Siga este enlace para ver otros tipos de publicaciones sobre el tema: Reuse and protocol exchange.

Artículos de revistas sobre el tema "Reuse and protocol exchange"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Reuse and protocol exchange".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Aydin, Muhammed Iberia, Damla Ozaktac, Burak Yuzer, et al. "Desalination and Detoxification of Textile Wastewater by Novel Photocatalytic Electrolysis Membrane Reactor for Ecosafe Hydroponic Farming." Membranes 12, no. 1 (2021): 10. http://dx.doi.org/10.3390/membranes12010010.

Texto completo
Resumen
In this study, a novel photoelectrocatalytic membrane (PECM) reactor was tested as an option for the desalination, disinfection, and detoxification of biologically treated textile wastewater (BTTWW), with the aim to reuse it in hydroponic farming. The anionic ion exchange (IEX) process was used before PECM treatment to remove toxic residual dyes. The toxicity evaluation for every effluent was carried out using the Vibrio fischeri, Microtox® test protocol. The disinfection effect of the PECM reactor was studied against E. coli. After PECM treatment, the 78.7% toxicity level of the BTTWW was red
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Termens, Miquel, Mireia Ribera, and Anita Locher. "An analysis of file format control in institutional repositories." Library Hi Tech 33, no. 2 (2015): 162–74. http://dx.doi.org/10.1108/lht-10-2014-0098.

Texto completo
Resumen
Purpose – The purpose of this paper is to analyze the file formats of the digital objects stored in two of the largest open-access repositories in Spain, DDUB and TDX, and determines the implications of these formats for long-term preservation, focussing in particular on the different versions of PDF. Design/methodology/approach – To be able to study the two repositories, the authors harvested all the files corresponding to every digital object and some of their associated metadata using the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH) and Open Archives Initiative Object
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

STINE, JOHN A., GUSTAVO DE VECIANA, KEVIN H. GRACE, and ROBERT C. DURST. "ORCHESTRATING SPATIAL REUSE IN WIRELESS AD HOC NETWORKS USING SYNCHRONOUS COLLISION RESOLUTION (SCR)." Journal of Interconnection Networks 03, no. 03n04 (2002): 167–95. http://dx.doi.org/10.1142/s0219265902000616.

Texto completo
Resumen
We propose a novel medium access control protocol for ad hoc wireless networks data to send can contend simultaneously for the channel. Nodes contend for access using a synchronous signaling mechanism that achieves two objectives: it arbitrates contentions locally and it selects a subset of nodes across the network that attempt to transmit simultaneously. The subset of nodes that survive the signaling mechanism can be viewed as an orchestrated set of transmissions that are spatially reusing the channel shared by the nodes. Thus the 'quality' of the subset of nodes selected by the signaling mec
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Kuo, Chung-Wei, Wei Wei, Chun-Chang Lin, Yu-Yi Hong, Jia-Ruei Liu, and Kuo-Yu Tsai. "Dynamic Key Replacement Mechanism for Lightweight Internet of Things Microcontrollers to Resist Side-Channel Attacks." Future Internet 17, no. 1 (2025): 43. https://doi.org/10.3390/fi17010043.

Texto completo
Resumen
5G technology and IoT devices are improving efficiency and quality of life across many sectors. IoT devices are often used in open environments where they handle sensitive data. This makes them vulnerable to side-channel attacks (SCAs), where attackers can intercept and analyze the electromagnetic signals emitted by microcontroller units (MCUs) to expose encryption keys and compromise sensitive data. To address this critical vulnerability, this study proposes a novel dynamic key replacement mechanism specifically designed for lightweight IoT microcontrollers. The mechanism integrates Moving Ta
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Cui, Hui, and Glen Mudra. "Authenticated Key Exchange under Bad Randomness, Revisited." Mathematics 11, no. 12 (2023): 2721. http://dx.doi.org/10.3390/math11122721.

