will implement the slow control busses of the digitizer cards for the second generation of electronics for the Advanced GAmma Tracking Array (AGATA).

Nuclear and High Energy PhysicsComputer scienceSerial communicationFirmwarebusiness.industryInterface (computing)Process (computing)computer.software_genreSynchronizationNuclear Energy and EngineeringElectronic engineeringAGATAElectrical and Electronic EngineeringField-programmable gate arraybusinessProtocol (object-oriented programming)computerComputer hardware2012 18th IEEE-NPSS Real Time Conference
researchProduct