Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Reuse and protocol exchange.

Zeitschriftenartikel zum Thema „Reuse and protocol exchange“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Reuse and protocol exchange" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Aydin, Muhammed Iberia, Damla Ozaktac, Burak Yuzer, et al. "Desalination and Detoxification of Textile Wastewater by Novel Photocatalytic Electrolysis Membrane Reactor for Ecosafe Hydroponic Farming." Membranes 12, no. 1 (2021): 10. http://dx.doi.org/10.3390/membranes12010010.

Der volle Inhalt der Quelle
Annotation:
In this study, a novel photoelectrocatalytic membrane (PECM) reactor was tested as an option for the desalination, disinfection, and detoxification of biologically treated textile wastewater (BTTWW), with the aim to reuse it in hydroponic farming. The anionic ion exchange (IEX) process was used before PECM treatment to remove toxic residual dyes. The toxicity evaluation for every effluent was carried out using the Vibrio fischeri, Microtox® test protocol. The disinfection effect of the PECM reactor was studied against E. coli. After PECM treatment, the 78.7% toxicity level of the BTTWW was red
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Termens, Miquel, Mireia Ribera, and Anita Locher. "An analysis of file format control in institutional repositories." Library Hi Tech 33, no. 2 (2015): 162–74. http://dx.doi.org/10.1108/lht-10-2014-0098.

Der volle Inhalt der Quelle
Annotation:
Purpose – The purpose of this paper is to analyze the file formats of the digital objects stored in two of the largest open-access repositories in Spain, DDUB and TDX, and determines the implications of these formats for long-term preservation, focussing in particular on the different versions of PDF. Design/methodology/approach – To be able to study the two repositories, the authors harvested all the files corresponding to every digital object and some of their associated metadata using the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH) and Open Archives Initiative Object
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

STINE, JOHN A., GUSTAVO DE VECIANA, KEVIN H. GRACE, and ROBERT C. DURST. "ORCHESTRATING SPATIAL REUSE IN WIRELESS AD HOC NETWORKS USING SYNCHRONOUS COLLISION RESOLUTION (SCR)." Journal of Interconnection Networks 03, no. 03n04 (2002): 167–95. http://dx.doi.org/10.1142/s0219265902000616.

Der volle Inhalt der Quelle
Annotation:
We propose a novel medium access control protocol for ad hoc wireless networks data to send can contend simultaneously for the channel. Nodes contend for access using a synchronous signaling mechanism that achieves two objectives: it arbitrates contentions locally and it selects a subset of nodes across the network that attempt to transmit simultaneously. The subset of nodes that survive the signaling mechanism can be viewed as an orchestrated set of transmissions that are spatially reusing the channel shared by the nodes. Thus the 'quality' of the subset of nodes selected by the signaling mec
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Kuo, Chung-Wei, Wei Wei, Chun-Chang Lin, Yu-Yi Hong, Jia-Ruei Liu, and Kuo-Yu Tsai. "Dynamic Key Replacement Mechanism for Lightweight Internet of Things Microcontrollers to Resist Side-Channel Attacks." Future Internet 17, no. 1 (2025): 43. https://doi.org/10.3390/fi17010043.

Der volle Inhalt der Quelle
Annotation:
5G technology and IoT devices are improving efficiency and quality of life across many sectors. IoT devices are often used in open environments where they handle sensitive data. This makes them vulnerable to side-channel attacks (SCAs), where attackers can intercept and analyze the electromagnetic signals emitted by microcontroller units (MCUs) to expose encryption keys and compromise sensitive data. To address this critical vulnerability, this study proposes a novel dynamic key replacement mechanism specifically designed for lightweight IoT microcontrollers. The mechanism integrates Moving Ta
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Cui, Hui, and Glen Mudra. "Authenticated Key Exchange under Bad Randomness, Revisited." Mathematics 11, no. 12 (2023): 2721. http://dx.doi.org/10.3390/math11122721.