Texto completo
Resumen
A bad randomness may cause catastrophic results in security; thus, it is of importance to make cryptographic systems secure against bad randomness. In this paper, we focus on a practical situation where an adversary is able to force participants in an authenticated key exchange (AKE) system to reuse the random values and the functions of these values, called related randomness attack (RRA). Following the existing randomness resetting security model of AKE and the RRA security model of public-key encryption, we present a model of RRA security for authenticated key exchange, as well as the neces
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Alvarez-Rodríguez, Jose, Roy Mendieta, Jose Luis de la Vara, Anabel Fraga, and Juan Llorens. "Enabling System Artefact Exchange and Selection through a Linked Data Layer." JUCS - Journal of Universal Computer Science 24, no. (11) (2018): 1536–60. https://doi.org/10.3217/jucs-024-11-1536.

Texto completo
Resumen
The use of different techniques and tools is a common practice to cover all stages in the systems development lifecycle, generating a very good number of system artefacts. Moreover, these artefacts are commonly encoded in different formats and can only be accessed, in most cases, through proprietary and non-standard protocols. This scenario can be considered a real nightmare for software or systems reuse. Possible solutions imply the creation of a real collaborative development environment where tools can exchange and share data, information and knowledge. In this context, the OSLC (Open Servi
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Goncharov, M. V., and K. A. Kolosov. "On interoperability of metadata within RNPLS&T’s Single Open Information Archive." Scientific and Technical Libraries, no. 10 (November 12, 2021): 45–62. http://dx.doi.org/10.33186/1027-3689-2021-10-45-62.

Texto completo
Resumen
Russian National Public Library for Science and Technology has been developing the Single Open Information Archive (UOIA) to merge all digital full-text resources created or acquired by the Library. The authors examine the issues of interoperability when exchanging metadata between UOIA built on library automation software and open archives using OAI-PMH technology for metadata acquisition. Interoperability in information exchange between different ALIS is provided, for example, through applying SRU/SRW protocol and metadata scheme, while metadata exchange between OA repositories is provided m
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Hardwick, Martin. "On STEP-NC and the Complexities of Product Data Integration." Journal of Computing and Information Science in Engineering 4, no. 1 (2004): 60–67. http://dx.doi.org/10.1115/1.1641188.

Texto completo
Resumen
For twenty years the manufacturing domain has been seeking to share product model data by defining an entity relationship model covering the life cycle of geometrically defined products. The data sharing is implemented by selecting subsets of these entities and relationships to define data exchange standards for CAD, CAE, CAM, CNC and PDM systems. The approach requires agreement on how data will be reused across the domains so an organization has been meeting to manage the required data definitions. Considerable success was achieved in 1995 when a standard was proposed and implemented by indus
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Li, Wei, and Xin Wang. "Construction of Modularized English Teaching Platform for Multimedia Wireless Network Based on NS2 Simulation Software." Mobile Information Systems 2021 (October 19, 2021): 1–10. http://dx.doi.org/10.1155/2021/5329208.

Texto completo
Resumen
Using the NS2 network simulation tool to teach the “wireless network” course can enhance students’ understanding of wireless network protocols through visualization and can also improve students’ ability to analyze problems hands on. We built a multimedia wireless network modularized English teaching platform based on NS2 simulation software; made full use of the rich components and network resources provided by NS2 to achieve a high degree of code reuse and reduce the time for developing simulation codes; designed the overall framework of this multimedia wireless network modular English teach
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Meyer, Max-Arno, Lina Sauter, Christian Granrath, Hassen Hadj-Amor, and Jakob Andert. "Simulator Coupled with Distributed Co-Simulation Protocol for Automated Driving Tests." Automotive Innovation 4, no. 4 (2021): 373–89. http://dx.doi.org/10.1007/s42154-021-00161-1.

Texto completo
Resumen
AbstractTo meet the challenges in software testing for automated vehicles, such as increasing system complexity and an infinite number of operating scenarios, new simulation methods must be developed. Closed-loop simulations for automated driving (AD) require highly complex simulation models for multiple controlled vehicles with their perception systems as well as their surrounding context. For the realization of such models, different simulation domains must be coupled with co-simulation. However, widely supported model integration standards such as functional mock-up interface (FMI) lack nat
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Nosheen, Irum, Shoab A. Khan, and Umar Ali. "A Cross-Layer Design for a Multihop, Self-Healing, and Self-Forming Tactical Network." Wireless Communications and Mobile Computing 2019 (April 9, 2019): 1–16. http://dx.doi.org/10.1155/2019/1523906.

