Protocol design and (de-)centralization
In: Discussion paper series 6357
In: Public policy
2680 Ergebnisse
Sortierung:
In: Discussion paper series 6357
In: Public policy
In: International Journal of Social Science and Humanity: IJSSH, Band 6, Heft 3, S. 235-238
ISSN: 2010-3646
In: International journal of business data communications and networking: IJBDCN ; an official publication of the Information Resources Management Association, Band 11, Heft 1, S. 50-60
ISSN: 1548-064X
With the increase of mobile activities in technological environment, it is a challenge to develop and maintain robust networking system with provision of high connectivity. In this context, Mobile Adhoc Network (MANET) is a feasible solution because it is dynamic in nature and the self-configured nodes of MANET can communicate intelligently in adverse and dynamic mobile situations. Though Adhoc on Demand Distance Vector (AODV) Routing protocol handles the networking issues efficiently, still power and delay efficiency has always been a challenging task in MANET due to the resource constrained nodes which are supplied with limited battery power during the operation in the network. Hence while performing various networking activities; gradually the battery power reduces resulting in delay in processing of packet and forwarding them to the next node during transmission. This causes overall end to end delay in the total transmission. Therefore many researches are still going on in the direction of designing robust and reliable protocols. In this paper the authors have developed a robust and energy efficient routing protocol for MANET with real time support. Their approach is different as it calculates the remaining residual battery power, bounded delay and packet processing rate of the intermediate node before selecting a node to forward the packet in the direction of destination. The cost function calculated using the above three factors along with the condition of congested node is also checked to correctly choose a load balanced path from source to destination. Simulation results show that the proposed protocol performs better than the conventional AODV protocol in terms of better network life time, throughput, delay and packet delivery ratio.
In: Family court review: publ. in assoc. with: Association of Family and Conciliation Courts, Band 59, Heft 3, S. 534-554
ISSN: 1744-1617
In child custody litigation, protecting child safety during access with a parent with substance use disorder (SUD) presents a vexing challenge for the court, parents, and parents' counsel. Standardization of monitoring protocols for this population is lacking. Monitoring protocols utilized in clinical settings and child welfare agencies are not necessarily applicable to child custody litigation. This article is the first of its kind to initiate standardization of monitoring protocols for parental substance use in child custody litigation. This article also proposes the inclusion of, and rationale for, a neutral evaluator and a separate neutral monitor to oversee the monitoring protocol. Topics that inform the practical aspects of protocol design and implementation, such as relapse risk, monitoring duration, treatment recommendations, mandated treatment, mutual help groups, and confidentiality, are described. Family courts and matrimonial counsel benefit from an understanding of the rationale for the evaluation, treatment, and monitoring of parental substance use disorders by individuals with expertise and/or certification in substance use disorders and forensic toxicology.
In: NBER Working Paper No. w26951
SSRN
Working paper
SSRN
Working paper
In: TPRC 2011
SSRN
SSRN
Working paper
In: International journal of business data communications and networking: IJBDCN ; an official publication of the Information Resources Management Association, Band 1, Heft 4, S. 66-80
ISSN: 1548-064X
Unlike SET (Secure Electronic Transaction) protocol, this paper proposes a SEEP (Security Enhanced Electronic Payment) protocol, which uses ECC (Elliptic Curve Cryptosystem with F2m not Fp) (Koblitz, 1987; Harper, Menezes, & Vanstone, 1993; Miller, 1986), SHA (Secure Hash Algorithm), and 3BC (Block Byte Bit Cipher) instead of RSA and DES. To improve the strength of encryption and the speed of processing, the public key and the private key of ECC and HECC (Hyper Elliptic Curve Cryptosystem) are used in 3BC (Cho & Lee, 2002; Cho, Shin, Lee, & Lee, 2002) algorithm, which generates session keys for the data encryption. In particular, when ECC and HECC are combined with 3BC, the strength of security is improved significantly. As the process of the digital envelope used in the existing SET protocol is removed by the 3BC algorithm in this paper, the processing time is reduced substantially. In addition, the use of multiple signatures has some advantages, such as reducing the size of transmission data as an intermediate payment agent and avoiding the danger of eavesdropping of private keys.
In: American journal of health promotion, Band 32, Heft 3, S. 718-728
ISSN: 2168-6602
Purpose:To examine changes in eating competence (EC) in 12-month weight loss intervention.Design:Randomized, parallel-arm with weight loss phase (baseline to month 4) and weight-maintenance phase (months 4-12).Setting:Face-to-face in University classrooms, supervised and self-directed fitness sessions at University fitness center, and home.Participants:Premenopausal, mostly college-educated Pennsylvania women, body mass index >25 (n = 101).Intervention:Twenty-eight, 1-hour classes tailored for extremes of the Dietary Guidelines' fat recommendations, based on social cognitive theory, problem-based learning delivery over 12 months. Exercise component included supervised and self-directed stretching, aerobics, and strength training.Measures:Anthropometrics, lipid profile, blood pressure, 24-hour dietary recalls, cognitive behavioral measures, Satter Eating Competence Inventory (ecSI).Analysis:General linear model repeated measures analysis of variance for outcome variables.Results:A total of 40% (n = 40) completed the ecSI. Overall, education and supervised exercise session attendance were 77% and 88%, respectively. Similar weight loss for lower and moderate fat groups (6.7 kg and 5.4 kg). The EC was unchanged baseline to month 4 but increased significantly from months 4 to 12, baseline to month 12 for both groups. The EC change baseline to month 12 was inversely associated with weight change from baseline to months 4 and 12.Conclusion:Weight management interventions, likely to introduce concerns with eating attitudes, behaviors, and foods, can reduce EC. Short-term measurement of EC change captures these consequent adjustments without opportunity to regain self-efficacy. Extending the measurement interval better reflects intervention impact on EC.
In: Journal of information policy: JIP, Band 11, S. 376-402
ISSN: 2158-3897
ABSTRACTThis article discusses the shortcomings of value in design approach to protect human rights on the Internet. It argues that Internet protocols do not single handedly mitigate human rights on the Internet and in order to measure their impact, they need to be put in context. In other words, instead of design determinism, contextual analysis of Internet technologies that involve Internet protocols should take place.
In: Computers ; Volume 8 ; Issue 1
The Japanese government aims to introduce self-driven vehicles by 2020 to reduce the number of accidents and traffic jams. Various methods have been proposed for traffic control at accident-prone intersections to achieve safe and efficient self-driving. Most of them require roadside units to identify and control vehicles. However, it is difficult to install roadside units at all intersections. This paper proposes an inter-vehicle communication protocol that enables vehicles to transmit their vehicle information and moving direction information to nearby vehicles. Vehicles identify nearby vehicles using images captured by vehicle-mounted cameras. These arrangements make it possible for vehicles to exchange yielding intention at an unsignalized intersection without using a roadside unit. To evaluate the operations of the proposed protocol, we implemented the protocol in Raspberry Pi computers, which were connected to cameras and mounted on radio control cars and conducted experiments. The experiments simulated an unsignalized intersection where both self-driven and human-driven vehicles were present. The vehicle that had sent a yielding request identified the yielding vehicle by recognizing the colour of each radio control car, which was part of the vehicle information, from the image captured by its camera. We measured a series of time needed to complete the yielding sequence and evaluated the validity of yielding decisions.
BASE
SSRN
Current research developing year's lot of young research's interested in Mobile Ad-hoc Networks (MANET's) a collection of independent mobile nodes dynamically form a network connection temporarily without any base station of static infrastructure. The self-configuring ability of nodes in MANETs made it popular among critical applications like military use or natural emergency recovery. Many of the suggested protocols assume that all nodes in the network are supportive, and do not address any safety problem. To adjust to such trend, it is vital to address its potential security issues. The main objective of this paper is design new secure routing protocol namely, Secure Dynamic On-Demand Routing Protocol (SDORP) to define the path for security and to further improve throughput, routing overhead, packet delivery ratio and at the same time to create energy enhanced way with excellent security. We are implementing secure dynamic on-demand routing protocol in order to achieve security goals for following parameters packet delivery ratio, routing overhead, end-to-end delay, average energy, packet loss and throughput. The proposed model test SDORP with existing AODV reactive routing protocol and analysis stimulated through Network Simulated (NS2).
BASE
In: Decision Making in Engineering Design, S. 265-280