Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Reuse and protocol exchange.

Zeitschriftenartikel zum Thema „Reuse and protocol exchange“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Reuse and protocol exchange" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Aydin, Muhammed Iberia, Damla Ozaktac, Burak Yuzer, Mustafa Doğu, Hatice Inan, Hatice Eser Okten, Serdar Coskun und Huseyin Selcuk. „Desalination and Detoxification of Textile Wastewater by Novel Photocatalytic Electrolysis Membrane Reactor for Ecosafe Hydroponic Farming“. Membranes 12, Nr. 1 (23.12.2021): 10. http://dx.doi.org/10.3390/membranes12010010.

Der volle Inhalt der Quelle
Annotation:
In this study, a novel photoelectrocatalytic membrane (PECM) reactor was tested as an option for the desalination, disinfection, and detoxification of biologically treated textile wastewater (BTTWW), with the aim to reuse it in hydroponic farming. The anionic ion exchange (IEX) process was used before PECM treatment to remove toxic residual dyes. The toxicity evaluation for every effluent was carried out using the Vibrio fischeri, Microtox® test protocol. The disinfection effect of the PECM reactor was studied against E. coli. After PECM treatment, the 78.7% toxicity level of the BTTWW was reduced to 14.6%. However, photocatalytic desalination during treatment was found to be slow (2.5 mg L−1 min−1 at 1 V potential). The reactor demonstrated approximately 52% COD and 63% TOC removal efficiency. The effects of wastewater reuse on hydroponic production were comparatively investigated by following the growth of the lettuce plant. A detrimental effect was observed on the lettuce plant by the reuse of BTTWW, while no negative impact was reported using the PECM treated textile wastewater. In addition, all macro/micronutrient elements in the PECM treated textile wastewater were recovered by hydroponic farming, and the PECM treatment may be an eco-safe wastewater reuse method for crop irrigation.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Termens, Miquel, Mireia Ribera und Anita Locher. „An analysis of file format control in institutional repositories“. Library Hi Tech 33, Nr. 2 (15.06.2015): 162–74. http://dx.doi.org/10.1108/lht-10-2014-0098.

Der volle Inhalt der Quelle
Annotation:
Purpose – The purpose of this paper is to analyze the file formats of the digital objects stored in two of the largest open-access repositories in Spain, DDUB and TDX, and determines the implications of these formats for long-term preservation, focussing in particular on the different versions of PDF. Design/methodology/approach – To be able to study the two repositories, the authors harvested all the files corresponding to every digital object and some of their associated metadata using the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH) and Open Archives Initiative Object Reuse and Exchange (OAI-ORE) protocols. The file formats were analyzed with DROID software and some additional tools. Findings – The results show that there is no alignment between the preservation policies declared by institutions, the technical tools available, and the actual stored files. Originality/value – The results show that file controls currently applied to institutional repositories do not suffice to grant their stated mission of long-term preservation of scientific literature.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

STINE, JOHN A., GUSTAVO DE VECIANA, KEVIN H. GRACE und ROBERT C. DURST. „ORCHESTRATING SPATIAL REUSE IN WIRELESS AD HOC NETWORKS USING SYNCHRONOUS COLLISION RESOLUTION (SCR)“. Journal of Interconnection Networks 03, Nr. 03n04 (September 2002): 167–95. http://dx.doi.org/10.1142/s0219265902000616.

Der volle Inhalt der Quelle
Annotation:
We propose a novel medium access control protocol for ad hoc wireless networks data to send can contend simultaneously for the channel. Nodes contend for access using a synchronous signaling mechanism that achieves two objectives: it arbitrates contentions locally and it selects a subset of nodes across the network that attempt to transmit simultaneously. The subset of nodes that survive the signaling mechanism can be viewed as an orchestrated set of transmissions that are spatially reusing the channel shared by the nodes. Thus the 'quality' of the subset of nodes selected by the signaling mechanism is a key factor in determining the spatial capacity of the system. In this paper, we propose a general model for such synchronous signaling mechanisms and recommend a preferred design. We then focus via both analysis and simulation on the spatial and capacity characteristics of these access control mechanisms. Our work is unique in that it specifically focuses on the spatial capacity aspects of a MAC protocol, as would be critical for ad hoc networking, and shows SCR is a promising solution. Specifically, it does not suffer from congestion collapse as the density of contending nodes grows, it does not suffer from hidden or exposed node effects, it achieves high capacities with a spatial usage exceeding 1 (i.e. more than one packet exchange in the area covered by a transmission), and it facilitates the integration of new physical layer capacity increasing technologies.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Cui, Hui, und Glen Mudra. „Authenticated Key Exchange under Bad Randomness, Revisited“. Mathematics 11, Nr. 12 (15.06.2023): 2721. http://dx.doi.org/10.3390/math11122721.

Der volle Inhalt der Quelle
Annotation:
A bad randomness may cause catastrophic results in security; thus, it is of importance to make cryptographic systems secure against bad randomness. In this paper, we focus on a practical situation where an adversary is able to force participants in an authenticated key exchange (AKE) system to reuse the random values and the functions of these values, called related randomness attack (RRA). Following the existing randomness resetting security model of AKE and the RRA security model of public-key encryption, we present a model of RRA security for authenticated key exchange, as well as the necessary restrictions on the related randomness functions used to obtain the security definition. Then we show how a related randomness attack adversary breaks the security of some existing AKE protocols, and propose some constructions of RRA-secure authenticated key exchange in the random oracle model and standard model, respectively.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Goncharov, M. V., und K. A. Kolosov. „On interoperability of metadata within RNPLS&T’s Single Open Information Archive“. Scientific and Technical Libraries, Nr. 10 (12.11.2021): 45–62. http://dx.doi.org/10.33186/1027-3689-2021-10-45-62.