Der volle Inhalt der Quelle
Annotation:
A bad randomness may cause catastrophic results in security; thus, it is of importance to make cryptographic systems secure against bad randomness. In this paper, we focus on a practical situation where an adversary is able to force participants in an authenticated key exchange (AKE) system to reuse the random values and the functions of these values, called related randomness attack (RRA). Following the existing randomness resetting security model of AKE and the RRA security model of public-key encryption, we present a model of RRA security for authenticated key exchange, as well as the neces
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Alvarez-Rodríguez, Jose, Roy Mendieta, Jose Luis de la Vara, Anabel Fraga, and Juan Llorens. "Enabling System Artefact Exchange and Selection through a Linked Data Layer." JUCS - Journal of Universal Computer Science 24, no. (11) (2018): 1536–60. https://doi.org/10.3217/jucs-024-11-1536.

Der volle Inhalt der Quelle
Annotation:
The use of different techniques and tools is a common practice to cover all stages in the systems development lifecycle, generating a very good number of system artefacts. Moreover, these artefacts are commonly encoded in different formats and can only be accessed, in most cases, through proprietary and non-standard protocols. This scenario can be considered a real nightmare for software or systems reuse. Possible solutions imply the creation of a real collaborative development environment where tools can exchange and share data, information and knowledge. In this context, the OSLC (Open Servi
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Goncharov, M. V., and K. A. Kolosov. "On interoperability of metadata within RNPLS&T’s Single Open Information Archive." Scientific and Technical Libraries, no. 10 (November 12, 2021): 45–62. http://dx.doi.org/10.33186/1027-3689-2021-10-45-62.

Der volle Inhalt der Quelle
Annotation:
Russian National Public Library for Science and Technology has been developing the Single Open Information Archive (UOIA) to merge all digital full-text resources created or acquired by the Library. The authors examine the issues of interoperability when exchanging metadata between UOIA built on library automation software and open archives using OAI-PMH technology for metadata acquisition. Interoperability in information exchange between different ALIS is provided, for example, through applying SRU/SRW protocol and metadata scheme, while metadata exchange between OA repositories is provided m
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Hardwick, Martin. "On STEP-NC and the Complexities of Product Data Integration." Journal of Computing and Information Science in Engineering 4, no. 1 (2004): 60–67. http://dx.doi.org/10.1115/1.1641188.

Der volle Inhalt der Quelle
Annotation:
For twenty years the manufacturing domain has been seeking to share product model data by defining an entity relationship model covering the life cycle of geometrically defined products. The data sharing is implemented by selecting subsets of these entities and relationships to define data exchange standards for CAD, CAE, CAM, CNC and PDM systems. The approach requires agreement on how data will be reused across the domains so an organization has been meeting to manage the required data definitions. Considerable success was achieved in 1995 when a standard was proposed and implemented by indus
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Li, Wei, and Xin Wang. "Construction of Modularized English Teaching Platform for Multimedia Wireless Network Based on NS2 Simulation Software." Mobile Information Systems 2021 (October 19, 2021): 1–10. http://dx.doi.org/10.1155/2021/5329208.

Der volle Inhalt der Quelle
Annotation:
Using the NS2 network simulation tool to teach the “wireless network” course can enhance students’ understanding of wireless network protocols through visualization and can also improve students’ ability to analyze problems hands on. We built a multimedia wireless network modularized English teaching platform based on NS2 simulation software; made full use of the rich components and network resources provided by NS2 to achieve a high degree of code reuse and reduce the time for developing simulation codes; designed the overall framework of this multimedia wireless network modular English teach
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Meyer, Max-Arno, Lina Sauter, Christian Granrath, Hassen Hadj-Amor, and Jakob Andert. "Simulator Coupled with Distributed Co-Simulation Protocol for Automated Driving Tests." Automotive Innovation 4, no. 4 (2021): 373–89. http://dx.doi.org/10.1007/s42154-021-00161-1.

Der volle Inhalt der Quelle
Annotation:
AbstractTo meet the challenges in software testing for automated vehicles, such as increasing system complexity and an infinite number of operating scenarios, new simulation methods must be developed. Closed-loop simulations for automated driving (AD) require highly complex simulation models for multiple controlled vehicles with their perception systems as well as their surrounding context. For the realization of such models, different simulation domains must be coupled with co-simulation. However, widely supported model integration standards such as functional mock-up interface (FMI) lack nat
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Nosheen, Irum, Shoab A. Khan, and Umar Ali. "A Cross-Layer Design for a Multihop, Self-Healing, and Self-Forming Tactical Network." Wireless Communications and Mobile Computing 2019 (April 9, 2019): 1–16. http://dx.doi.org/10.1155/2019/1523906.