Texto completo
Resumen
In mission and time critical applications, bandwidth and delay optimizations are the key goals of communication systems. This paper presents a cross-layer framework design that reduces the call setup time, provides collision-free communication, and reuses the empty slots of Time Division Multiple Access (TDMA) protocol which otherwise causes low throughput and large delay. As number of communicating nodes in tactical networks is small as compared to commercial mobile ad hoc networks (MANETs), classical TDMA will yield huge number of empty slots and any Carrier Sense Multiple Access/Collision D
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Gilissen, Valentijng, and Hella Hollander. "Archiving the Past While Keeping up with the Times." Studies in Digital Heritage 1, no. 2 (2017): 194–205. http://dx.doi.org/10.14434/sdh.v1i2.23238.

Texto completo
Resumen
The e-depot for Dutch archaeology started as a project at Data Archiving and Networked Services (DANS) in 2004 and developed into a successful service, which has ever since been part of the national archaeological data workflow of the Netherlands.While continuously processing archaeological datasets and publications and developing expertise regarding data preservation, various developments are taking place in the data landscape and direct involvement is necessary to ensure that the needs of the designated community are best met. Standard protocols must be defined for the processing of data wit
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Yavari, Mostafa, Masoumeh Safkhani, Saru Kumari, Sachin Kumar, and Chien-Ming Chen. "An Improved Blockchain-Based Authentication Protocol for IoT Network Management." Security and Communication Networks 2020 (October 26, 2020): 1–16. http://dx.doi.org/10.1155/2020/8836214.

Texto completo
Resumen
Communication security between IoT devices is a major concern in this area, and the blockchain has raised hopes that this concern will be addressed. In the blockchain concept, the majority or even all network nodes check the validity and accuracy of exchanged data before accepting and recording them, whether this data is related to financial transactions or measurements of a sensor or an authentication message. In evaluating the validity of an exchanged data, nodes must reach a consensus in order to perform a special action, in which case the opportunity to enter and record transactions and un
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Tabassum, Tamanna, SK Alamgir Hossain, Md Anisur Rahman, Mohammed F. Alhamid, and M. Anwar Hossain. "An Efficient Key Management Technique for the Internet of Things." Sensors 20, no. 7 (2020): 2049. http://dx.doi.org/10.3390/s20072049.

Texto completo
Resumen
The Internet of Things (IoT) has changed our lives drastically. Customers, regulatory bodies, and industrial partners are driving us to use IoT. Although IoT provides new opportunities, security remains a key concern while providing various services. It is especially challenging how the data generated from IoT devices can be protected from potential security attacks and how to safeguard the exchange of these data while transiting through different nodes and gateways. In this research, we aim to ensure a safe IoT environment by proposing an efficient key management technique that uses a combina
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Shintaku, Milton, Lucas Ângelo Silveira, Alexandre Faria de Oliveira, Diego José Macedo, and Ingrid Torres Schiessl. "Uso do protocolo de interoperabilidade OAI-ORE para preservação digital." Revista Brasileira de Preservação Digital 4 (June 10, 2023): e023012. http://dx.doi.org/10.20396/rebpred.v4i00.17992.

Texto completo
Resumen
Introdução: A preservação digital em Bibliotecas Digitais e Repositórios, no Brasil, tem sido um desafio, na medida em que grande parte desses sistemas estão implementados com o software livre DSpace, que não está preparado para atuar nesta atividade. Objetivo: Assim, o presente trabalho tem por objetivo apresentar uma nova opção para a preservação digital de documentos depositados em sistemas de informação implementados com o DSpace, com o uso do modelo Hipátia. Metodologia: Para tanto, o estudo faz uso de técnicas de pesquisas aplicadas em computação, voltados para inovação e resolução de pr
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Wong, Kok-Seng, and Myung Ho Kim. "Towards Self-Awareness Privacy Protection for Internet of Things Data Collection." Journal of Applied Mathematics 2014 (2014): 1–9. http://dx.doi.org/10.1155/2014/827959.