Der volle Inhalt der Quelle
Annotation:
Russian National Public Library for Science and Technology has been developing the Single Open Information Archive (UOIA) to merge all digital full-text resources created or acquired by the Library. The authors examine the issues of interoperability when exchanging metadata between UOIA built on library automation software and open archives using OAI-PMH technology for metadata acquisition. Interoperability in information exchange between different ALIS is provided, for example, through applying SRU/SRW protocol and metadata scheme, while metadata exchange between OA repositories is provided mainly within Dublin Core (DC) scheme. ALIS – OA metadata transmission with transformation into DC results in information loss and prevents unambiguous reverse transformation.For a long time, DSpace has been the most popular software for open digital repositories. This product enables OAI-PMH metadata acquisition in DC and Qualified DC (QDC) formats, and supports Object Reuse and Exchange (ORE) standard, which enables to describe aggregated resources. ORE in DSpace enables to collect not only metadata but also connected files and to receive other connected data provided by importing source. DSpace uses rather simple ORE format based on Atom XML that allows binding several files of different functionality with RDF-triplets.The OAI-PMH software connector is designed for RNPLS&T SOIA and enables to present metadata in DC, QDC, MARC21, and ORE formats, which supports interoperability in information exchange with OA repositories with DSpace software. Beside metadata transmission, transmission of various data types is possible, e. g. document text or license information. Further development is to expand format structure to represent associated data, in particular using RDF.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Li, Wei, und Xin Wang. „Construction of Modularized English Teaching Platform for Multimedia Wireless Network Based on NS2 Simulation Software“. Mobile Information Systems 2021 (19.10.2021): 1–10. http://dx.doi.org/10.1155/2021/5329208.

Der volle Inhalt der Quelle
Annotation:
Using the NS2 network simulation tool to teach the “wireless network” course can enhance students’ understanding of wireless network protocols through visualization and can also improve students’ ability to analyze problems hands on. We built a multimedia wireless network modularized English teaching platform based on NS2 simulation software; made full use of the rich components and network resources provided by NS2 to achieve a high degree of code reuse and reduce the time for developing simulation codes; designed the overall framework of this multimedia wireless network modular English teaching platform based on the B/S structure; and solved the weight coefficient and importance value of the learning input evaluation index, based on the feedback elite teaching optimization algorithm, the improved teaching formula, the increase in the number of exchanges, and the improvement in the learner’s performance. The experimental results show that the LEACH and LEACH-C protocols of the clustered NS2 simulation software have more surviving nodes most of the time, which indicates that the clustering routing protocol has better performance.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Hardwick, Martin. „On STEP-NC and the Complexities of Product Data Integration“. Journal of Computing and Information Science in Engineering 4, Nr. 1 (01.03.2004): 60–67. http://dx.doi.org/10.1115/1.1641188.

Der volle Inhalt der Quelle
Annotation:
For twenty years the manufacturing domain has been seeking to share product model data by defining an entity relationship model covering the life cycle of geometrically defined products. The data sharing is implemented by selecting subsets of these entities and relationships to define data exchange standards for CAD, CAE, CAM, CNC and PDM systems. The approach requires agreement on how data will be reused across the domains so an organization has been meeting to manage the required data definitions. Considerable success was achieved in 1995 when a standard was proposed and implemented by industry as a way to move 3D geometry between CAD systems. Now, a new protocol for exchanging manufacturing process information between CAM systems and CNC devices is being released. This protocol reuses much of the data defined for the other domains and will allow CNC manufacturing tools to process 3D data, but the complexity of the specification is causing controversy. In this paper we report on the new specification and analyze the advantages and disadvantages of its approach to defining CNC control programs.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Meyer, Max-Arno, Lina Sauter, Christian Granrath, Hassen Hadj-Amor und Jakob Andert. „Simulator Coupled with Distributed Co-Simulation Protocol for Automated Driving Tests“. Automotive Innovation 4, Nr. 4 (16.10.2021): 373–89. http://dx.doi.org/10.1007/s42154-021-00161-1.

Der volle Inhalt der Quelle
Annotation:
AbstractTo meet the challenges in software testing for automated vehicles, such as increasing system complexity and an infinite number of operating scenarios, new simulation methods must be developed. Closed-loop simulations for automated driving (AD) require highly complex simulation models for multiple controlled vehicles with their perception systems as well as their surrounding context. For the realization of such models, different simulation domains must be coupled with co-simulation. However, widely supported model integration standards such as functional mock-up interface (FMI) lack native support for distributed platforms, which is a key feature for AD due to the computational intensity and platform exclusivity of certain models. The newer FMI companion standard distributed co-simulation protocol (DCP) introduces platform coupling but must still be used in conjunction with AD co-simulations. As part of an assessment framework for AD, this paper presents a DCP compliant implementation of an interoperable interface between a 3D environment and vehicle simulator and a co-simulation platform. A universal Python wrapper is implemented and connected to the simulator to allow its control as a DCP slave. A C-code-based interface enables the co-simulation platform to act as a DCP master and to realize cross-platform data exchange and time synchronization of the environment simulation with other integrated models. A model-in-the-loop use case is performed with the traffic simulator CARLA running on a Linux machine connected to the co-simulation master xMOD on a Windows computer via DCP. Several virtual vehicles are successfully controlled by cooperative adaptive cruise controllers executed outside of CARLA. The standard compliance of the implementation is verified by exemplary connection to prototypic DCP solutions from 3rd party vendors. This exemplary application demonstrates the benefits of DCP compliant tool coupling for AD simulation with increased tool interoperability, reuse potential, and performance.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Yavari, Mostafa, Masoumeh Safkhani, Saru Kumari, Sachin Kumar und Chien-Ming Chen. „An Improved Blockchain-Based Authentication Protocol for IoT Network Management“. Security and Communication Networks 2020 (26.10.2020): 1–16. http://dx.doi.org/10.1155/2020/8836214.

Der volle Inhalt der Quelle
Annotation:
Communication security between IoT devices is a major concern in this area, and the blockchain has raised hopes that this concern will be addressed. In the blockchain concept, the majority or even all network nodes check the validity and accuracy of exchanged data before accepting and recording them, whether this data is related to financial transactions or measurements of a sensor or an authentication message. In evaluating the validity of an exchanged data, nodes must reach a consensus in order to perform a special action, in which case the opportunity to enter and record transactions and unreliable interactions with the system is significantly reduced. Recently, in order to share and access management of IoT devices information with distributed attitude a new authentication protocol based on blockchain is proposed and it is claimed that this protocol satisfies user privacy preserving and security. However, in this paper, we show that this protocol has security vulnerabilities against secret disclosure, replay, traceability, and Token reuse attacks with the success probability of 1 and constant complexity of also 1. We also proposed an improved blockchain-based authentication protocol (IBCbAP) that has security properties such as secure access management and anonymity. We implemented IBCbAP using JavaScript programming language and Ethereum local blockchain. We also proved IBCbAP’s security both informally and formally through the Scyther tool. Our comparisons showed that IBCbAP could provide suitable security along with reasonable cost.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Gilissen, Valentijng, und Hella Hollander. „Archiving the Past While Keeping up with the Times“. Studies in Digital Heritage 1, Nr. 2 (14.12.2017): 194–205. http://dx.doi.org/10.14434/sdh.v1i2.23238.

