Showing 1,201 - 1,220 results of 1,303 for search '"communication protocol"', query time: 0.14s Refine Results
  1. 1201

    A Survey on Cyber-Physical Security of Active Distribution Networks in Smart Grids by Mohsen Khalaf, Abdelrahman Ayad, Mosaddek Hossain Kamal Tushar, Marthe Kassouf, Deepa Kundur

    Published 2024-01-01
    “…In addition, the challenges and requirements of associated communication protocols and standards are presented. Cybersecurity of ADN devices and sensors including Phasor Measurement Units (PMUs), smart meters, advanced metering infrastructure and protection relays are discussed in detail. …”
    Get full text
    Article
  2. 1202

    Digital Discovery of 100 diverse Quantum Experiments with PyTheus by Carlos Ruiz-Gonzalez, Sören Arlt, Jan Petermann, Sharareh Sayyad, Tareq Jaouni, Ebrahim Karimi, Nora Tischler, Xuemei Gu, Mario Krenn

    Published 2023-12-01
    “…This includes the discovery of highly entangled quantum states, quantum measurement schemes, quantum communication protocols, multi-particle quantum gates, as well as the optimization of continuous and discrete properties of quantum experiments or quantum states. …”
    Get full text
    Article
  3. 1203

    A Collaborative Approach for Engaging Students with Severe Disabilities in Physical Education by Michelle Grenier, Matthew Patey, Lauren Lieberman, Ali Brian

    Published 2020-11-01
    “…Recommendations for identifying communication protocols and establishing collaborative practices are provided.…”
    Get full text
    Article
  4. 1204

    Analysis of research results of different aspects of network security and Internet of Things under the background of big data by Lu Yinglun, Wang Xiang, Xie Taotao, Xie Tian

    Published 2023-07-01
    “…Both of these methods can effectively protect network security: one is to control data flow, and the other is to start with communication protocols. Finally, this article analyzed the adoption of network security protection measures by netizens and found that only 13% of netizens frequently take network security protection measures, while 35% of netizens never take network security protection measures. …”
    Get full text
    Article
  5. 1205

    Investigating the Security of OpenPLC: Vulnerabilities, Attacks, and Mitigation Solutions by Wael Alsabbagh, Chaerin Kim, Peter Langendorfer

    Published 2024-01-01
    “…These encompass issues such as unauthorized access, vulnerabilities in communication protocols, concerns regarding data integrity, the absence of robust encryption mechanisms, etc. …”
    Get full text
    Article
  6. 1206

    On the Assessment of Cyber Risks and Attack Surfaces in a Real-Time Co-Simulation Cybersecurity Testbed for Inverter-Based Microgrids by Kirti Gupta, Subham Sahoo, Bijaya Ketan Panigrahi, Frede Blaabjerg, Petar Popovski

    Published 2021-08-01
    “…Furthermore, communication protocols such as Modbus, sampled measured values (SMVs), generic object-oriented substation event (GOOSE) and distributed network protocol 3 (DNP3) on an Ethernet-based interface were established, which map the interaction among the corresponding nodes of cyber-physical layers and also synchronizes data transmission between the systems. …”
    Get full text
    Article
  7. 1207

    A Bleeding Edge Web Application for Early Detection of Cyanobacterial Blooms by Jesús Chacón, Giordy A. Andrade, Jose L. Risco-Martín, Segundo Esteban

    Published 2024-02-01
    “…This paper also investigates the practical implementation of an IoT-based EWS, discussing design considerations, sensor technologies, and communication protocols essential for seamless data integration and effective operation of the EWS.…”
    Get full text
    Article
  8. 1208

    Industry 4.0: a systematic review of legacy manufacturing system digital retrofitting by Alqoud Abdulrahman, Schaefer Dirk, Milisavljevic-Syed Jelena

    Published 2022-01-01
    “…The results include insights common technologies used in retrofitting, hardware and software components typically required, and suitable communication protocols for establishing interoperability across the enterprise. …”
    Get full text
    Article
  9. 1209

    Towards Reliable and Energy-Efficient Incremental Cooperative Communication for Wireless Body Area Networks by Sidrah Yousaf, Nadeem Javaid, Umar Qasim, Nabil Alrajeh, Zahoor Ali Khan, Mansoor Ahmed

    Published 2016-02-01
    “…Results of incremental relay-based cooperative communication protocols are compared to two existing cooperative routing protocols: cooperative critical data transmission in emergencies for static WBANs (Co-CEStat) and InCo-CEStat. …”
    Get full text
    Article
  10. 1210