Texto completo
Resumen
The Internet of Things (IoT) is now an emerging global Internet-based information architecture used to facilitate the exchange of goods and services. IoT-related applications are aiming to bring technology to people anytime and anywhere, with any device. However, the use of IoT raises a privacy concern because data will be collected automatically from the network devices and objects which are embedded with IoT technologies. In the current applications, data collector is a dominant player who enforces the secure protocol that cannot be verified by the data owners. In view of this, some of the r
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Murugesan, Senthil, Krishna Venkata, Narendra Mupparaju, and Rayudu Kommi. "Quality of Service Enhancement in Wireless LAN and MANET." International Journal of Wireless and Ad Hoc Communication 1, no. 2 (2020): 08–18. http://dx.doi.org/10.54216/ijwac.010201.

Texto completo
Resumen
In this dissertation, the author introduces a novel MAC technique that uses directional antennas to reduce interference, allowing the channel effectively reuse in various places. A node will wait for the Additional Control Gap (ACG) period after exchanging the RTSCTS packet using the suggested protocol before starting the transmission of data packets. Other nodes in the area may plan simultaneous transmission at this ACG time by exchanging RTSCTS packets with one another. This technique of installing directional antennas to avoid interference while simultaneously ensuring simultaneous transmis
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Wang, Le, Xuefeng Liu, and Xiaodong Lin. "A Fair and Privacy-Preserving Image Trading System Based on Blockchain and Group Signature." Security and Communication Networks 2021 (October 31, 2021): 1–18. http://dx.doi.org/10.1155/2021/5701258.

Texto completo
Resumen
With the rise of digital images in our daily lives, there is a growing need to provide an image trading market where people can monetize their images and get desired images at prices that fit their budget. Those images are usually uploaded and stored onto centralized image trading service providers’ servers and the transactions for image trading are processed by these providers. Unfortunately, transaction unfairness and users’ privacy breaches have become major concerns since the service providers might be untrusted and able to manipulate image trading prices and infer users’ private informati
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Arana-Peña, Sara, Diego Carballares, Vicente Cortés Corberan, and Roberto Fernandez-Lafuente. "Multi-Combilipases: Co-Immobilizing Lipases with Very Different Stabilities Combining Immobilization via Interfacial Activation and Ion Exchange. The Reuse of the Most Stable Co-Immobilized Enzymes after Inactivation of the Least Stable Ones." Catalysts 10, no. 10 (2020): 1207. http://dx.doi.org/10.3390/catal10101207.

Texto completo
Resumen
The lipases A and B from Candida antarctica (CALA and CALB), Thermomyces lanuginosus (TLL) or Rhizomucor miehei (RML), and the commercial and artificial phospholipase Lecitase ultra (LEU) may be co-immobilized on octyl agarose beads. However, LEU and RML became almost fully inactivated under conditions where CALA, CALB and TLL retained full activity. This means that, to have a five components co-immobilized combi-lipase, we should discard 3 fully active and immobilized enzymes when the other two enzymes are inactivated. To solve this situation, CALA, CALB and TLL have been co-immobilized on oc
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Liang, Steve H. L., Sara Saeedi, Soroush Ojagh, et al. "An Interoperable Architecture for the Internet of COVID-19 Things (IoCT) Using Open Geospatial Standards—Case Study: Workplace Reopening." Sensors 21, no. 1 (2020): 50. http://dx.doi.org/10.3390/s21010050.