Der volle Inhalt der Quelle
Annotation:
The e-depot for Dutch archaeology started as a project at Data Archiving and Networked Services (DANS) in 2004 and developed into a successful service, which has ever since been part of the national archaeological data workflow of the Netherlands.While continuously processing archaeological datasets and publications and developing expertise regarding data preservation, various developments are taking place in the data landscape and direct involvement is necessary to ensure that the needs of the designated community are best met. Standard protocols must be defined for the processing of data with the best guarantees for long-term preservation and accessibility. Monitoring the actual use of file formats and the use of their significant characteristics within specific scientific disciplines is needed to keep strategies up-to-date.National developments includes the definition of a national metadata exchange protocol, its accommodation in the DANS EASY self-deposit archive and its role in the central channelling of information submission. In international context, projects such as ARIADNE and PARTHENOS enable further developments regarding data preservation and dissemination. The opportunities provided by such international projects enriched the data by improving options for data reuse, including allowing for the implementation of a map-based search facility on DANS EASY. The projects also provide a platform for sharing of expertise via international collaboration.This paper will detail the positioning of the data archive in the research data cycle and show examples of the data enrichment enabled by collaboration within international projects.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Nosheen, Irum, Shoab A. Khan und Umar Ali. „A Cross-Layer Design for a Multihop, Self-Healing, and Self-Forming Tactical Network“. Wireless Communications and Mobile Computing 2019 (09.04.2019): 1–16. http://dx.doi.org/10.1155/2019/1523906.

Der volle Inhalt der Quelle
Annotation:
In mission and time critical applications, bandwidth and delay optimizations are the key goals of communication systems. This paper presents a cross-layer framework design that reduces the call setup time, provides collision-free communication, and reuses the empty slots of Time Division Multiple Access (TDMA) protocol which otherwise causes low throughput and large delay. As number of communicating nodes in tactical networks is small as compared to commercial mobile ad hoc networks (MANETs), classical TDMA will yield huge number of empty slots and any Carrier Sense Multiple Access/Collision Detection (CSMA/CD) technique may cause more delay in some critical scenarios. Proposed methodology gives a Cross-Layer Architecture for Network (NET) Layer and Medium Access Control (MAC) Layer. Our design provides bandwidth efficient, collision-free communication to Software-Defined Radios (SDRs) in self-forming and self-healing tactical networks with low call setup time and multihop routing. For this purpose TDMA as MAC layer protocol and Ad Hoc On Demand Distance Vector (AODV) as Network Layer Routing Protocol are used. Our slot allocation (SA) algorithm, Cross-Layer TDMA (CL-TDMA), consists of control phase where AODV control packets are exchanged and data transfer phase where transmission of data and voice occurs. All active radios in vicinity gather information about communicating nodes based on the exchange of control packets by SDRs. Our algorithm then uses this information to help all active SDRs find slot(s) that will be used for collision-free transmission. A number of experiments are performed to establish improved performance of the proposed technique compared to other established techniques and protocols.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Tabassum, Tamanna, SK Alamgir Hossain, Md Anisur Rahman, Mohammed F. Alhamid und M. Anwar Hossain. „An Efficient Key Management Technique for the Internet of Things“. Sensors 20, Nr. 7 (06.04.2020): 2049. http://dx.doi.org/10.3390/s20072049.

Der volle Inhalt der Quelle
Annotation:
The Internet of Things (IoT) has changed our lives drastically. Customers, regulatory bodies, and industrial partners are driving us to use IoT. Although IoT provides new opportunities, security remains a key concern while providing various services. It is especially challenging how the data generated from IoT devices can be protected from potential security attacks and how to safeguard the exchange of these data while transiting through different nodes and gateways. In this research, we aim to ensure a safe IoT environment by proposing an efficient key management technique that uses a combination of symmetric and asymmetric cryptosystem to obtain the speed of the former as well as the security benefits of the latter. Our proposal considers a set of Smart Objects (SO) capable of key registration, generation and distribution for IoT data transmission. We used the open-source Message Queuing Telemetry Transport (MQTT) protocol to facilitate communications between the source and the destination nodes. The suitability of the proposed approach is measured experimentally and the results are comparable to existing works with respect to key conversion time, algorithm execution time, number of reuse connections, and bandwidth utilization.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Shintaku, Milton, Lucas Ângelo Silveira, Alexandre Faria de Oliveira, Diego José Macedo und Ingrid Torres Schiessl. „Uso do protocolo de interoperabilidade OAI-ORE para preservação digital“. Revista Brasileira de Preservação Digital 4 (10.06.2023): e023012. http://dx.doi.org/10.20396/rebpred.v4i00.17992.

Der volle Inhalt der Quelle
Annotation:
Introdução: A preservação digital em Bibliotecas Digitais e Repositórios, no Brasil, tem sido um desafio, na medida em que grande parte desses sistemas estão implementados com o software livre DSpace, que não está preparado para atuar nesta atividade. Objetivo: Assim, o presente trabalho tem por objetivo apresentar uma nova opção para a preservação digital de documentos depositados em sistemas de informação implementados com o DSpace, com o uso do modelo Hipátia. Metodologia: Para tanto, o estudo faz uso de técnicas de pesquisas aplicadas em computação, voltados para inovação e resolução de problemas. Resultados: Os resultados apresentam os ajustes necessários, no DSpace, para utilizar o protocolo nativo Open Archives Initiative - Object Reuse and Exchange (OAI-ORE) para integração com o Modelo Hipátia. Conclusão: Com isso, contribui com a integração de ferramentas ao modelo Hipátia, voltado à preservação digital, de forma simples, utilizando um protocolo nativo do DSpace.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Wong, Kok-Seng, und Myung Ho Kim. „Towards Self-Awareness Privacy Protection for Internet of Things Data Collection“. Journal of Applied Mathematics 2014 (2014): 1–9. http://dx.doi.org/10.1155/2014/827959.