Der volle Inhalt der Quelle
Annotation:
In mission and time critical applications, bandwidth and delay optimizations are the key goals of communication systems. This paper presents a cross-layer framework design that reduces the call setup time, provides collision-free communication, and reuses the empty slots of Time Division Multiple Access (TDMA) protocol which otherwise causes low throughput and large delay. As number of communicating nodes in tactical networks is small as compared to commercial mobile ad hoc networks (MANETs), classical TDMA will yield huge number of empty slots and any Carrier Sense Multiple Access/Collision D
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Gilissen, Valentijng, and Hella Hollander. "Archiving the Past While Keeping up with the Times." Studies in Digital Heritage 1, no. 2 (2017): 194–205. http://dx.doi.org/10.14434/sdh.v1i2.23238.

Der volle Inhalt der Quelle
Annotation:
The e-depot for Dutch archaeology started as a project at Data Archiving and Networked Services (DANS) in 2004 and developed into a successful service, which has ever since been part of the national archaeological data workflow of the Netherlands.While continuously processing archaeological datasets and publications and developing expertise regarding data preservation, various developments are taking place in the data landscape and direct involvement is necessary to ensure that the needs of the designated community are best met. Standard protocols must be defined for the processing of data wit
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Yavari, Mostafa, Masoumeh Safkhani, Saru Kumari, Sachin Kumar, and Chien-Ming Chen. "An Improved Blockchain-Based Authentication Protocol for IoT Network Management." Security and Communication Networks 2020 (October 26, 2020): 1–16. http://dx.doi.org/10.1155/2020/8836214.

Der volle Inhalt der Quelle
Annotation:
Communication security between IoT devices is a major concern in this area, and the blockchain has raised hopes that this concern will be addressed. In the blockchain concept, the majority or even all network nodes check the validity and accuracy of exchanged data before accepting and recording them, whether this data is related to financial transactions or measurements of a sensor or an authentication message. In evaluating the validity of an exchanged data, nodes must reach a consensus in order to perform a special action, in which case the opportunity to enter and record transactions and un
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Tabassum, Tamanna, SK Alamgir Hossain, Md Anisur Rahman, Mohammed F. Alhamid, and M. Anwar Hossain. "An Efficient Key Management Technique for the Internet of Things." Sensors 20, no. 7 (2020): 2049. http://dx.doi.org/10.3390/s20072049.

Der volle Inhalt der Quelle
Annotation:
The Internet of Things (IoT) has changed our lives drastically. Customers, regulatory bodies, and industrial partners are driving us to use IoT. Although IoT provides new opportunities, security remains a key concern while providing various services. It is especially challenging how the data generated from IoT devices can be protected from potential security attacks and how to safeguard the exchange of these data while transiting through different nodes and gateways. In this research, we aim to ensure a safe IoT environment by proposing an efficient key management technique that uses a combina
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Shintaku, Milton, Lucas Ângelo Silveira, Alexandre Faria de Oliveira, Diego José Macedo, and Ingrid Torres Schiessl. "Uso do protocolo de interoperabilidade OAI-ORE para preservação digital." Revista Brasileira de Preservação Digital 4 (June 10, 2023): e023012. http://dx.doi.org/10.20396/rebpred.v4i00.17992.

Der volle Inhalt der Quelle
Annotation:
Introdução: A preservação digital em Bibliotecas Digitais e Repositórios, no Brasil, tem sido um desafio, na medida em que grande parte desses sistemas estão implementados com o software livre DSpace, que não está preparado para atuar nesta atividade. Objetivo: Assim, o presente trabalho tem por objetivo apresentar uma nova opção para a preservação digital de documentos depositados em sistemas de informação implementados com o DSpace, com o uso do modelo Hipátia. Metodologia: Para tanto, o estudo faz uso de técnicas de pesquisas aplicadas em computação, voltados para inovação e resolução de pr
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Wong, Kok-Seng, and Myung Ho Kim. "Towards Self-Awareness Privacy Protection for Internet of Things Data Collection." Journal of Applied Mathematics 2014 (2014): 1–9. http://dx.doi.org/10.1155/2014/827959.