Texto completo
Resumen
To safely protect workplaces and the workforce during and after the COVID-19 pandemic, a scalable integrated sensing solution is required in order to offer real-time situational awareness and early warnings for decision-makers. However, an information-based solution for industry reopening is ineffective when the necessary operational information is locked up in disparate real-time data silos. There is a lot of ongoing effort to combat the COVID-19 pandemic using different combinations of low-cost, location-based contact tracing, and sensing technologies. These ad hoc Internet of Things (IoT) s
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Campbell, Walter S., Daniel Karlsson, Daniel J. Vreeman, Audrey J. Lazenby, Geoffrey A. Talmon, and James R. Campbell. "A computable pathology report for precision medicine: extending an observables ontology unifying SNOMED CT and LOINC." Journal of the American Medical Informatics Association 25, no. 3 (2017): 259–66. http://dx.doi.org/10.1093/jamia/ocx097.

Texto completo
Resumen
Abstract Background The College of American Pathologists (CAP) introduced the first cancer synoptic reporting protocols in 1998. However, the objective of a fully computable and machine-readable cancer synoptic report remains elusive due to insufficient definitional content in Systematized Nomenclature of Medicine – Clinical Terms (SNOMED CT) and Logical Observation Identifiers Names and Codes (LOINC). To address this terminology gap, investigators at the University of Nebraska Medical Center (UNMC) are developing, authoring, and testing a SNOMED CT observable ontology to represent the data el
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Bukovetskyi, Vasyl, and Vasyl Rizak. "Developing the algorithm and software for access token protection using request signing with temporary secret." Eastern-European Journal of Enterprise Technologies 1, no. 9(115) (2022): 56–62. http://dx.doi.org/10.15587/1729-4061.2022.251570.

Texto completo
Resumen
This paper proposes a method for protecting the access tokens in client-server data exchange without saving the state based on the formation of the signature of the request using a temporary secret. The devised method allows one not to transfer access tokens with each request, which would make it possible for the attacker to authenticate as a valid user when compromising the connection, for example, when using a «person in the middle» attack. Two variants of the method have been proposed and substantiated – simplified and improved, the scope of which depends on the needs for protection and tec
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Vasyl, Bukovetskyi, and Rizak Vasyl. "Developing the algorithm and software for access token protection using request signing with temporary secret." Eastern-European Journal of Enterprise Technologies 1, no. 9 (115) (2022): 56–62. https://doi.org/10.15587/1729-4061.2022.251570.

Texto completo
Resumen
This paper proposes a method for protecting the access tokens in client-server data exchange without saving the state based on the formation of the signature of the request using a temporary secret. The devised method allows one not to transfer access tokens with each request, which would make it possible for the attacker to authenticate as a valid user when compromising the connection, for example, when using a «person in the middle» attack. Two variants of the method have been proposed and substantiated – simplified and improved, the scope of which depends on the needs for
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Cho, Youngil, Kyoung Min Kim, and Tae-Jin Lee. "Air Charging Protocol With Spatial-Reuse." IEEE Wireless Communications Letters 9, no. 3 (2020): 298–301. http://dx.doi.org/10.1109/lwc.2019.2953067.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Liu, Xiaosha, and Dennis A. Clifford. "Ion exchange with denitrified brine reuse." Journal - American Water Works Association 88, no. 11 (1996): 88–99. http://dx.doi.org/10.1002/j.1551-8833.1996.tb06650.x.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Anfinsen, Christian B., Paul J. Flory, and Arno A. Penzias. "NAS Exchange Protocol." Science 228, no. 4699 (1985): 530. http://dx.doi.org/10.1126/science.228.4699.530.b.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

ANFINSEN, C. B., P. J. FLORY, and A. A. PENZIAS. "NAS Exchange Protocol." Science 228, no. 4699 (1985): 530. http://dx.doi.org/10.1126/science.228.4699.530-a.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Tonova, Konstantza. "Ionic liquid-assisted biphasic systems for downstream processing of fermentative enzymes and organic acids." Physical Sciences Reviews 6, no. 3 (2020): 1–33. http://dx.doi.org/10.1515/psr-2018-0068.