Der volle Inhalt der Quelle
Annotation:
The Internet of Things (IoT) is now an emerging global Internet-based information architecture used to facilitate the exchange of goods and services. IoT-related applications are aiming to bring technology to people anytime and anywhere, with any device. However, the use of IoT raises a privacy concern because data will be collected automatically from the network devices and objects which are embedded with IoT technologies. In the current applications, data collector is a dominant player who enforces the secure protocol that cannot be verified by the data owners. In view of this, some of the respondents might refuse to contribute their personal data or submit inaccurate data. In this paper, we study a self-awareness data collection protocol to raise the confidence of the respondents when submitting their personal data to the data collector. Our self-awareness protocol requires each respondent to help others in preserving his privacy. The communication (respondents and data collector) and collaboration (among respondents) in our solution will be performed automatically.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Murugesan, Senthil, Krishna Venkata, Narendra Mupparaju und Rayudu Kommi. „Quality of Service Enhancement in Wireless LAN and MANET“. International Journal of Wireless and Ad Hoc Communication 1, Nr. 2 (2020): 08–18. http://dx.doi.org/10.54216/ijwac.010201.

Der volle Inhalt der Quelle
Annotation:
In this dissertation, the author introduces a novel MAC technique that uses directional antennas to reduce interference, allowing the channel effectively reuse in various places. A node will wait for the Additional Control Gap (ACG) period after exchanging the RTSCTS packet using the suggested protocol before starting the transmission of data packets. Other nodes in the area may plan simultaneous transmission at this ACG time by exchanging RTSCTS packets with one another. This technique of installing directional antennas to avoid interference while simultaneously ensuring simultaneous transmissions among nodes in the vicinity may enhance the overall throughput and latency of wireless ad hoc networks. The suggested MAC protocol, in combination with TCP, serves to lessen the possibility of medium congestion and collisions in multi-hop situations by scheduling simultaneous transmissions. After identifying the bottleneck node on the high-traffic route, the heavy-traffic route moved to a different dedicated path to facilitate longhop flow. This makes it feasible for longhop flow to use the completely available bandwidth of the recently allotted dedicated lane and ensures that traffic on the congested route will reduce. Additionally, the dissertation offers a simple but efficient hybrid model as a solution to the issues that could come up when carrying out disaster relief activities. According to the suggested concept, stationary SANET grid nodes that is installed will allow mobile MANET nodes that are more than 13 kilometres outside of the transmission range of the infrastructure network to connect to the internet and the central command. In the case of a disaster, this method increases the coverage area of MANET nodes, enabling those nodes to connect with and exchange data with the rescue and relief operations centre
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Wang, Le, Xuefeng Liu und Xiaodong Lin. „A Fair and Privacy-Preserving Image Trading System Based on Blockchain and Group Signature“. Security and Communication Networks 2021 (31.10.2021): 1–18. http://dx.doi.org/10.1155/2021/5701258.

Der volle Inhalt der Quelle
Annotation:
With the rise of digital images in our daily lives, there is a growing need to provide an image trading market where people can monetize their images and get desired images at prices that fit their budget. Those images are usually uploaded and stored onto centralized image trading service providers’ servers and the transactions for image trading are processed by these providers. Unfortunately, transaction unfairness and users’ privacy breaches have become major concerns since the service providers might be untrusted and able to manipulate image trading prices and infer users’ private information. Recently, several approaches have been proposed to address the unfairness issue by using the decentralized ledger technique and smart contract, but users’ privacy protection is not considered. In this paper, we propose a fair and privacy-preserving protocol that supports image fair exchange and protect user privacy. In particular, we exploit blockchain and Merkle tree to construct a fair image trading protocol with low communication overhead based on smart contract, which serves as an external judge that resolves disputes between buyers and sellers in image transactions. Moreover, we extend a popular short group signature scheme to protect users’ identity privacy, prevent linkability of transactions from being inferred, and ensure traceability of malicious users who may sell fake images and/or refuse to pay. Finally, we design and build a practical and open-source image trading system to evaluate the performance of our proposed protocol. Experimental results demonstrate its effectiveness and efficiency in real-world applications.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Arana-Peña, Sara, Diego Carballares, Vicente Cortés Corberan und Roberto Fernandez-Lafuente. „Multi-Combilipases: Co-Immobilizing Lipases with Very Different Stabilities Combining Immobilization via Interfacial Activation and Ion Exchange. The Reuse of the Most Stable Co-Immobilized Enzymes after Inactivation of the Least Stable Ones“. Catalysts 10, Nr. 10 (19.10.2020): 1207. http://dx.doi.org/10.3390/catal10101207.

Der volle Inhalt der Quelle
Annotation:
The lipases A and B from Candida antarctica (CALA and CALB), Thermomyces lanuginosus (TLL) or Rhizomucor miehei (RML), and the commercial and artificial phospholipase Lecitase ultra (LEU) may be co-immobilized on octyl agarose beads. However, LEU and RML became almost fully inactivated under conditions where CALA, CALB and TLL retained full activity. This means that, to have a five components co-immobilized combi-lipase, we should discard 3 fully active and immobilized enzymes when the other two enzymes are inactivated. To solve this situation, CALA, CALB and TLL have been co-immobilized on octyl-vinyl sulfone agarose beads, coated with polyethylenimine (PEI) and the least stable enzymes, RML and LEU have been co-immobilized over these immobilized enzymes. The coating with PEI is even favorable for the activity of the immobilized enzymes. It was checked that RML and LEU could be released from the enzyme-PEI coated biocatalyst, although this also produced some release of the PEI. That way, a protocol was developed to co-immobilize the five enzymes, in a way that the most stable could be reused after the inactivation of the least stable ones. After RML and LEU inactivation, the combi-biocatalysts were incubated in 0.5 M of ammonium sulfate to release the inactivated enzymes, incubated again with PEI and a new RML and LEU batch could be immobilized, maintaining the activity of the three most stable enzymes for at least five cycles of incubation at pH 7.0 and 60 °C for 3 h, incubation on ammonium sulfate, incubation in PEI and co-immobilization of new enzymes. The effect of the order of co-immobilization of the different enzymes on the co-immobilized biocatalyst activity was also investigated using different substrates, finding that when the most active enzyme versus one substrate was immobilized first (nearer to the surface of the particle), the activity was higher than when this enzyme was co-immobilized last (nearer to the particle core).
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Liang, Steve H. L., Sara Saeedi, Soroush Ojagh, Sepehr Honarparvar, Sina Kiaei, Mahnoush Mohammadi Jahromi und Jeremy Squires. „An Interoperable Architecture for the Internet of COVID-19 Things (IoCT) Using Open Geospatial Standards—Case Study: Workplace Reopening“. Sensors 21, Nr. 1 (24.12.2020): 50. http://dx.doi.org/10.3390/s21010050.