Der volle Inhalt der Quelle
Annotation:
The Internet of Things (IoT) is now an emerging global Internet-based information architecture used to facilitate the exchange of goods and services. IoT-related applications are aiming to bring technology to people anytime and anywhere, with any device. However, the use of IoT raises a privacy concern because data will be collected automatically from the network devices and objects which are embedded with IoT technologies. In the current applications, data collector is a dominant player who enforces the secure protocol that cannot be verified by the data owners. In view of this, some of the r
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Murugesan, Senthil, Krishna Venkata, Narendra Mupparaju, and Rayudu Kommi. "Quality of Service Enhancement in Wireless LAN and MANET." International Journal of Wireless and Ad Hoc Communication 1, no. 2 (2020): 08–18. http://dx.doi.org/10.54216/ijwac.010201.

Der volle Inhalt der Quelle
Annotation:
In this dissertation, the author introduces a novel MAC technique that uses directional antennas to reduce interference, allowing the channel effectively reuse in various places. A node will wait for the Additional Control Gap (ACG) period after exchanging the RTSCTS packet using the suggested protocol before starting the transmission of data packets. Other nodes in the area may plan simultaneous transmission at this ACG time by exchanging RTSCTS packets with one another. This technique of installing directional antennas to avoid interference while simultaneously ensuring simultaneous transmis
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Wang, Le, Xuefeng Liu, and Xiaodong Lin. "A Fair and Privacy-Preserving Image Trading System Based on Blockchain and Group Signature." Security and Communication Networks 2021 (October 31, 2021): 1–18. http://dx.doi.org/10.1155/2021/5701258.

Der volle Inhalt der Quelle
Annotation:
With the rise of digital images in our daily lives, there is a growing need to provide an image trading market where people can monetize their images and get desired images at prices that fit their budget. Those images are usually uploaded and stored onto centralized image trading service providers’ servers and the transactions for image trading are processed by these providers. Unfortunately, transaction unfairness and users’ privacy breaches have become major concerns since the service providers might be untrusted and able to manipulate image trading prices and infer users’ private informati
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Arana-Peña, Sara, Diego Carballares, Vicente Cortés Corberan, and Roberto Fernandez-Lafuente. "Multi-Combilipases: Co-Immobilizing Lipases with Very Different Stabilities Combining Immobilization via Interfacial Activation and Ion Exchange. The Reuse of the Most Stable Co-Immobilized Enzymes after Inactivation of the Least Stable Ones." Catalysts 10, no. 10 (2020): 1207. http://dx.doi.org/10.3390/catal10101207.

Der volle Inhalt der Quelle
Annotation:
The lipases A and B from Candida antarctica (CALA and CALB), Thermomyces lanuginosus (TLL) or Rhizomucor miehei (RML), and the commercial and artificial phospholipase Lecitase ultra (LEU) may be co-immobilized on octyl agarose beads. However, LEU and RML became almost fully inactivated under conditions where CALA, CALB and TLL retained full activity. This means that, to have a five components co-immobilized combi-lipase, we should discard 3 fully active and immobilized enzymes when the other two enzymes are inactivated. To solve this situation, CALA, CALB and TLL have been co-immobilized on oc
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Liang, Steve H. L., Sara Saeedi, Soroush Ojagh, et al. "An Interoperable Architecture for the Internet of COVID-19 Things (IoCT) Using Open Geospatial Standards—Case Study: Workplace Reopening." Sensors 21, no. 1 (2020): 50. http://dx.doi.org/10.3390/s21010050.