Texto completo
Resumen
Abstract Room-temperature ionic liquids (ILs) represent molten salts entirely consisting of ions, usually a charge-stabilized organic cation and an inorganic or organic anion. ILs are liquids at ambient temperature but possess characteristics unusual for the common liquid solvents, such as negligible vapor pressure, high thermal stability and most over the ability to mix and match libraries of cations and anions in order to acquire desirable physical and chemical properties [1]. The opportunity to obtain tunable density, viscosity, polarity and miscibility with common molecular liquids gave ri
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Funabashi, Kiyomi, Tetsuo Fukasawa, Fumio Kawamura, et al. "Reuse System for Powdered Ion-Exchange Resins." Nuclear Technology 73, no. 2 (1986): 220–27. http://dx.doi.org/10.13182/nt86-a33786.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Laitala, Kirsi, and Ingun Grimstad Klepp. "Clothing reuse: The potential in informal exchange." Clothing Cultures 4, no. 1 (2017): 61–77. http://dx.doi.org/10.1386/cc.4.1.61_1.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Meshram, A. J., C. Meshram, S. D. Bagde, and R. R. Meshram. "RIPIC BASED KEY EXCHANGE PROTOCOL." Advances in Mathematics: Scientific Journal 9, no. 12 (2020): 11169–77. http://dx.doi.org/10.37418/amsj.9.12.97.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Gucma, Maciej, and Paulina Hatłas. "Data Exchange Protocol in Repsail." Annual of Navigation 24, no. 1 (2017): 221–29. http://dx.doi.org/10.1515/aon-2017-0016.

Texto completo
Resumen
AbstractArticle presents implantation and theoretical considerations of data exchange protocol developed for the RepSail project, where main objective was design and building innovative hybrid yacht. One of problems during the design process was improper functioning of data exchange protocols that were available in the commercially available devices to mention navigation purpose NMEA183 or 2000 as well as automation dedicated ones (CAN and similar). Author shows the basis of the dedicated format of exchange for in board devices.
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Wang, Hao, Heqing Guo, Manshan Lin, Jianfei Yin, Qi He, and Jun Zhang. "A new dependable exchange protocol." Computer Communications 29, no. 15 (2006): 2770–80. http://dx.doi.org/10.1016/j.comcom.2005.10.028.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Todd, T. D., and A. M. Bignell. "A slot-reuse protocol for rearrangeable dual-bus networks." IEEE Transactions on Communications 42, no. 2/3/4 (1994): 1131–40. http://dx.doi.org/10.1109/tcomm.1994.580222.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

COSTAGLIOLA, GENNARO, RITA FRANCESE, and GIUSEPPE SCANNIELLO. "A VISUAL SYSTEM SUPPORTING SOFTWARE REUSE IN THE BANKING LEGACY SYSTEM CONTEXT." International Journal of Software Engineering and Knowledge Engineering 13, no. 01 (2003): 83–101. http://dx.doi.org/10.1142/s0218194003001202.

Texto completo
Resumen
Banking legacy systems intensively exchange messages in electronic format. Such systems are, for their nature, difficult to update and maintain. As a consequence, the introduction of new types of messages is a hard task. Adding new functionalities requires custom coding and software reuse is seen as a key to obtain a better time-to-market factor, risk and cost reduction. In this paper we describe the architecture and part of the implementation of the SI.RE. Visual System, an Interbanking Network Information System that lets us generate gateways for the exchange of electronic messages among ban
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

R. Tan, Raymond Girard, and Dennis E. Cruz. "Synthesis of Robust Water Reuse Networks Using Fuzzy Nonlinear Programming:Mass Exchange-Based Processes." ASEAN Journal of Chemical Engineering 5, no. 1 (2005): 22. http://dx.doi.org/10.22146/ajche.50160.

Texto completo
Resumen
Water consumption and effluent generation in industrial plants can be effectively reduced by maximizing utilization of partially contaminated water. A dual approach consisting of graphical pinch methods for targeting followed by the synthesis of water reuse networks using such techniques as mathematical programming is usually employed. Reliable process data is necessary for successful plant retrofitting. In most cases, however, the necessary limiting concentrations and mass loads must be deduced from limited information. It thus becomes necessary to balance the conflicting objectives of minimi
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Corvo, Atelier Do, Desirée Pedro, and Carlos Antunes. "Reuse of Modern Schools." Joelho Revista de Cultura Arquitectonica, no. 9 (December 27, 2018): 50–67. http://dx.doi.org/10.14195/1647-8681_9_2.