Der volle Inhalt der Quelle
Annotation:
To safely protect workplaces and the workforce during and after the COVID-19 pandemic, a scalable integrated sensing solution is required in order to offer real-time situational awareness and early warnings for decision-makers. However, an information-based solution for industry reopening is ineffective when the necessary operational information is locked up in disparate real-time data silos. There is a lot of ongoing effort to combat the COVID-19 pandemic using different combinations of low-cost, location-based contact tracing, and sensing technologies. These ad hoc Internet of Things (IoT) solutions for COVID-19 were developed using different data models and protocols without an interoperable way to interconnect these heterogeneous systems and exchange data on people and place interactions. This research aims to design and develop an interoperable Internet of COVID-19 Things (IoCT) architecture that is able to exchange, aggregate, and reuse disparate IoT sensor data sources in order for informed decisions to be made after understanding the real-time risks in workplaces based on person-to-place interactions. The IoCT architecture is based on the Sensor Web paradigm that connects various Things, Sensors, and Datastreams with an indoor geospatial data model. This paper presents a study of what, to the best of our knowledge, is the first real-world integrated implementation of the Open Geospatial Consortium (OGC) Sensor Web Enablement (SWE) and IndoorGML standards to calculate the risk of COVID-19 online using a workplace reopening case study. The proposed IoCT offers a new open standard-based information model, architecture, methodologies, and software tools that enable the interoperability of disparate COVID-19 monitoring systems with finer spatial-temporal granularity. A workplace cleaning use case was developed in order to demonstrate the capabilities of this proposed IoCT architecture. The implemented IoCT architecture included proximity-based contact tracing, people density sensors, a COVID-19 risky behavior monitoring system, and the contextual building geospatial data.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Campbell, Walter S., Daniel Karlsson, Daniel J. Vreeman, Audrey J. Lazenby, Geoffrey A. Talmon und James R. Campbell. „A computable pathology report for precision medicine: extending an observables ontology unifying SNOMED CT and LOINC“. Journal of the American Medical Informatics Association 25, Nr. 3 (13.09.2017): 259–66. http://dx.doi.org/10.1093/jamia/ocx097.

Der volle Inhalt der Quelle
Annotation:
Abstract Background The College of American Pathologists (CAP) introduced the first cancer synoptic reporting protocols in 1998. However, the objective of a fully computable and machine-readable cancer synoptic report remains elusive due to insufficient definitional content in Systematized Nomenclature of Medicine – Clinical Terms (SNOMED CT) and Logical Observation Identifiers Names and Codes (LOINC). To address this terminology gap, investigators at the University of Nebraska Medical Center (UNMC) are developing, authoring, and testing a SNOMED CT observable ontology to represent the data elements identified by the synoptic worksheets of CAP. Methods Investigators along with collaborators from the US National Library of Medicine, CAP, the International Health Terminology Standards Development Organization, and the UK Health and Social Care Information Centre analyzed and assessed required data elements for colorectal cancer and invasive breast cancer synoptic reporting. SNOMED CT concept expressions were developed at UNMC in the Nebraska Lexicon© SNOMED CT namespace. LOINC codes for each SNOMED CT expression were issued by the Regenstrief Institute. SNOMED CT concepts represented observation answer value sets. Results UNMC investigators created a total of 194 SNOMED CT observable entity concept definitions to represent required data elements for CAP colorectal and breast cancer synoptic worksheets, including biomarkers. Concepts were bound to colorectal and invasive breast cancer reports in the UNMC pathology system and successfully used to populate a UNMC biobank. Discussion The absence of a robust observables ontology represents a barrier to data capture and reuse in clinical areas founded upon observational information. Terminology developed in this project establishes the model to characterize pathology data for information exchange, public health, and research analytics.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Bukovetskyi, Vasyl, und Vasyl Rizak. „Developing the algorithm and software for access token protection using request signing with temporary secret“. Eastern-European Journal of Enterprise Technologies 1, Nr. 9(115) (28.02.2022): 56–62. http://dx.doi.org/10.15587/1729-4061.2022.251570.

Der volle Inhalt der Quelle
Annotation:
This paper proposes a method for protecting the access tokens in client-server data exchange without saving the state based on the formation of the signature of the request using a temporary secret. The devised method allows one not to transfer access tokens with each request, which would make it possible for the attacker to authenticate as a valid user when compromising the connection, for example, when using a «person in the middle» attack. Two variants of the method have been proposed and substantiated – simplified and improved, the scope of which depends on the needs for protection and technical capabilities of their implementation. The robustness of both variants is ensured by the practical inability to select the initial input data of the hash function used to form the signature. The improved version also makes it possible to protect access tokens at the stage of receiving them and provides protection against the attack of the recurrence of the request. Initial user authentication protection is achieved by using the Diffie-Hellman protocol to exchange a secret and access token. Using query IDs and time labels prevents the query from being reused. Advanced security for access tokens is important because having an attacker’s access token gives the attacker full control over the user account. The use of SSL/TLS may not produce the desired level of protection for such important data. It was established that the use of the proposed method does not add significant time costs. The SHA-256 hash function example shows that the relationship between message size and extra time to send and receive a message is linear. When using the proposed method in the browser, the absolute value of additional time spent for messages from 100 bytes to 2,048 KB ranges from 0.4 ms to 142 ms. Given this, the proposed method could be used without significant impact on the experience of use.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Cho, Youngil, Kyoung Min Kim und Tae-Jin Lee. „Air Charging Protocol With Spatial-Reuse“. IEEE Wireless Communications Letters 9, Nr. 3 (März 2020): 298–301. http://dx.doi.org/10.1109/lwc.2019.2953067.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Liu, Xiaosha, und Dennis A. Clifford. „Ion exchange with denitrified brine reuse“. Journal - American Water Works Association 88, Nr. 11 (November 1996): 88–99. http://dx.doi.org/10.1002/j.1551-8833.1996.tb06650.x.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Anfinsen, Christian B., Paul J. Flory und Arno A. Penzias. „NAS Exchange Protocol“. Science 228, Nr. 4699 (03.05.1985): 530. http://dx.doi.org/10.1126/science.228.4699.530.b.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

ANFINSEN, C. B., P. J. FLORY und A. A. PENZIAS. „NAS Exchange Protocol“. Science 228, Nr. 4699 (03.05.1985): 530. http://dx.doi.org/10.1126/science.228.4699.530-a.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Tonova, Konstantza. „Ionic liquid-assisted biphasic systems for downstream processing of fermentative enzymes and organic acids“. Physical Sciences Reviews 6, Nr. 3 (08.12.2020): 1–33. http://dx.doi.org/10.1515/psr-2018-0068.