Der volle Inhalt der Quelle
Annotation:
To safely protect workplaces and the workforce during and after the COVID-19 pandemic, a scalable integrated sensing solution is required in order to offer real-time situational awareness and early warnings for decision-makers. However, an information-based solution for industry reopening is ineffective when the necessary operational information is locked up in disparate real-time data silos. There is a lot of ongoing effort to combat the COVID-19 pandemic using different combinations of low-cost, location-based contact tracing, and sensing technologies. These ad hoc Internet of Things (IoT) s
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Campbell, Walter S., Daniel Karlsson, Daniel J. Vreeman, Audrey J. Lazenby, Geoffrey A. Talmon, and James R. Campbell. "A computable pathology report for precision medicine: extending an observables ontology unifying SNOMED CT and LOINC." Journal of the American Medical Informatics Association 25, no. 3 (2017): 259–66. http://dx.doi.org/10.1093/jamia/ocx097.

Der volle Inhalt der Quelle
Annotation:
Abstract Background The College of American Pathologists (CAP) introduced the first cancer synoptic reporting protocols in 1998. However, the objective of a fully computable and machine-readable cancer synoptic report remains elusive due to insufficient definitional content in Systematized Nomenclature of Medicine – Clinical Terms (SNOMED CT) and Logical Observation Identifiers Names and Codes (LOINC). To address this terminology gap, investigators at the University of Nebraska Medical Center (UNMC) are developing, authoring, and testing a SNOMED CT observable ontology to represent the data el
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Bukovetskyi, Vasyl, and Vasyl Rizak. "Developing the algorithm and software for access token protection using request signing with temporary secret." Eastern-European Journal of Enterprise Technologies 1, no. 9(115) (2022): 56–62. http://dx.doi.org/10.15587/1729-4061.2022.251570.

Der volle Inhalt der Quelle
Annotation:
This paper proposes a method for protecting the access tokens in client-server data exchange without saving the state based on the formation of the signature of the request using a temporary secret. The devised method allows one not to transfer access tokens with each request, which would make it possible for the attacker to authenticate as a valid user when compromising the connection, for example, when using a «person in the middle» attack. Two variants of the method have been proposed and substantiated – simplified and improved, the scope of which depends on the needs for protection and tec
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Vasyl, Bukovetskyi, and Rizak Vasyl. "Developing the algorithm and software for access token protection using request signing with temporary secret." Eastern-European Journal of Enterprise Technologies 1, no. 9 (115) (2022): 56–62. https://doi.org/10.15587/1729-4061.2022.251570.

Der volle Inhalt der Quelle
Annotation:
This paper proposes a method for protecting the access tokens in client-server data exchange without saving the state based on the formation of the signature of the request using a temporary secret. The devised method allows one not to transfer access tokens with each request, which would make it possible for the attacker to authenticate as a valid user when compromising the connection, for example, when using a «person in the middle» attack. Two variants of the method have been proposed and substantiated – simplified and improved, the scope of which depends on the needs for
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Cho, Youngil, Kyoung Min Kim, and Tae-Jin Lee. "Air Charging Protocol With Spatial-Reuse." IEEE Wireless Communications Letters 9, no. 3 (2020): 298–301. http://dx.doi.org/10.1109/lwc.2019.2953067.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Liu, Xiaosha, and Dennis A. Clifford. "Ion exchange with denitrified brine reuse." Journal - American Water Works Association 88, no. 11 (1996): 88–99. http://dx.doi.org/10.1002/j.1551-8833.1996.tb06650.x.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Anfinsen, Christian B., Paul J. Flory, and Arno A. Penzias. "NAS Exchange Protocol." Science 228, no. 4699 (1985): 530. http://dx.doi.org/10.1126/science.228.4699.530.b.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

ANFINSEN, C. B., P. J. FLORY, and A. A. PENZIAS. "NAS Exchange Protocol." Science 228, no. 4699 (1985): 530. http://dx.doi.org/10.1126/science.228.4699.530-a.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Tonova, Konstantza. "Ionic liquid-assisted biphasic systems for downstream processing of fermentative enzymes and organic acids." Physical Sciences Reviews 6, no. 3 (2020): 1–33. http://dx.doi.org/10.1515/psr-2018-0068.