Texto completo
Resumen

 
 
 
 The two projects selected for the Reuse of Modernist Buildings are examples of our way of understanding this subject. These projects are neither typical rehabilitations, nor refurbishment, but an intense exchange between the diverse existing layers and the new ones required. 
 The aims of these projects focused on giving clarity to the existing facilities and removing the ambiguities which resulted from the successive additions and uses to which the building has been subjected to over time, thus enabling a clear proposal for new buildings. In these projects, th
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Batres, Rafael, Atsushi Aoyama, and Yuji Naka. "A life-cycle approach for model reuse and exchange." Computers & Chemical Engineering 26, no. 4-5 (2002): 487–98. http://dx.doi.org/10.1016/s0098-1354(01)00794-3.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Lai, Jia Yen, Lock Hei Ngu, and Farouq Twaiq. "Template Recycling and Reuse in MCM-41 Synthesis: Statistical Study." Journal of Applied Science & Process Engineering 5, no. 1 (2018): 213–26. http://dx.doi.org/10.33736/jaspe.416.2018.

Texto completo
Resumen
The recycle and reuse of template in MCM-41 synthesis were analysed using 23 full factorial design in order to study the effect of the template extraction parameters on the mass of MCM-41 powder produced. Four consecutive MCM-41 synthesis cycles utilizing the recycled template were studied with three factors that are ethanol fraction (A), amount of ion exchange agent (B) and the type of ion exchange agent (C). The significant effects contributed by the factors A, B and C and their interactions were identified through the half-normal probability plot and normal probability plot of the residuals
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Ali, Ahmed Kamal. "Architecture within a circular economy: Process mapping a resource-based design-bid-build project delivery system." Enquiry A Journal for Architectural Research 14, no. 1 (2017): 48–61. http://dx.doi.org/10.17831/enq:arcc.v14i1.432.

Texto completo
Resumen
In this paper, we develop a novel method for integrating system thinking into architectural design by mapping its processes in a standard process modeling language. We structured a decision-support framework using process mapping workflows to incorporate sustainable building materials and resource-based design decisions into the architectural practice. We turned to other disciplines’ knowledgebases, such as Business Information Technology (BIT), to develop a workflow for the Design-Bid-Build project delivery method (DBB). Mapping both current and the proposed design processes, including their
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Jeong, Ik, and Dong Lee. "Parallel Key Exchange." JUCS - Journal of Universal Computer Science 14, no. (3) (2008): 377–96. https://doi.org/10.3217/jucs-014-03-0377.

Texto completo
Resumen
In the paper we study parallel key exchange among multiple parties. The status of parallel key exchange can be depicted by a key graph. In a key graph, a vertex represents a party and an edge represents a relation of two parties who are to share a key. We first propose a security model for a key graph, which extends the Bellare-Rogaway model for two-party key exchange. Next, we clarify the relations among the various security notions of key exchange. Finally, we construct an efficient key exchange protocol for a key graph using the randomness re-use technique. Our protocol establishes the mult
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Abd El-Naby, Ashraf Saied, Yehia M. Helmy, and Emadeldin Helmy Khalil. "The Strategic Goals of -Using Service Oriented Architecture Principles." Future Computing and Informatics Journal 6, no. 2 (2021): 124–42. http://dx.doi.org/10.54623/fue.fcij.6.2.6.

Texto completo
Resumen
Organizations use heterogonous systems and legacy systems, they are implemented at different platforms, different databases, and different language programs. These systems need to exchange information and reuse the same functionality to achieve integration between these systems. Many Software companies failed to achieve information follow and reuse the same functionality. This paper introduces guidelines introduces Service-Oriented Architecture Principles guidelines and rules to help Applications developers to achieve information integrations and reuse the same functionality, SOA principles pr
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

S, Mustafa. "Capture Aware Channel Access Protocol in Wireless Network." Journal of Engineering Research [TJER] 13, no. 1 (2018): 73. http://dx.doi.org/10.24200/tjer.vol15iss1pp73-87.