Der volle Inhalt der Quelle
Annotation:
Abstract Room-temperature ionic liquids (ILs) represent molten salts entirely consisting of ions, usually a charge-stabilized organic cation and an inorganic or organic anion. ILs are liquids at ambient temperature but possess characteristics unusual for the common liquid solvents, such as negligible vapor pressure, high thermal stability and most over the ability to mix and match libraries of cations and anions in order to acquire desirable physical and chemical properties [1]. The opportunity to obtain tunable density, viscosity, polarity and miscibility with common molecular liquids gave rise to a variety of applications of the ILs [2] as environmentally benign solvents, extractants or auxiliaries. In particular, numbers of innovations in the methods for recovery and purification of biologically derived compounds involve ILs used solo or partnered with other liquids in biphasic systems [3,4,5]. It should be noted that the ILs are not intrinsically greener than the traditional solvents, given that their production is usually more resource-demanding, but the inherent potential for recycling and reuse, and for prevention of chemical accidents gives the ILs advantages ahead. The present chapter provides a state-of-the-art overview on the basic applications of the ILs in biphasic systems aimed at downstream processing of valuable fermentative products, enzymes and organic acids. Main industrially important enzymes, lipases and carbohydrases, are considered and a description of the IL-assisted aqueous biphasic systems (ABS) and the results obtained in view of enzyme yield and purity is made. ILs serve different functions in the ABS, main phase-segregating constituents (mostly in the IL/salt ABS) or adjuvants to the polymer/salt ABS. Enzyme isolation from the contaminant proteins present in the feedstock can be carried out either in the IL-rich or in the salt-rich phase of the ABS and for the reader’s convenience the two options are described separately. Discussion on the factors and parameters affecting the enzyme partitioning in the ABS with ILs guides the reader through the ways by which the interactions between the IL and the enzyme can be manipulated in favor of the enzyme purification through the choice of the ABS composition (IL, salt, pH) and the role of the water content and the IL-rich phase structure. The second part of the chapter is dedicated to the recovery of fermentative organic acids. Mostly hydrophobic ILs have been engaged in the studies and the biphasic systems thereof are summarized. The systems are evaluated by the extraction efficiency and partition coefficient obtained. Factors and parameters affecting the extraction of organic acids by ILs are highlighted in a way to unravel the extraction mechanism. The choice of IL and pH determines the reactive mechanism and the ion exchange, while the water content and the IL phase structure play roles in physical extraction. Procedures undertaken to enhance the efficiency and to intensify the process of extraction are also looked over. Finally, the experimental holes that need fill up in the future studies are marked. According to the author’s opinion an intense research with hydrophobic ILs is suggested as these ILs have been proved milder to the biological structures (both the microbial producer and the enzyme product), more effective in the organic acid recovery and suitable to perform “in situ” extraction. Extractive fermentation entails validation of ecological and toxicological characteristics of the ILs. The protocols for re-extraction of fermentative products separated by IL-assisted biphasic systems should be clearly settled along with the methods for ILs recycling and reuse. Novel more flexible approaches to process intensification can be implemented in order to adopt the separation by biphasic systems for use in industry.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Funabashi, Kiyomi, Tetsuo Fukasawa, Fumio Kawamura, Hideo Yusa, Makoto Kikuchi, Noriharu Sasaki und Toshio Yamadera. „Reuse System for Powdered Ion-Exchange Resins“. Nuclear Technology 73, Nr. 2 (Mai 1986): 220–27. http://dx.doi.org/10.13182/nt86-a33786.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Laitala, Kirsi, und Ingun Grimstad Klepp. „Clothing reuse: The potential in informal exchange“. Clothing Cultures 4, Nr. 1 (01.03.2017): 61–77. http://dx.doi.org/10.1386/cc.4.1.61_1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Todd, T. D., und A. M. Bignell. „A slot-reuse protocol for rearrangeable dual-bus networks“. IEEE Transactions on Communications 42, Nr. 2/3/4 (Februar 1994): 1131–40. http://dx.doi.org/10.1109/tcomm.1994.580222.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Meshram, A. J., C. Meshram, S. D. Bagde und R. R. Meshram. „RIPIC BASED KEY EXCHANGE PROTOCOL“. Advances in Mathematics: Scientific Journal 9, Nr. 12 (31.12.2020): 11169–77. http://dx.doi.org/10.37418/amsj.9.12.97.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Gucma, Maciej, und Paulina Hatłas. „Data Exchange Protocol in Repsail“. Annual of Navigation 24, Nr. 1 (01.12.2017): 221–29. http://dx.doi.org/10.1515/aon-2017-0016.

Der volle Inhalt der Quelle
Annotation:
AbstractArticle presents implantation and theoretical considerations of data exchange protocol developed for the RepSail project, where main objective was design and building innovative hybrid yacht. One of problems during the design process was improper functioning of data exchange protocols that were available in the commercially available devices to mention navigation purpose NMEA183 or 2000 as well as automation dedicated ones (CAN and similar). Author shows the basis of the dedicated format of exchange for in board devices.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Wang, Hao, Heqing Guo, Manshan Lin, Jianfei Yin, Qi He und Jun Zhang. „A new dependable exchange protocol“. Computer Communications 29, Nr. 15 (September 2006): 2770–80. http://dx.doi.org/10.1016/j.comcom.2005.10.028.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Batres, Rafael, Atsushi Aoyama und Yuji Naka. „A life-cycle approach for model reuse and exchange“. Computers & Chemical Engineering 26, Nr. 4-5 (Mai 2002): 487–98. http://dx.doi.org/10.1016/s0098-1354(01)00794-3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Corvo, Atelier Do, Desirée Pedro und Carlos Antunes. „Reuse of Modern Schools“. Joelho Revista de Cultura Arquitectonica, Nr. 9 (27.12.2018): 50–67. http://dx.doi.org/10.14195/1647-8681_9_2.