Der volle Inhalt der Quelle
Annotation:
Abstract Room-temperature ionic liquids (ILs) represent molten salts entirely consisting of ions, usually a charge-stabilized organic cation and an inorganic or organic anion. ILs are liquids at ambient temperature but possess characteristics unusual for the common liquid solvents, such as negligible vapor pressure, high thermal stability and most over the ability to mix and match libraries of cations and anions in order to acquire desirable physical and chemical properties [1]. The opportunity to obtain tunable density, viscosity, polarity and miscibility with common molecular liquids gave ri
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Funabashi, Kiyomi, Tetsuo Fukasawa, Fumio Kawamura, et al. "Reuse System for Powdered Ion-Exchange Resins." Nuclear Technology 73, no. 2 (1986): 220–27. http://dx.doi.org/10.13182/nt86-a33786.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Laitala, Kirsi, and Ingun Grimstad Klepp. "Clothing reuse: The potential in informal exchange." Clothing Cultures 4, no. 1 (2017): 61–77. http://dx.doi.org/10.1386/cc.4.1.61_1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Meshram, A. J., C. Meshram, S. D. Bagde, and R. R. Meshram. "RIPIC BASED KEY EXCHANGE PROTOCOL." Advances in Mathematics: Scientific Journal 9, no. 12 (2020): 11169–77. http://dx.doi.org/10.37418/amsj.9.12.97.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Gucma, Maciej, and Paulina Hatłas. "Data Exchange Protocol in Repsail." Annual of Navigation 24, no. 1 (2017): 221–29. http://dx.doi.org/10.1515/aon-2017-0016.

Der volle Inhalt der Quelle
Annotation:
AbstractArticle presents implantation and theoretical considerations of data exchange protocol developed for the RepSail project, where main objective was design and building innovative hybrid yacht. One of problems during the design process was improper functioning of data exchange protocols that were available in the commercially available devices to mention navigation purpose NMEA183 or 2000 as well as automation dedicated ones (CAN and similar). Author shows the basis of the dedicated format of exchange for in board devices.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Wang, Hao, Heqing Guo, Manshan Lin, Jianfei Yin, Qi He, and Jun Zhang. "A new dependable exchange protocol." Computer Communications 29, no. 15 (2006): 2770–80. http://dx.doi.org/10.1016/j.comcom.2005.10.028.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Todd, T. D., and A. M. Bignell. "A slot-reuse protocol for rearrangeable dual-bus networks." IEEE Transactions on Communications 42, no. 2/3/4 (1994): 1131–40. http://dx.doi.org/10.1109/tcomm.1994.580222.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

COSTAGLIOLA, GENNARO, RITA FRANCESE, and GIUSEPPE SCANNIELLO. "A VISUAL SYSTEM SUPPORTING SOFTWARE REUSE IN THE BANKING LEGACY SYSTEM CONTEXT." International Journal of Software Engineering and Knowledge Engineering 13, no. 01 (2003): 83–101. http://dx.doi.org/10.1142/s0218194003001202.

Der volle Inhalt der Quelle
Annotation:
Banking legacy systems intensively exchange messages in electronic format. Such systems are, for their nature, difficult to update and maintain. As a consequence, the introduction of new types of messages is a hard task. Adding new functionalities requires custom coding and software reuse is seen as a key to obtain a better time-to-market factor, risk and cost reduction. In this paper we describe the architecture and part of the implementation of the SI.RE. Visual System, an Interbanking Network Information System that lets us generate gateways for the exchange of electronic messages among ban
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

R. Tan, Raymond Girard, and Dennis E. Cruz. "Synthesis of Robust Water Reuse Networks Using Fuzzy Nonlinear Programming:Mass Exchange-Based Processes." ASEAN Journal of Chemical Engineering 5, no. 1 (2005): 22. http://dx.doi.org/10.22146/ajche.50160.

Der volle Inhalt der Quelle
Annotation:
Water consumption and effluent generation in industrial plants can be effectively reduced by maximizing utilization of partially contaminated water. A dual approach consisting of graphical pinch methods for targeting followed by the synthesis of water reuse networks using such techniques as mathematical programming is usually employed. Reliable process data is necessary for successful plant retrofitting. In most cases, however, the necessary limiting concentrations and mass loads must be deduced from limited information. It thus becomes necessary to balance the conflicting objectives of minimi
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Corvo, Atelier Do, Desirée Pedro, and Carlos Antunes. "Reuse of Modern Schools." Joelho Revista de Cultura Arquitectonica, no. 9 (December 27, 2018): 50–67. http://dx.doi.org/10.14195/1647-8681_9_2.