    A survey on communication components for IoT-based technologies in smart homes by Zaidan, Aws Alaa, Zaidan, Bilal Bahaa, Yas, Qahtan Majeed, Albahri, O.S., Albahri, A.S., Alaa, Mussab, Jumaah, Fawaz Mohammed, Talal, Mohammed, Tan, Kian Lam, Shir, W.L., Lim, Chen Kim

    Published 2018
    “…With the exception of the 82 articles reviewed earlier, the telecommunication standards and concepts of this research were covering IoT solutions, communication protocols, IoT stack protocol, and quality of service for IoT based smart home technologies.…”
    Article
  11. 1211
  12. 1212

    The Design of the Digital Direct Control (DDC) used in the Building Management System (BMS) by Ayman Nbhan

    Published 2018-09-01
    “… In this paper, the work is based on the design of direct digital control circuits (DDC) which is one of the most important parts of the building management system (BMS) and the design of communication protocols necessary. This work has its importance from a technical point especially developed control software needed to design, in addition to the economic terms of providing these circuits through local manufacturing have not needed to be imported (which is not easy in most cases). …”
    Get full text
    Article
  13. 1213

    A Secure Long-Range Transceiver for Monitoring and Storing IoT Data in the Cloud: Design and Performance Study by Nurul I. Sarkar, Asish Thomas Kavitha, Md Jahan Ali

    Published 2022-11-01
    “…Due to the high demand for Internet of Things (IoT) and real-time data monitoring and control applications in recent years, the long-range (LoRa) communication protocols leverage technology to provide inter-cluster communications in an effective manner. …”
    Get full text
    Article
  14. 1214

    Operating modes of grid integrated PV-solar based electric vehicle charging system- a comprehensive review by Alok Jain, Suman Bhullar

    Published 2024-06-01
    “…Hybrid and on-board charging systems offer benefits such as reduced weight, faster charging, and improved communication protocols. On-board chargers have higher energy transfer but are more expensive and difficult to integrate with charging stations. …”
    Get full text
    Article
  15. 1215

    Comparative Research of Patent Citations of Patent Applicants and Patent Examiners:A Case Study in the Field of 5G Communication Technologies by WU Qingyuan, ZHAO Sidi

    Published 2021-03-01
    “…In terms of the patent technology content, the applicant citations focus on the research and development of communication equipment and devices, as well as the research of communication protocols and technical methods, while the examiner citations focus on the technical research of communication methods and transmission.…”
    Get full text
    Article
  16. 1216

    <i>Living in the Dark</i>: MQTT-Based Exploitation of IoT Security Vulnerabilities in ZigBee Networks for Smart Lighting Control by Noon Hussein, Armstrong Nhlabatsi

    Published 2022-11-01
    “…In order to address this challenge the adoption of IoT devices in automation has mandated the adoption of secure communication protocols to ensure that compromised key security objectives, such as confidentiality, integrity, and availability are addressed. …”
    Get full text
    Article
  17. 1217

    Exploration of transferable deep learning-aided radio frequency fingerprint identification systems by Shen Guanxiong, Zhang Junqing

    Published 2024-01-01
    “…RFFI is suitable for securing the legacy existing Internet of Things (IoT) networks since it does not require any modifications to the existing end-node hardware and communication protocols. However, most deep learning-based RFFI systems require the collection of a great number of labelled signals for training, which is time-consuming and not ideal, especially for the IoT end nodes that are already deployed and configured with long transmission intervals. …”
    Get full text
    Article
  18. 1218

    SPECIFICS OF IMPLEMENTATION OF THE ASYMMETRIC ENCRYPTION ALGORITHM ON ELLIPTIC CURVES by Kalynovych S. M., Golovko V. G.

    Published 2023-04-01
    “…Moreover, elliptic curve cryptography has found applications in several areas, including secure communication protocols, digital signatures, and key exchange algorithms. …”
    Get full text
    Article
  19. 1219

    Provably Safe Artificial General Intelligence via Interactive Proofs by Kristen Carlson

    Published 2021-10-01
    “…Interactive proof systems (IPS) describe mathematical communication protocols wherein a Verifier queries a computationally more powerful Prover and reduces the probability of the Prover deceiving the Verifier to any specified low probability (e.g., 2<sup>−100</sup>). …”
    Get full text
    Article
  20. 1220