Der volle Inhalt der Quelle
Annotation:
The two projects selected for the Reuse of Modernist Buildings are examples of our way of understanding this subject. These projects are neither typical rehabilitations, nor refurbishment, but an intense exchange between the diverse existing layers and the new ones required. The aims of these projects focused on giving clarity to the existing facilities and removing the ambiguities which resulted from the successive additions and uses to which the building has been subjected to over time, thus enabling a clear proposal for new buildings. In these projects, the renovation and remodelling of existing structures, as well as the proposal for new constructions, was grounded on the principle of a dialogue between the existing and the new, between the past and the present.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

R. Tan, Raymond Girard, und Dennis E. Cruz. „Synthesis of Robust Water Reuse Networks Using Fuzzy Nonlinear Programming:Mass Exchange-Based Processes“. ASEAN Journal of Chemical Engineering 5, Nr. 1 (01.06.2005): 22. http://dx.doi.org/10.22146/ajche.50160.

Der volle Inhalt der Quelle
Annotation:
Water consumption and effluent generation in industrial plants can be effectively reduced by maximizing utilization of partially contaminated water. A dual approach consisting of graphical pinch methods for targeting followed by the synthesis of water reuse networks using such techniques as mathematical programming is usually employed. Reliable process data is necessary for successful plant retrofitting. In most cases, however, the necessary limiting concentrations and mass loads must be deduced from limited information. It thus becomes necessary to balance the conflicting objectives of minimizing water usage and of ensuring that sufficient stream concentrations fall within their limiting values. The use of fuzzy nonlinear programming for the synthesis of robust water reuse networks is demonstrated using a four-process case study from the literature. Keywords: Fuzzy nonlinear programming, process integration, and water reuse network (WRN).
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

S, Mustafa. „Capture Aware Channel Access Protocol in Wireless Network“. Journal of Engineering Research [TJER] 13, Nr. 1 (31.01.2018): 73. http://dx.doi.org/10.24200/tjer.vol15iss1pp73-87.

Der volle Inhalt der Quelle
Annotation:
Spatial reuse in wireless networks is limited by the SINR threshold and it might be feasible to capture a packet in the presence of ongoing foreign transmission. This work considers a new capture aware channel access protocol by incorporating global channel state information in the decision making process for the channel access jointly with adaptive power framework. The protocol employs power heterogeneous ad-hoc networks; it assigns different transmission power level to individual nodes based on dynamic observation of the network traffic. It exploits spatial heterogeneity of flows at a given channel allocation and sets up either symmetric or asymmetric carrier sensing which in turn schedules the data packets transmission to maintain adequate service quality and fairness enjoyed by a user. It stands atop capture capable PHY to leverage the channel reuse which is of paramount importance in the design of high capacity ad-hoc networks. Through extensive simulations, the paper demonstrates the efficacy of the new protocol. It delivers high network utilization and also provides fair access to the media.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Gharzouli, Mohamed. „Reuse and Improvement of Peersim Open Source Packages“. International Journal of Open Source Software and Processes 7, Nr. 3 (Juli 2016): 39–55. http://dx.doi.org/10.4018/ijossp.2016070103.

Der volle Inhalt der Quelle
Annotation:
This paper presents the reuse of two open source implementations of P2P protocols for Peersim simulator. Firstly, we will present the new implementation of Chord, which is considered as the most popular P2P protocol among the structured family of P2P networks. In this latter, the search requests generally use a Data Hash Table (DHT) to find a requested resource. This kind of systems is generally known as Structured and Informed Protocols. In this context, to improve the search mechanism of Chord, we modify its open source implementation for Peersim to introduce another type of resource search that supports semantic and blind requests. The main objective is to show how we have modified the open source code to achieve our goals. Also, in this paper, we will present how we have improved the display of results by the Peersim simulator through another open source package that implements Cloudcast protocol.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Valladares Linares, Rodrigo, Zhenyu Li, Victor Yangali-Quintanilla, Qingyu Li und Gary Amy. „Cleaning protocol for a FO membrane fouled in wastewater reuse“. Desalination and Water Treatment 51, Nr. 25-27 (03.06.2013): 4821–24. http://dx.doi.org/10.1080/19443994.2013.795345.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Cheng, Ray-Guang, Ruei-I. Chang und Kuo-Lun Hua. „IWTRP: Spatial-reuse Enhancement of the Wireless Token Ring Protocol“. IEEE Communications Letters 11, Nr. 8 (August 2007): 701–3. http://dx.doi.org/10.1109/lcomm.2007.070203.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

JIANG, M. „Access Protocol with Efficient Slot Reuse in WDM Metro Ring“. IEICE Transactions on Communications E88-B, Nr. 4 (01.04.2005): 1685–88. http://dx.doi.org/10.1093/ietcom/e88-b.4.1685.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

COSTAGLIOLA, GENNARO, RITA FRANCESE und GIUSEPPE SCANNIELLO. „A VISUAL SYSTEM SUPPORTING SOFTWARE REUSE IN THE BANKING LEGACY SYSTEM CONTEXT“. International Journal of Software Engineering and Knowledge Engineering 13, Nr. 01 (Februar 2003): 83–101. http://dx.doi.org/10.1142/s0218194003001202.

Der volle Inhalt der Quelle
Annotation:
Banking legacy systems intensively exchange messages in electronic format. Such systems are, for their nature, difficult to update and maintain. As a consequence, the introduction of new types of messages is a hard task. Adding new functionalities requires custom coding and software reuse is seen as a key to obtain a better time-to-market factor, risk and cost reduction. In this paper we describe the architecture and part of the implementation of the SI.RE. Visual System, an Interbanking Network Information System that lets us generate gateways for the exchange of electronic messages among banking legacy systems and supports software reuse. In particular, the SI.RE visual system contains a Visual Programming Environment that allows us to obtain a rapid development of the message handling functions. This environment implements a Visual Programming Language UVG that allows a programmer to reuse COBOL routines.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Lai, Jia Yen, Lock Hei Ngu und Farouq Twaiq. „Template Recycling and Reuse in MCM-41 Synthesis: Statistical Study“. Journal of Applied Science & Process Engineering 5, Nr. 1 (31.03.2018): 213–26. http://dx.doi.org/10.33736/jaspe.416.2018.

