Articles with "protocol based" as a keyword



Photo by briqn from unsplash

Quantum Key Distribution Protocol Based on Modified Generalization of Deutsch-Jozsa Algorithm in d-level Quantum System

Sign Up to like & get
recommendations!
Published in 2018 at "International Journal of Theoretical Physics"

DOI: 10.1007/s10773-018-3910-4

Abstract: In this paper, we consider the modified generalization of the Deutsch-Jozsa algorithm in the d-level (qudits) quantum system to determine the types of the function f (constant or linear) that had been used. A comparison… read more here.

Keywords: deutsch jozsa; quantum; jozsa algorithm; protocol based ... See more keywords
Photo by hudsoncrafted from unsplash

Analyzing and Improving the Secure Quantum Dialogue Protocol Based on Four-Qubit Cluster State

Sign Up to like & get
recommendations!
Published in 2020 at "International Journal of Theoretical Physics"

DOI: 10.1007/s10773-020-04485-2

Abstract: As we know, if a quantum communication protocol has the information leakage problem, it is an insecure protocol, so we should carefully design the protocol to avoid the information leakage problem. Unfortunately, we find this… read more here.

Keywords: quantum dialogue; secure quantum; dialogue protocol; protocol ... See more keywords
Photo from wikipedia

An authentication protocol based on chaos and zero knowledge proof

Sign Up to like & get
recommendations!
Published in 2020 at "Nonlinear Dynamics"

DOI: 10.1007/s11071-020-05463-3

Abstract: Port Knocking is a method for authenticating clients through a closed stance firewall, and authorising their requested actions, enabling severs to offer services to authenticated clients, without opening ports on the firewall. Advances in port… read more here.

Keywords: based chaos; authentication protocol; port knocking; protocol based ... See more keywords
Photo from wikipedia

Protocol-based management in orbital retinoblastoma

Sign Up to like & get
recommendations!
Published in 2018 at "Orbit"

DOI: 10.1080/01676830.2017.1383449

Abstract: We read with interest the article, “Adult onset retinoblastoma: A diagnostic dilemma” by Raj et al. where they have presented a case of a previously undiagnosed retinoblastoma (RB) which was eviscerated and subsequently treated. Adult-onset… read more here.

Keywords: based management; management orbital; retinoblastoma; previously undiagnosed ... See more keywords
Photo from wikipedia

New protocol based on massive parallel sequencing for aneuploidy screening of preimplantation human embryos

Sign Up to like & get
recommendations!
Published in 2017 at "Systems Biology in Reproductive Medicine"

DOI: 10.1080/19396368.2017.1312633

Abstract: ABSTRACT Novel next-generation sequencing procedures have rapidly emerged into the preimplantation genetic screening framework. This work presents the design and validation of a new low-coverage whole-genome sequencing assay for aneuploidy detection in single blastomeres and… read more here.

Keywords: human embryos; new protocol; based massive; preimplantation ... See more keywords
Photo by jontyson from unsplash

Abstract P-591: THE EFFECT OF WEANING PROTOCOL BASED ON SPONTANEOUS BREATHING TRIAL ON THE DURATION OF MECHANICAL VENTILATION AND WEANING TIME.

Sign Up to like & get
recommendations!
Published in 2018 at "Pediatric Critical Care Medicine"

DOI: 10.1097/01.pcc.0000538048.90849.f9

Abstract: Study was done over a period of 7 months in the PICU. All Children admitted in PICU, who require respiratory support (Non-invasive/ Invasive) are recruited in the study. Children with congenital heart disease, chronic lung… read more here.

Keywords: weaning protocol; 591 effect; time; effect weaning ... See more keywords
Photo from wikipedia

Authenticated QKD Protocol Based on Single-Photon Interference

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3009090

Abstract: As is known, quantum key distribution (QKD) can provide information-theoretic security under some preconditions, one of which is that the identity of each participant has been authenticated. And quantum identity authentication (QIA) can achieve this… read more here.

Keywords: qkd; qia protocol; protocol; qkd protocol ... See more keywords
Photo by joshuafernandez from unsplash

Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2021.3137201

Abstract: Since its inception, the Internet of Things (IoT) has witnessed mushroom growth as a breakthrough technology. In a nutshell, IoT is the integration of devices and data such that processes are automated and centralized to… read more here.

Keywords: intrusion detection; protocol based; detection; deep intrusion ... See more keywords

Research on Clustering Routing Protocol Based on Improved PSO in FANET

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Sensors Journal"

DOI: 10.1109/jsen.2021.3117496

Abstract: In disaster response, 2D wireless sensor networks fail to be deployed since a large number of sensors cannot be placed in harsh ground environments. In this case, as the best air carrier for sensors, unmanned… read more here.

Keywords: fanet; research clustering; protocol based; routing protocol ... See more keywords
Photo by dnevozhai from unsplash

Traffic-Aware VANET Routing for City Environments—A Protocol Based on Ant Colony Optimization

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2018.2806996

Abstract: This paper presents a traffic-aware position-based routing protocol for vehicular ad hoc networks (VANETs) suitable for city environments. The protocol is an enhanced version of the geographical source routing (GSR) protocol. The proposed protocol, named… read more here.

Keywords: environments protocol; vanet routing; traffic aware; protocol ... See more keywords
Photo by mkate7 from unsplash

Protocol-Based Control for Discrete-Time Positive Markovian Switching Models With Deception Attacks

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Circuits and Systems II: Express Briefs"

DOI: 10.1109/tcsii.2022.3220019

Abstract: This brief investigates the problem of protocol-based control for positive Markovian switching models subject to actuator faults and deception attacks. Bernoulli distribution is adopted to depict random deception attacks. Considering the positivity of Markovian switching… read more here.

Keywords: markovian switching; protocol based; deception attacks; switching models ... See more keywords