Texto completo
Resumen
Spatial reuse in wireless networks is limited by the SINR threshold and it might be feasible to capture a packet in the presence of ongoing foreign transmission. This work considers a new capture aware channel access protocol by incorporating global channel state information in the decision making process for the channel access jointly with adaptive power framework. The protocol employs power heterogeneous ad-hoc networks; it assigns different transmission power level to individual nodes based on dynamic observation of the network traffic. It exploits spatial heterogeneity of flows at a given
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Gharzouli, Mohamed. "Reuse and Improvement of Peersim Open Source Packages." International Journal of Open Source Software and Processes 7, no. 3 (2016): 39–55. http://dx.doi.org/10.4018/ijossp.2016070103.

Texto completo
Resumen
This paper presents the reuse of two open source implementations of P2P protocols for Peersim simulator. Firstly, we will present the new implementation of Chord, which is considered as the most popular P2P protocol among the structured family of P2P networks. In this latter, the search requests generally use a Data Hash Table (DHT) to find a requested resource. This kind of systems is generally known as Structured and Informed Protocols. In this context, to improve the search mechanism of Chord, we modify its open source implementation for Peersim to introduce another type of resource search
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Delmas-Glass, Emmanuelle. "THE YCBA HISTORIC FRAME COLLECTION: USING SEMANTIC WEB TECHNOLOGY TO CONTRIBUTE TO THE SCHOLARSHIP OF BRITISH ART." ARTis ON, no. 2 (February 12, 2016): 9–23. http://dx.doi.org/10.37935/aion.v0i2.37.

Texto completo
Resumen
Following a technical survey of its of historic frame collection, the Yale Center for British Art has catalogued its frames as extensively as its art collection, and now shares it with the world via web pages for human users as well as through machine readable formats (LIDO XML, CIDOC-CRM RDF) for data aggregators. This paper proposes a data management and dissemination strategy model that relies on data exchange protocols and Linked Open Data to ensure that our rich cultural knowledge can be reused by scholars and contributes to the study of frames and the British art in general.
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Valladares Linares, Rodrigo, Zhenyu Li, Victor Yangali-Quintanilla, Qingyu Li, and Gary Amy. "Cleaning protocol for a FO membrane fouled in wastewater reuse." Desalination and Water Treatment 51, no. 25-27 (2013): 4821–24. http://dx.doi.org/10.1080/19443994.2013.795345.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Cheng, Ray-Guang, Ruei-I. Chang, and Kuo-Lun Hua. "IWTRP: Spatial-reuse Enhancement of the Wireless Token Ring Protocol." IEEE Communications Letters 11, no. 8 (2007): 701–3. http://dx.doi.org/10.1109/lcomm.2007.070203.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

JIANG, M. "Access Protocol with Efficient Slot Reuse in WDM Metro Ring." IEICE Transactions on Communications E88-B, no. 4 (2005): 1685–88. http://dx.doi.org/10.1093/ietcom/e88-b.4.1685.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Mosquera-Romero, Suanny, Antonin Prévoteau, Jan B. A. Arends, Diederik P. L. Rousseau, Luis Dominguez-Granda, and Korneel Rabaey. "Disinfection of constructed wetland effluent by in situ electrochemical chlorine production for water reuse." Environmental Science: Water Research & Technology 8, no. 1 (2022): 98–107. http://dx.doi.org/10.1039/d1ew00708d.

Texto completo
Resumen
Constructed wetland effluents meet water reuse standards after efficient electrochemical disinfection, and residual chlorine restricts pathogen regrowth. Chloride electromigration through anion exchange membranes (AEMs) maximized chlorine production.
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Alaraj, Abdullah M. "Optimizing One Fair Document Exchange Protocol." International Journal of Network Security & Its Applications 4, no. 1 (2012): 1–12. http://dx.doi.org/10.5121/ijnsa.2012.4101.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!