Der volle Inhalt der Quelle
Annotation:
The recycle and reuse of template in MCM-41 synthesis were analysed using 23 full factorial design in order to study the effect of the template extraction parameters on the mass of MCM-41 powder produced. Four consecutive MCM-41 synthesis cycles utilizing the recycled template were studied with three factors that are ethanol fraction (A), amount of ion exchange agent (B) and the type of ion exchange agent (C). The significant effects contributed by the factors A, B and C and their interactions were identified through the half-normal probability plot and normal probability plot of the residuals. F-test and t-test were carried out to test the contribution of regression coefficients for synthesis cycles of MCM-41 synthesis models. AB interaction showed that larger mass of MCM-41 powder was obtained at high ethanol volume fraction and high quantity of ion exchange agent when either type of ion exchange agent was used.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Ali, Ahmed Kamal. „Architecture within a circular economy: Process mapping a resource-based design-bid-build project delivery system“. Enquiry A Journal for Architectural Research 14, Nr. 1 (17.12.2017): 48–61. http://dx.doi.org/10.17831/enq:arcc.v14i1.432.

Der volle Inhalt der Quelle
Annotation:
In this paper, we develop a novel method for integrating system thinking into architectural design by mapping its processes in a standard process modeling language. We structured a decision-support framework using process mapping workflows to incorporate sustainable building materials and resource-based design decisions into the architectural practice. We turned to other disciplines’ knowledgebases, such as Business Information Technology (BIT), to develop a workflow for the Design-Bid-Build project delivery method (DBB). Mapping both current and the proposed design processes, including their activities, workflow, and decision nodes, was critical in defining roles, flow of information, and subsequent decisions. In this study, we utilized a qualitative methodology to capture the required knowledge from industry experts in resource-based design and then integrated our findings into a set of process maps to support the materials decisions by the architectural project team. This study establishes a system of information exchange to support the growth of the newly emerging industry of reuse stores and vendors. Through numerous interviews and knowledge capturing sessions with industry experts from the building material reuse industry that acknowledged an absence of a "system of information exchange." It is through this study that an overall system of information exchange will connect the links between the reuse industry and the AEC industry. The primary outcome of this study is a structured process for design with resource reuse. This process will redefine the DBB traditional design process by introducing new procedures, define information exchange and identify key decisions within the proposed processes, define responsibilities and identify key stakeholders. The author conducted an extensive multi-year knowledge capturing process with constructive feedback from the industry experts.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Abd El-Naby, Ashraf Saied, Yehia M. Helmy und Emadeldin Helmy Khalil. „The Strategic Goals of -Using Service Oriented Architecture Principles“. Future Computing and Informatics Journal 6, Nr. 2 (24.11.2021): 124–42. http://dx.doi.org/10.54623/fue.fcij.6.2.6.

Der volle Inhalt der Quelle
Annotation:
Organizations use heterogonous systems and legacy systems, they are implemented at different platforms, different databases, and different language programs. These systems need to exchange information and reuse the same functionality to achieve integration between these systems. Many Software companies failed to achieve information follow and reuse the same functionality. This paper introduces guidelines introduces Service-Oriented Architecture Principles guidelines and rules to help Applications developers to achieve information integrations and reuse the same functionality, SOA principles providing rules and guidelines that specify exactly how solution logic should be decomposed and molded into technology solutions
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Delmas-Glass, Emmanuelle. „THE YCBA HISTORIC FRAME COLLECTION: USING SEMANTIC WEB TECHNOLOGY TO CONTRIBUTE TO THE SCHOLARSHIP OF BRITISH ART“. ARTis ON, Nr. 2 (12.02.2016): 9–23. http://dx.doi.org/10.37935/aion.v0i2.37.

Der volle Inhalt der Quelle
Annotation:
Following a technical survey of its of historic frame collection, the Yale Center for British Art has catalogued its frames as extensively as its art collection, and now shares it with the world via web pages for human users as well as through machine readable formats (LIDO XML, CIDOC-CRM RDF) for data aggregators. This paper proposes a data management and dissemination strategy model that relies on data exchange protocols and Linked Open Data to ensure that our rich cultural knowledge can be reused by scholars and contributes to the study of frames and the British art in general.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Alaraj, Abdullah M. „Optimizing One Fair Document Exchange Protocol“. International Journal of Network Security & Its Applications 4, Nr. 1 (31.01.2012): 1–12. http://dx.doi.org/10.5121/ijnsa.2012.4101.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Ya-juan, Zhang, Zhu Yue-fei und Huang Qiu-sheng. „An identity-based key-exchange protocol“. Wuhan University Journal of Natural Sciences 10, Nr. 1 (Januar 2005): 235–38. http://dx.doi.org/10.1007/bf02828658.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Lu, Rongxing, und Zhenfu Cao. „Simple three-party key exchange protocol“. Computers & Security 26, Nr. 1 (Februar 2007): 94–97. http://dx.doi.org/10.1016/j.cose.2006.08.005.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Fogel, Brent L., und Mark T. McNally. „Trace Contamination Following Reuse of Anion-Exchange DNA Purification Resins“. BioTechniques 28, Nr. 2 (Februar 2000): 299–302. http://dx.doi.org/10.2144/00282bf02.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Pagliari, Stefano, und Kevin L. Young. „Exploring information exchange among interest groups: a text-reuse approach“. Journal of European Public Policy 27, Nr. 11 (01.11.2020): 1698–717. http://dx.doi.org/10.1080/13501763.2020.1817132.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Shen, Ren Jie, Wen Wei Zhang und Lei Wang. „Using Mathematical Programming Optimization Work Exchange Networks“. Advanced Materials Research 889-890 (Februar 2014): 612–16. http://dx.doi.org/10.4028/www.scientific.net/amr.889-890.612.

Der volle Inhalt der Quelle
Annotation:
For the work exchange network, this paper proposed an optimal matching network mathematical to achieve the maxime reuse target. Based on this method, a case is studied, the corresponding work exchange network is optimized and the optimal matching network is obtained. The case study also shows that this method is more efficient and specific than the graphical and problem table methods, which is proved by the correctness, efficiency and benefits of mathematical programming method.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie