Advanced searches left 3/3

Protocol - Zenodo

Summarized by Plex Scholar
Last Updated: 24 September 2022

* If you want to update the article please login/register

RNA preservation & RNA extraction protocol suitable for field collection of coral samples

The ability to gather samples suitable for RNA extraction in remote field settings is usually hindered by the desire for immediate processing or freezing of samples in liquid nitrogen for the preservation of nucleic acid integrity. Here we tried two commonly available RNA storage buffers, RNA later from Thermo Fisher Scientific and DNA/RNA Shield from Zymo Research, as well as subsequent RNA extraction using the RNeasy Mini Kit from Qiagen. We reviewed three common coral genera that were reported to produce varying degrees of RNA quality and quantity, partially due to different amounts of mucus that co-purifies with RNA. In combination with the RNeasy Mini Kit, we discovered DNA/RNA Shield, resulting in non-degraded high quality total RNA. In summary, we created a protocol for coral RNA preservation and RNA extraction that was suitable for use in remote field settings that yield sufficiently concentrated, high quality RNA for use in downstream molecular applications.

Source link: https://zenodo.org/record/7108092


Hybrid security in AOMDV routing protocol with improved salp swarm algorithm in wireless sensor network

The latest trends in the field of wireless sensor network based applications shows a rapid growth over the past two years. With improved salp swarm routing capabilities, we developed a protocol namely hybrid defense in an on-demand multipath distance vector routing protocol with improved salp swarm routing code. They are, wormhole attack and gray hole attack construction AOMDV protocol and a gray hole construction AOMDV protocol is used for weighted distance position updates, which results in increased productivity. We use hybrid defense to shield the network from attacks, including the Diffie-Hellman key interchange algorithm and elliptic-curve cryptography algorithm.

Source link: https://zenodo.org/record/7106345


S-CDCA: a semi-cluster directive-congestion protocol for priority-based data in WSNs

A sensor network is a networked network of nodes equipped with sensor module and computation components linked by network interfaces. A sensor network is a network of nodes with sensory module and computation elements connected by network interfaces. Wireless sensor networks are the most popular type of sensor networks. sensor networks are the most popular form of sensor networks. Wireless sensor networks are the most popular form of sensor networks. This paper describes a semi-cluster directive congestion scheme that allivites network congestion for priority-based data transmission. The methods increase the network's reliability by implementing a temporary cluster for low priority data packets while still providing a concrete link between the high-prior data source node and the network base station.

Source link: https://zenodo.org/record/7096109


Performance analysis routing protocol between RIPv2 and EIGRP with termination test on full mesh topology

This research explores whether or routing protocols that data packets are sent will determine this routing protocol in the form of table routing. Routing tested adip routing information protocol version 2 with a modern interior gateway routing protocol, which will be compared on both routing protocols to ensure that it is competitive against predetermined situations. The results of the study using the Cisco packet tracer 7. 10 app show that EIGRP routing on two topologies has faster convergence time speed in 0. 05-1. 02 seconds, as well as the modification of its routing table at once.

Source link: https://zenodo.org/record/7095980


A meta-analysis of channel switching approaches for reducing zapping delay in internet protocol television

Channel zapping delays are common issues that are often encountered by Internet protocol television viewers. It's a major bottleneck in the IPTV channels switching scheme that affects user experience. Consequently, many channels switching tactics have been suggested to minimize the zapping delay in IPTV. In forest plots, the total pooled estimated delay component was displayed. Experimental experiments have shown that virtual elimination of IPTV zapping delay is possible for a small fraction of channel switching requests.

Source link: https://zenodo.org/record/7092134


Embedding the three pass protocol messages into transmission control protocol header

As transmission control protocol loads, security information is exchanged as part of transport layer security protocols. As a result, the handshaking stage of the stage also suffers longer as the TCP acknowledgement process has already been postponed. This paper details a TCP-embedded three-pass protocol for dynamic key exchanges. According to the reports, the new protocol shortened three-pass protocol message delivery time by up to 25 percent on the lossless channel. The analysis also revealed that a TCP-embedded three pass protocol successfully secured each transmitted TCP load using a unique key; this is much safer than the compared method.

Source link: https://zenodo.org/record/7081294


An efficient GAF routing protocol using an optimized weighted sum model in WSN

A large number of sensor nodes that are insufficient in terms of processing power, storage, and energy are embedded within a wireless sensor network. Data processing and reporting data obtained by the base station are the key tasks of nodes. Therefore, the network lifetime is one of the key requirements for designing a WSN. According to the number of dead nodes and energy consumption, the new, GAF basic and optimized-GAF routing protocol delivers higher results than the previous, GAF basic and optimized-GAF routing scheme in terms of both number of dead nodes and electricity consumption.

Source link: https://zenodo.org/record/7081241


Increasing transmission control protocol speed by reducing the acknowledgement collision probability

This means that the TCP-ACK packet arrives sooner, the TCP next window transmission, and the better the TCP results can be expected. To minimize overall TCP delay, this paper recommends a collision risk reduction for the transmitted TCP-ACK packets. In several ways, Collision risk reduction can be carried out. The total TCP delay is also reduced when TCP-ACK collision probability is reduced, according to the mathematic review. According to collision reductions on TCP-ACK, collision reductions were expected to decrease TCP delay reductions of about 11. 6 percent, 28. 4%, and 9. 4 percent subsequently.

Source link: https://zenodo.org/record/7080697

* Please keep in mind that all text is summarized by machine, we do not bear any responsibility, and you should always check original source before taking any actions

* Please keep in mind that all text is summarized by machine, we do not bear any responsibility, and you should always check original source before taking any actions