Der volle Inhalt der Quelle
Annotation:

 
 
 
 The two projects selected for the Reuse of Modernist Buildings are examples of our way of understanding this subject. These projects are neither typical rehabilitations, nor refurbishment, but an intense exchange between the diverse existing layers and the new ones required. 
 The aims of these projects focused on giving clarity to the existing facilities and removing the ambiguities which resulted from the successive additions and uses to which the building has been subjected to over time, thus enabling a clear proposal for new buildings. In these projects, th
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Batres, Rafael, Atsushi Aoyama, and Yuji Naka. "A life-cycle approach for model reuse and exchange." Computers & Chemical Engineering 26, no. 4-5 (2002): 487–98. http://dx.doi.org/10.1016/s0098-1354(01)00794-3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Lai, Jia Yen, Lock Hei Ngu, and Farouq Twaiq. "Template Recycling and Reuse in MCM-41 Synthesis: Statistical Study." Journal of Applied Science & Process Engineering 5, no. 1 (2018): 213–26. http://dx.doi.org/10.33736/jaspe.416.2018.

Der volle Inhalt der Quelle
Annotation:
The recycle and reuse of template in MCM-41 synthesis were analysed using 23 full factorial design in order to study the effect of the template extraction parameters on the mass of MCM-41 powder produced. Four consecutive MCM-41 synthesis cycles utilizing the recycled template were studied with three factors that are ethanol fraction (A), amount of ion exchange agent (B) and the type of ion exchange agent (C). The significant effects contributed by the factors A, B and C and their interactions were identified through the half-normal probability plot and normal probability plot of the residuals
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Ali, Ahmed Kamal. "Architecture within a circular economy: Process mapping a resource-based design-bid-build project delivery system." Enquiry A Journal for Architectural Research 14, no. 1 (2017): 48–61. http://dx.doi.org/10.17831/enq:arcc.v14i1.432.

Der volle Inhalt der Quelle
Annotation:
In this paper, we develop a novel method for integrating system thinking into architectural design by mapping its processes in a standard process modeling language. We structured a decision-support framework using process mapping workflows to incorporate sustainable building materials and resource-based design decisions into the architectural practice. We turned to other disciplines’ knowledgebases, such as Business Information Technology (BIT), to develop a workflow for the Design-Bid-Build project delivery method (DBB). Mapping both current and the proposed design processes, including their
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Jeong, Ik, and Dong Lee. "Parallel Key Exchange." JUCS - Journal of Universal Computer Science 14, no. (3) (2008): 377–96. https://doi.org/10.3217/jucs-014-03-0377.

Der volle Inhalt der Quelle
Annotation:
In the paper we study parallel key exchange among multiple parties. The status of parallel key exchange can be depicted by a key graph. In a key graph, a vertex represents a party and an edge represents a relation of two parties who are to share a key. We first propose a security model for a key graph, which extends the Bellare-Rogaway model for two-party key exchange. Next, we clarify the relations among the various security notions of key exchange. Finally, we construct an efficient key exchange protocol for a key graph using the randomness re-use technique. Our protocol establishes the mult
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Abd El-Naby, Ashraf Saied, Yehia M. Helmy, and Emadeldin Helmy Khalil. "The Strategic Goals of -Using Service Oriented Architecture Principles." Future Computing and Informatics Journal 6, no. 2 (2021): 124–42. http://dx.doi.org/10.54623/fue.fcij.6.2.6.

Der volle Inhalt der Quelle
Annotation:
Organizations use heterogonous systems and legacy systems, they are implemented at different platforms, different databases, and different language programs. These systems need to exchange information and reuse the same functionality to achieve integration between these systems. Many Software companies failed to achieve information follow and reuse the same functionality. This paper introduces guidelines introduces Service-Oriented Architecture Principles guidelines and rules to help Applications developers to achieve information integrations and reuse the same functionality, SOA principles pr
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

S, Mustafa. "Capture Aware Channel Access Protocol in Wireless Network." Journal of Engineering Research [TJER] 13, no. 1 (2018): 73. http://dx.doi.org/10.24200/tjer.vol15iss1pp73-87.

Der volle Inhalt der Quelle
Annotation:
Spatial reuse in wireless networks is limited by the SINR threshold and it might be feasible to capture a packet in the presence of ongoing foreign transmission. This work considers a new capture aware channel access protocol by incorporating global channel state information in the decision making process for the channel access jointly with adaptive power framework. The protocol employs power heterogeneous ad-hoc networks; it assigns different transmission power level to individual nodes based on dynamic observation of the network traffic. It exploits spatial heterogeneity of flows at a given
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Gharzouli, Mohamed. "Reuse and Improvement of Peersim Open Source Packages." International Journal of Open Source Software and Processes 7, no. 3 (2016): 39–55. http://dx.doi.org/10.4018/ijossp.2016070103.

Der volle Inhalt der Quelle
Annotation:
This paper presents the reuse of two open source implementations of P2P protocols for Peersim simulator. Firstly, we will present the new implementation of Chord, which is considered as the most popular P2P protocol among the structured family of P2P networks. In this latter, the search requests generally use a Data Hash Table (DHT) to find a requested resource. This kind of systems is generally known as Structured and Informed Protocols. In this context, to improve the search mechanism of Chord, we modify its open source implementation for Peersim to introduce another type of resource search
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Delmas-Glass, Emmanuelle. "THE YCBA HISTORIC FRAME COLLECTION: USING SEMANTIC WEB TECHNOLOGY TO CONTRIBUTE TO THE SCHOLARSHIP OF BRITISH ART." ARTis ON, no. 2 (February 12, 2016): 9–23. http://dx.doi.org/10.37935/aion.v0i2.37.

Der volle Inhalt der Quelle
Annotation:
Following a technical survey of its of historic frame collection, the Yale Center for British Art has catalogued its frames as extensively as its art collection, and now shares it with the world via web pages for human users as well as through machine readable formats (LIDO XML, CIDOC-CRM RDF) for data aggregators. This paper proposes a data management and dissemination strategy model that relies on data exchange protocols and Linked Open Data to ensure that our rich cultural knowledge can be reused by scholars and contributes to the study of frames and the British art in general.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Valladares Linares, Rodrigo, Zhenyu Li, Victor Yangali-Quintanilla, Qingyu Li, and Gary Amy. "Cleaning protocol for a FO membrane fouled in wastewater reuse." Desalination and Water Treatment 51, no. 25-27 (2013): 4821–24. http://dx.doi.org/10.1080/19443994.2013.795345.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Cheng, Ray-Guang, Ruei-I. Chang, and Kuo-Lun Hua. "IWTRP: Spatial-reuse Enhancement of the Wireless Token Ring Protocol." IEEE Communications Letters 11, no. 8 (2007): 701–3. http://dx.doi.org/10.1109/lcomm.2007.070203.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

JIANG, M. "Access Protocol with Efficient Slot Reuse in WDM Metro Ring." IEICE Transactions on Communications E88-B, no. 4 (2005): 1685–88. http://dx.doi.org/10.1093/ietcom/e88-b.4.1685.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Mosquera-Romero, Suanny, Antonin Prévoteau, Jan B. A. Arends, Diederik P. L. Rousseau, Luis Dominguez-Granda, and Korneel Rabaey. "Disinfection of constructed wetland effluent by in situ electrochemical chlorine production for water reuse." Environmental Science: Water Research & Technology 8, no. 1 (2022): 98–107. http://dx.doi.org/10.1039/d1ew00708d.

Der volle Inhalt der Quelle
Annotation:
Constructed wetland effluents meet water reuse standards after efficient electrochemical disinfection, and residual chlorine restricts pathogen regrowth. Chloride electromigration through anion exchange membranes (AEMs) maximized chlorine production.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Alaraj, Abdullah M. "Optimizing One Fair Document Exchange Protocol." International Journal of Network Security & Its Applications 4, no. 1 (2012): 1–12. http://dx.doi.org/10.5121/ijnsa.2012.4101.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!