Academic literature on the topic 'ISO (Computer network standard)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'ISO (Computer network standard).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "ISO (Computer network standard)"

1

Smura, Edwin J., Barbara Beeton, Karla Savage, and Alan Griffee. "Font information interchange standard ISO/IEC 9541." Computer Communications 12, no. 2 (April 1989): 93–96. http://dx.doi.org/10.1016/0140-3664(89)90063-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Anel Tanovic, Samir Ribic, and Zvjezdan Sehovac. "New performed model of ISO/IEC 20000 standard." International Journal of Digital Content Technology and its Applications 7, no. 10 (June 30, 2013): 80–94. http://dx.doi.org/10.4156/jdcta.vol7.issue10.9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lazarevska, Marijana, Meri Cvetkovska, Miloš Knežević, Ana Trombeva Gavriloska, Milivoje Milanovic, Vera Murgul, and Nikolay Vatin. "Neural Network Prognostic Model for Predicting the Fire Resistance of Eccentrically Loaded RC Columns." Applied Mechanics and Materials 627 (September 2014): 276–82. http://dx.doi.org/10.4028/www.scientific.net/amm.627.276.

Full text
Abstract:
Using the concept of the artificial neural networks and the results of the performed numerical analyses as input parameters, the prediction model for defining the fire resistance of RC columns incorporated in walls and exposed to standard fire from one side, has been made. A short description of the numerical analyses of columns exposed to standard fire ISO 834, conducted by the computer software FIRE are presented in this paper. The software is capable of predicting the nonlinear response of reinforced concrete elements and plane frame structures subjected to fire loading, carrying out the nonlinear transient heat flow analysis and nonlinear stress-strain response associated with fire.
APA, Harvard, Vancouver, ISO, and other styles
4

L. Calpito, Jomar, Paul L. Olanday, and Alain C. Gallarde. "Application of advanced encryption standard in the computer or handheld online year-round registration system." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 2 (August 1, 2022): 922. http://dx.doi.org/10.11591/ijeecs.v27.i2.pp922-935.

Full text
Abstract:
<span lang="EN-US">With various severe security threats for web applications, ensuring security on the database layer itself is imperative. Hence, this study aims to protect data saved on the computer or handheld online year-round (CHOY) registration system using the advanced encryption standard (AES) to strengthen data security within the app so that even potential attackers gain access to the app's database; they cannot obtain valuable information because it is scrambled and unreadable. The proponents based the study's conceptual framework on the symmetric and asymmetric key algorithms and procedures manual on enrollment of Southern Isabela College of arts and trades (SICAT) and ISO 25010. The study consists of three elements: developing the CHOY web app imbued with AES, testing it in terms of online registration and spam prevention, and evaluating it using the ISO 25010 in terms of compatibility, reliability, and security. The evaluation results show that implementing the AES in the CHOY web app meets the ISO 25010 criteria mentioned above.</span>
APA, Harvard, Vancouver, ISO, and other styles
5

de Andrade e Silva, Arnaldo Gualberto, Herman Martins Gomes, and Leonardo Vidal Batista. "A collaborative deep multitask learning network for face image compliance to ISO/IEC 19794-5 standard." Expert Systems with Applications 198 (July 2022): 116756. http://dx.doi.org/10.1016/j.eswa.2022.116756.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Huang, Xucheng, and Shah Nazir. "Evaluating Security of Internet of Medical Things Using the Analytic Network Process Method." Security and Communication Networks 2020 (September 1, 2020): 1–14. http://dx.doi.org/10.1155/2020/8829595.

Full text
Abstract:
Internet of Medical Things (IoMT) plays an important role in healthcare. Different devices such as smart sensors, wearable devices, handheld, and many other devices are connected in a network in the form of Internet of Things (IoT) for the smooth running of communication in healthcare. Security of these devices in healthcare is important due to its nature of functionality and efficiency. An efficient and robust security system is in dire need to cope with the attacks, threats, and vulnerability. The security evaluation of IoMT is an issue since couple of years. Therefore, the aim of the proposed study is to evaluate the security of IoMT by using the analytic network (ANP) process. The proposed approach is applied using ISO/IEC 27002 (ISO 27002) standard and some other important features from the literature. The results of the proposed research demonstrate the effective IoMT components which can further be used as secure IoMT.
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Po-Tong, Jui Jen Chou, and Chiu Wang Tseng. "Pixel-wise Colorimetric Characterization based on U-Net Convolutional Network." Journal of Imaging Science and Technology 64, no. 4 (July 1, 2020): 40405–1. http://dx.doi.org/10.2352/j.imagingsci.technol.2020.64.4.040405.

Full text
Abstract:
Abstract In this article, we present a U-Net convolutional network for solving insufficient data problems of color patches in colorimetric characterization. The U-Net network uses data augmentation annotated over 6,885,222 colors, 32,027,200 color patches, and 2,098 billion pixels directly from only eight standard colorimetric images of ISO 12640 (CIELAB/SCID). By applying the U-Net network trained on big augmented data, the pixel-wise colorimetric characterization is implemented from digitalized red, green, blue image samples to ISO 12640 (CIELAB/SCID) CIELAB standard colorimetric images. The performance efficiency of the U-Net network is superior to that of the convolutional neural network on both training and validating epochs. Moreover, pixel-wise color colorimetric characterization is achieved using the intelligent machine vision of U-Net integrated with a data augmentation technique to overcome the drawback of complex color patches and labor-intensive tasks. This study might improve colorimetric characterization technology with a resolution of 2560-by-2048 for over 4 million pixels. The results reveal that U-net with pixel-wise regression enhances the precise colors of images, taking detail and realism to a new level.
APA, Harvard, Vancouver, ISO, and other styles
8

Meng, Long, and Liqun Chen. "Reviewing the ISO/IEC Standard for Timestamping Services." IEEE Communications Standards Magazine 5, no. 3 (September 2021): 20–25. http://dx.doi.org/10.1109/mcomstd.011.2000083.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hannemyr, G., and P. R. Innocent. "A network user interface: Incorporating human factors guidelines into the ISO standard for open systems interconnection." Behaviour & Information Technology 4, no. 4 (October 1985): 309–26. http://dx.doi.org/10.1080/01449298508901810.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Forte, Dario. "Keeping up to standard – incident management in ISO 17799." Network Security 2006, no. 4 (April 2006): 16–17. http://dx.doi.org/10.1016/s1353-4858(06)70359-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "ISO (Computer network standard)"

1

Chen, Yan. "Traitement transactionnel dans un environnement OSI." Grenoble 2 : ANRT, 1988. http://catalogue.bnf.fr/ark:/12148/cb376126461.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ngqondi, Tembisa Grace. "The ISO/IEC 27002 and ISO/IEC 27799 information security management standards : a comparative analysis from a healthcare perspective." Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/1066.

Full text
Abstract:
Technological shift has become significant and an area of concern in the health sector with regard to securing health information assets. Health information systems hosting personal health information expose these information assets to ever-evolving threats. This information includes aspects of an extremely sensitive nature, for example, a particular patient may have a history of drug abuse, which would be reflected in the patient’s medical record. The private nature of patient information places a higher demand on the need to ensure privacy. Ensuring that the security and privacy of health information remain intact is therefore vital in the healthcare environment. In order to protect information appropriately and effectively, good information security management practices should be followed. To this end, the International Organization for Standardization (ISO) published a code of practice for information security management, namely the ISO 27002 (2005). This standard is widely used in industry but is a generic standard aimed at all industries. Therefore it does not consider the unique security needs of a particular environment. Because of the unique nature of personal health information and its security and privacy requirements, the need to introduce a healthcare sector-specific standard for information security management was identified. The ISO 27799 was therefore published as an industry-specific variant of the ISO 27002 which is geared towards addressing security requirements in health informatics. It serves as an implementation guide for the ISO 27002 when implemented in the health sector. The publication of the ISO 27799 is considered as a positive development in the quest to improve health information security. However, the question arises whether the ISO 27799 addresses the security needs of the healthcare domain sufficiently. The extensive use of the ISO 27002 implies that many proponents of this standard (in healthcare), now have to ensure that they meet the (assumed) increased requirements of the ISO 27799. The purpose of this research is therefore to conduct a comprehensive comparison of the ISO 27002 and ISO 27799 standards to determine whether the ISO 27799 serves the specific needs of the health sector from an information security management point of view.
APA, Harvard, Vancouver, ISO, and other styles
3

Alila, Patrick. "Complementing network security to the ISO/IEC 27000 standard." Thesis, Linköpings universitet, Institutionen för teknik och naturvetenskap, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-96298.

Full text
Abstract:
I syfte att öppna upp nya affärsmöjligheter för informationssäkerhetsföretaget Secure State AB, har detta arbete bedrivits för att komplettera företagets nuvarande standard för informationssäkerhetsarbete med ytterligare nätverkssäkerhet. Krav på slutresultatet var att dokumentet eller standarden skulle kunna komplettera ISO 27000, samt vara kostnadseffektivt. Efter en undersökning av den nämnda standarden konstaterades att enbart ISO 27000 i sig inte är ett fullgott verktyg för nätverkssäkerhetsarbete, på grund av dess icke-tekniska inriktning och målgrupp. Att komplettera ISO 27000 med av författaren utarbetade krav var inte heller att föredra, då syftet med ett standardiserat arbetssätt därmed försvinner. Det är bättre och attraktivare för kunden att använda sig av specifika tekniska standarder och rekommendationer. Sökandet efter en kompletterande standard påbörjades däför enligt dessa kriterier Kompatibilitet med ISO 27000 Teknisk inriktning Kostnadseffektiv Attraktiv att arbeta efter ISO 18028 uppfyller dessa krav mycket bra på samtliga punkter och är därmed bäst lämpad att arbeta efter av de tre standarder/rekommendationer som undersöktes mot kravlistan. Därför bör också Secure State välja att utföra nätverkssäkerhetsarbetet förankrat i ISO 18028 med följande förväntade resultat. Fig. 10, Förväntat resultat av komplettering till ISO 27000. Högst upp ser vi de allmäna informationssäkerhetspolicies samtliga anställda följer. Som nivå två finns ISO 27000, vilket är ledningens system för hur informationssäkerhetsarbetet övergripande ska hanteras. Längst ned ser vi den tekniska skyddsutrustningen som administreras av tekniker som följer lämpliga dokument. Denna rapport har identifierat ISO 18028 för säkerheten i nätverk, övriga återstår att vid behov identifiera för annan teknisk utrustning.
APA, Harvard, Vancouver, ISO, and other styles
4

Okcan, Alper. "Automatic Acquisition And Use Of Multimodal Medical Device Observations Based On Iso/ieee 11073 And Hl7 Standards." Master's thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12608462/index.pdf.

Full text
Abstract:
The delivery of quality healthcare to all citizens at reasonable costs is an important challenge. With the increase in the aging population, the costs of managing chronic diseases increase. Today, healthcare services tend to shift from recovery to prevention. Remote healthcare monitoring is crucial for prevention and monitoring of chronic diseases since they require continuous and long-term monitoring. The advances in networking, mobile communications and medical device technologies offer a great potential to realize remote healthcare monitoring. However, seamless integration of multi-modal medical devices to the existing healthcare information systems is necessary for the automated use of medical device observations in related applications. The thesis addresses the automatic acquisition and use of multi-modal medical device observations in healthcare information systems. The interoperability of medical devices with healthcare information systems requires both physical connectivity and application level interoperability. Therefore, the thesis concentrates on both the medical device domain and the interoperability efforts on the existing healthcare information systems. It provides an interoperability solution based on ISO/IEEE 11073 and HL7 standards. This work is also realized the automatic acquisition and use of multi-modal medical device observations in an intelligent healthcare monitoring and decision support system which is developed as a part of the IST-027074 SAPHIRE project funded by the European Commission.
APA, Harvard, Vancouver, ISO, and other styles
5

Nyström, Jan. "A formalisation of the ITU-T Intelligent Network standard." Licentiate thesis, Uppsala universitet, Avdelningen för datorteknik, 2000. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-226522.

Full text
Abstract:
Telecommunication systems are today among the largest and most heterogeneous computer systems that exist. The functionality offered by them is rapidly increasing, by numerous features: call waiting, credit-card billing and call-forwarding to name a few. The realisation of extra services poses a challenge to implementors, in particular since different services are developed at different times and places, by different people. Not only is the number and complexity of services increasing but some vendors want to enable users to tailor their own services and ultimately design them entirely. This of course calls for rigorous control of the services so that they do not come into conflict with the interest of the vendors, other users or surprise the users with their behaviours. One way of aiding the service designers is to provide a service creation environment containing a set of well defined building blocks that would be uniform for all features, irrespective of vendor or service. Such an environment also needs tool support for writing, checking, validating and analysing for possible conflicts. We have constructed a formalism for compactly specifying the interface behaviour of the switching and service logic system underlying a service creation environment, and for specifying the behaviour of components of an environment for service creation. For this formalism we supply tool support in the form of a simulator. We have further made a formalisation, in our framework, of the ITU-T Intelligent Network model, Capability Set-1. The formalisation concerns both the underlying service architecture, in which service logic is perform by a dedicated Service Control Function, and the component language, in which Service Independent Building Blocks are composed to yield new services.
APA, Harvard, Vancouver, ISO, and other styles
6

Byrne, Bernadette M. "A longitudinal study of the diffusion of the ISO/IEC information resource dictionary system standard (IRDS.)." Thesis, Aston University, 2001. http://publications.aston.ac.uk/10610/.

Full text
Abstract:
The IRDS standard is an international standard produced by the International Organisation for Standardisation (ISO). In this work the process for producing standards in formal standards organisations, for example the ISO, and in more informal bodies, for example the Object Management Group (OMG), is examined. This thesis examines previous models and classifications of standards. The previous models and classifications are then combined to produce a new classification. The IRDS standard is then placed in a class in the new model as a reference anticipatory standard. Anticipatory standards are standards which are developed ahead of the technology in order to attempt to guide the market. The diffusion of the IRDS is traced over a period of eleven years. The economic conditions which affect the diffusion of standards are examined, particularly the economic conditions which prevail in compatibility markets such as the IT and ICT markets. Additionally the consequences of the introduction of gateway or converter devices into a market where a standard has not yet been established is examined. The IRDS standard did not have an installed base and this hindered its diffusion. The thesis concludes that the IRDS standard was overtaken by new developments such as object oriented technologies and middleware. This was partly because of the slow development process of developing standards in traditional organisations which operate on a consensus basis and partly because the IRDS standard did not have an installed base. Also the rise and proliferation of middleware products resulted in exchange mechanisms becoming dominant rather than repository solutions. The research method used in this work is a longitudinal study of the development and diffusion of the ISO/EEC IRDS standard. The research is regarded as a single case study and follows the interpretative epistemological point of view.
APA, Harvard, Vancouver, ISO, and other styles
7

Coetzer, Christo. "An investigation of ISO/IEC 27001 adoption in South Africa." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1018669.

Full text
Abstract:
The research objective of this study is to investigate the low adoption of the ISO/IEC 27001 standard in South African organisations. This study does not differentiate between the ISO/IEC 27001:2005 and ISO/IEC 27001:2013 versions, as the focus is on adoption of the ISO/IEC 27001 standard. A survey-based research design was selected as the data collection method. The research instruments used in this study include a web-based questionnaire and in-person interviews with the participants. Based on the findings of this research, the organisations that participated in this study have an understanding of the ISO/IEC 27001 standard; however, fewer than a quarter of these have fully adopted the ISO/IEC 27001 standard. Furthermore, the main business objectives for organisations that have adopted the ISO/IEC 27001 standard were to ensure legal and regulatory compliance, and to fulfil client requirements. An Information Security Management System management guide based on the ISO/IEC 27001 Plan-Do-Check-Act model is developed to help organisations interested in the standard move towards ISO/IEC 27001 compliance.
APA, Harvard, Vancouver, ISO, and other styles
8

Akinwale, Olusegun. "DuoTracker tool support for software defect data collection and analysis /." abstract and full text PDF (free order & download UNR users only), 2007. http://0-gateway.proquest.com.innopac.library.unr.edu/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1447633.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Baalaji, Venkateshwaraiyer S. "Collaborative services in an ad hoc wireless network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FBaalaji%5FITM.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, Sept. 2004.
Thesis advisor(s): Alex Bordetsky, Gurminder Singh. Includes bibliographical references (p. 71). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
10

Goh, Mei Jean. "On implementing the ISO File Transfer, Access and Management protocol for a UNIX 4.2 BSD environment." Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26263.

Full text
Abstract:
Different computer systems have their own ways of representing, storing and managing files. One approach to facilitate file transfers among systems in a heterogeneous networked environment is for each system to locally map files for transfer onto a virtual filestore (VFS). Conceptually, a virtual filestore provides a universal model for describing files and how they can be manipulated. The ISO File Transfer, Access and Management (FTAM) protocol offers one such virtual filestore model. This thesis reports on the prototype implementation of a useful subset of the ISO FTAM protocol for the UNIX 4.2 BSD¹ file system. We call this implementation ubcFTAM. UNIX files, ordinarily regarded as unstructured, can be endowed with some internal structure thereby allowing the transfer of selective portions of a file. Furthermore, the implementation offers several file attributes not supported by UNIX. ubcFTAM runs on several Sun Workstations² interconnected by a 10 Mbps Ethernet. Some performance data of ubcFTAM are also presented. This thesis also identifies several aspects of the specifications that are ambiguous or that are inadequate, warranting further studies. Resolutions for these issues are discussed. We hope this experience will be useful to others planning to implement FTAM for UNIX systems. ¹UNIX is a registered trademark of American Telephone and Telegraph Bell Laboratories. BSD denotes Berkeley Standard Distribution ²SUN Workstation is a trademark of Sun Microsystems, Inc.
Science, Faculty of
Computer Science, Department of
Graduate
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "ISO (Computer network standard)"

1

Steedman, Douglas. X.500: The directory standard and its application. Twickenham [England]: Technology Appraisals, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Information security policy development for compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0. Boca Raton, FL: CRC Press, Taylor & Francis Group, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Electro/94, (1994 Boston Mass ). Electro/94 international: Conference proceedings : combined volumes : [May 10-May 12, 1994, Boston, MA]. [New York]: IEEE, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gai, Silvano. I/O consolidation in the data center: A complete guide to data center Ethernet and Fibre Channel over Ethernet. Indianapolis, Ind: Cisco Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Claudio, DeSanti, ed. I/O consolidation in the data center: A complete guide to data center Ethernet and Fibre Channel over Ethernet. Indianapolis, Ind: Cisco Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Institution, British Standards. Draft for development: Database language SQL (ISO/DIS 9075) = Language de base dedonnées relationnel = Datenbanksprache SQL. London: B.S.I., 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Plauger, P. J. ANSI and ISO standard C programmer's reference. Redmond, Washington: Microsoft Press, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Plauger, P. J. ANSI and ISO Standard C: Programmer's reference. Redmond, Wash: Microsoft Press, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Niklaus, Wirth, Mickel Andrew B, and Miner James F, eds. Pascal user manual and report: ISO Pascal standard. 4th ed. New York: Springer-Verlag, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jensen, Kathleen. Pascal user manual and report: ISO Pascal standard. 4th ed. New York: Springer-Verlag, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "ISO (Computer network standard)"

1

Conti, Mauro, Denis Donadel, Radha Poovendran, and Federico Turrin. "EVExchange: A Relay Attack on Electric Vehicle Charging System." In Computer Security – ESORICS 2022, 488–508. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17140-6_24.

Full text
Abstract:
AbstractTo support the increasing spread of Electric Vehicles (EVs), Charging Stations (CSs) are being installed worldwide. The new generation of CSs employs the Vehicle-To-Grid (V2G) paradigm by implementing novel standards such as the ISO 15118. This standard enables high-level communication between the vehicle and the charging column, helps manage the charge smartly, and simplifies the payment phase. This novel charging paradigm, which connects the Smart Grid to external networks (e.g., EVs and CSs), has not been thoroughly examined yet. Therefore, it may lead to dangerous vulnerability surfaces and new research challenges.In this paper, we present EVExchange, the first attack to steal energy during a charging session in a V2G communication: i.e., charging the attacker’s car while letting the victim pay for it. Furthermore, if reverse charging flow is enabled, the attacker can even sell the energy available on the victim’s car! Thus, getting the economic profit of this selling, and leaving the victim with a completely discharged battery. We developed a virtual and a physical testbed in which we validate the attack and prove its effectiveness in stealing the energy. To prevent the attack, we propose a lightweight modification of the ISO 15118 protocol to include a distance bounding algorithm. Finally, we validated the countermeasure on our testbeds. Our results show that the proposed countermeasure can identify all the relay attack attempts while being transparent to the user.
APA, Harvard, Vancouver, ISO, and other styles
2

Weik, Martin H. "network standard." In Computer Science and Communications Dictionary, 1090. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_12274.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Weik, Martin H. "management network standard." In Computer Science and Communications Dictionary, 971. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_11003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Weik, Martin H. "optical network standard." In Computer Science and Communications Dictionary, 1180. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_13099.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Srinivasan, Vijay, and Michael A. O’Connor. "Towards an ISO Standard for Statistical Tolerancing." In Computer-aided Tolerancing, 159–72. Dordrecht: Springer Netherlands, 1996. http://dx.doi.org/10.1007/978-94-009-1529-9_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chattopadhyay, Soumya, Ashwin Jha, and Mridul Nandi. "Fine-Tuning the ISO/IEC Standard LightMAC." In Lecture Notes in Computer Science, 490–519. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-92078-4_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Weik, Martin H. "Synchronous Optical Network standard." In Computer Science and Communications Dictionary, 1711. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_18817.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Weik, Martin H. "Telecommunications Management Network standard." In Computer Science and Communications Dictionary, 1744. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_19162.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lai, Yeu-Pong, and Jui-Heng Tai. "Network Security Improvement with Isolation Implementation Based on ISO-17799 Standard." In Network-Based Information Systems, 69–78. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74573-0_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tsuboi, Tsutomu. "Wireless Vehicular Network Standard Harmonization." In Lecture Notes in Computer Science, 75–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37974-1_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "ISO (Computer network standard)"

1

Felser, Winfried, and Wolfgang Mueller. "EXPRESS-P: Extending EXPRESS for Process Modeling and Monitoring." In ASME 1994 International Computers in Engineering Conference and Exhibition and the ASME 1994 8th Annual Database Symposium collocated with the ASME 1994 Design Technical Conferences. American Society of Mechanical Engineers, 1994. http://dx.doi.org/10.1115/edm1994-0509.

Full text
Abstract:
Abstract The upcoming ISO standard EXPRESS has been defined as a data specification language for the use within STEP. EXPRESS supports the modeling of static structural relationships and consistency constraints whereas the applicability of EXPRESS for the modeling of behavior is very limited. Thus, at present there is an ongoing discussion by which means EXPRESS should be extended with. In this paper, we present EXPRESS-P. EXPRESS-P is an extension of EXPRESS by the concepts of the formal languages SDL (CCITT Standard), Estelle (ISO Standard), and GRAPES-86. Within these approaches a system is described as a network of communicating concurrent agents. In addition to the language, we introduce graphical means for this extension (System and Process Diagrams). Finally, we give a practical example by modeling an injection molding process in order to demonstrate the applicability of EXPRESS-P.
APA, Harvard, Vancouver, ISO, and other styles
2

Morris, K. C. "Data Probe: A Tool for EXPRESS-Based Data." In ASME 1993 International Computers in Engineering Conference and Exposition. American Society of Mechanical Engineers, 1993. http://dx.doi.org/10.1115/edm1993-0094.

Full text
Abstract:
Abstract The problem of sharing data has many facets. The need to share data across multiple enterprises, different hardware platforms, different data storage paradigms and systems, and a variety of network architectures is growing. The emerging Standard for The Exchange of Product Model Data (STEP), being developed in the International Organization for Standardization (ISO), addresses this need by providing information models, called application protocols, which clearly and unambiguously describe data. The validity of these information models is essential for success in sharing data in a highly automated engineering environment. This paper describes the Data Probe: a tool for examining, editing, and managing EXPRESS-based data. The Data Probe tool supports the validation of STEP application protocols. The paper includes a description of the software architecture, the initial implementation, and plans for future enhancements. The software is designed as independent components which can be incorporated into other STEP-related systems or software requiring general purpose editing tools for structured information. The initial version of the Data Probe tool is based on two implementation mechanisms defined within STEP: the conceptual modeling language EXPRESS and the STEP exchange file format. Future work will focus on integrating a database system into the software. The software architecture and the use of object-oriented techniques enables code reusability and system extensibility and has been instrumental for a phased implementation. The software is under development at the National Institute of Standards and Technology and is in the public-domain. The software supports the Validation Testing System, part of the Application Protocol Development Environment, at the CALS-sponsored National PDES Testbed. (PDES, Product Data Exchange using STEP, is the U.S. effort in support of the international standard.)
APA, Harvard, Vancouver, ISO, and other styles
3

Strömberg, Niclas. "Reliability Based Design Optimization by Using a SLP Approach and Radial Basis Function Networks." In ASME 2016 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2016. http://dx.doi.org/10.1115/detc2016-59522.

Full text
Abstract:
In this paper reliability based design optimization by using radial basis function networks (RBFN) as surrogate models is presented. The RBFN are treated as regression models. By taking the center points equal to the sampling points an interpolation is obtained. The bias of the network is taken to be known a priori or posteriori. In the latter case, the well-known orthogonality constraint between the weights of the RBFN and the polynomial basis functions of the bias is adopted. The optimization is performed by using a first order reliability method (FORM)-based sequential linear programming (SLP) approach, where the Taylor expansions are generated in intermediate variables defined by the iso-probabilistic transformation. In addition, the reliability constraints are expanded at the most probable points which are found by using Newton’s method. The Newton algorithm is derived by proposing an in-exact Jacobian. In such manner, a FORM-based LP-formulation in the standard normal space of problems with non-Gaussian variables is suggested. The solution from the LP-problem is mapped back to the physical space and the suggested procedure continues in a sequence until convergence is reached. This is implemented for five different distributions: normal, lognormal, Gumbel, gamma and Weibull. It is also presented how the FORM-based SLP approach can be corrected by using second order reliability methods (SORM) and Monte Carlo simulations. In particular, the SORM approach of Hohenbichler is studied. The outlined methodology is both efficient and robust. This is demonstrated by solving established benchmarks as well as finite element problems.
APA, Harvard, Vancouver, ISO, and other styles
4

Libes, Don. "The NIST EXPRESS Toolkit: Design and Implementation." In ASME 1993 International Computers in Engineering Conference and Exposition. American Society of Mechanical Engineers, 1993. http://dx.doi.org/10.1115/edm1993-0108.

Full text
Abstract:
Abstract The NIST EXPRESS toolkit is a software library for building EXPRESS-related tools. EXPRESS is an ISO language for describing information models. EXPRESS descriptions are neutral to different data storage paradigms and systems on different hardware platforms and networks. This paper describes the design and implementation of the toolkit including its important interfaces, data structures, and algorithms. This paper is recommended for anyone wishing to modify the toolkit or anyone wishing to build their own EXPRESS implementation. The reader is assumed to be familiar with the EXPRESS language, the basics of traditional language implementations, and C — the language with which the toolkit is implemented. As a testbed against which to benchmark the evolving EXPRESS language, conformance to the standard (currently Draft International Standard) is the highest priority in the toolkit. Nonetheless, time/space efficiency, accurate and helpful diagnostics, and ease-of-use are also critical to the success of the toolkit. The paper describes how these concerns are addressed even though EXPRESS is a complex and sophisticated language. The toolkit is available from the National Institute of Standards and Technology. The toolkit is just one of a number of tools for data management in STEP, a family of ISO standards currently in development. All of the NIST tools, including the NIST EXPRESS toolkit, are in the public domain.
APA, Harvard, Vancouver, ISO, and other styles
5

Karinathi, R., V. Jagannathan, V. Montan, J. Petro, M. Sobolewski, R. Raman, G. Trapp, Stephen Deng, G. Almasi, and Xi Li. "Modeling Enterprise Information and Enabling Access Using Information Sharing Server." In ASME 1993 International Computers in Engineering Conference and Exposition. American Society of Mechanical Engineers, 1993. http://dx.doi.org/10.1115/edm1993-0116.

Full text
Abstract:
Abstract The engineering data of a large enterprise is typically distributed over a wide area and archived in a variety of databases and file systems. Access to such information is crucial to a team member, particularly in a concurrent engineering setting. However, this is not easy, because (1) a model of the relevant information is not available, and (2) there is no simple way to access the information without being knowledgeable about various computer data formats, file systems, and networks. However, in a concurrent engineering environment, there is every need to be aware of the perspectives of the other members of the team. We have developed a system called the Information Sharing Server (ISS) to enable access to diverse and distributed information within a corporation. Such data could be stored in different repositories such as databases (relational, object oriented, etc.) and file systems including those that contain multiple media (text, graphics, audio, etc.). The ISS maintains an enterprise model that is visible to the user. The modeling of the enterprise is done in a language called EXPRESS developed by the STEP consortium as an international standard. The ISS also stores mappings from the model to the actual data residing in the repositories. The ISS accepts requests from the user and converts them into requests specific to a repository. The request is then communicated to the repository over the network and the results are fetched back to the user. The ISS is currently integrated with engineering data of two domains: electrical and mechanical. Our paper describes the methodology of the ISS, the details of the implementation and extensions planned for the future. We believe the transparency offered by the ISS will make it a very useful tool for an engineer and make it very convenient to integrate heterogeneous legacy databases.
APA, Harvard, Vancouver, ISO, and other styles
6

Al-Qutaish, Rafa E. "An Investigation of the Weaknesses of the ISO 9126 International Standard." In 2009 Second International Conference on Computer and Electrical Engineering. IEEE, 2009. http://dx.doi.org/10.1109/iccee.2009.83.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Robert K Benneweis. "Status of the ISO 11783 Serial control and communications data network standard." In 2005 Tampa, FL July 17-20, 2005. St. Joseph, MI: American Society of Agricultural and Biological Engineers, 2005. http://dx.doi.org/10.13031/2013.18882.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Haq, Enamul, Esmeralda Rodriguez, Martin Miller, and Goran Latisko. "Exchange of network model diagrams using CIM standard at the California ISO." In 2011 IEEE Power & Energy Society General Meeting. IEEE, 2011. http://dx.doi.org/10.1109/pes.2011.6039458.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kadi, Ilham, Ali Idri, and Sofia Ouhbi. "Quality evaluation of cardiac decision support systems using ISO 25010 standard." In 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA). IEEE, 2016. http://dx.doi.org/10.1109/aiccsa.2016.7945657.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Panda, Anton, Jan Duplak, and Jozef Jurko. "Analytical expression of T-vc dependence in standard ISO 3685 for sintered carbide." In 2011 IEEE International Conference on Computer Science and Automation Engineering (CSAE). IEEE, 2011. http://dx.doi.org/10.1109/csae.2011.5952440.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "ISO (Computer network standard)"

1

Semerikov, Serhiy O., Illia O. Teplytskyi, Yuliia V. Yechkalo, and Arnold E. Kiv. Computer Simulation of Neural Networks Using Spreadsheets: The Dawn of the Age of Camelot. [б. в.], November 2018. http://dx.doi.org/10.31812/123456789/2648.

Full text
Abstract:
The article substantiates the necessity to develop training methods of computer simulation of neural networks in the spreadsheet environment. The systematic review of their application to simulating artificial neural networks is performed. The authors distinguish basic approaches to solving the problem of network computer simulation training in the spreadsheet environment, joint application of spreadsheets and tools of neural network simulation, application of third-party add-ins to spreadsheets, development of macros using the embedded languages of spreadsheets; use of standard spreadsheet add-ins for non-linear optimization, creation of neural networks in the spreadsheet environment without add-ins and macros. After analyzing a collection of writings of 1890-1950, the research determines the role of the scientific journal “Bulletin of Mathematical Biophysics”, its founder Nicolas Rashevsky and the scientific community around the journal in creating and developing models and methods of computational neuroscience. There are identified psychophysical basics of creating neural networks, mathematical foundations of neural computing and methods of neuroengineering (image recognition, in particular). The role of Walter Pitts in combining the descriptive and quantitative theories of training is discussed. It is shown that to acquire neural simulation competences in the spreadsheet environment, one should master the models based on the historical and genetic approach. It is indicated that there are three groups of models, which are promising in terms of developing corresponding methods – the continuous two-factor model of Rashevsky, the discrete model of McCulloch and Pitts, and the discrete-continuous models of Householder and Landahl.
APA, Harvard, Vancouver, ISO, and other styles
2

Kompaniets, Alla, Hanna Chemerys, and Iryna Krasheninnik. Using 3D modelling in design training simulator with augmented reality. [б. в.], February 2020. http://dx.doi.org/10.31812/123456789/3740.

Full text
Abstract:
The article is devoted to the theoretical consideration of the problem and the use of innovative technologies in the educational process in the educational establishment of secondary education in the process of studying the school course of computer science. The main advantages of using educational simulators in the educational process are considered, based on the new state standard of basic and complete general secondary education. Based on the analysis of scientific and methodological literature and network sources, the features of the development of simulators for educational purposes are described. Innovative tools for simulator development have been investigated, as augmented reality with the use of three-dimensional simulation. The peculiarities of using a simulator with augmented reality when studying the topic of algorithmization in the course of studying a school computer science are considered. The article also describes the implementation of augmented reality simulator for the formation of algorithmic thinking skills by students, presents the results of development and describes the functionality of the software product. In the further prospects of the study, it is planned to conduct an experimental study to determine the effectiveness of the use of software development in the learning process.
APA, Harvard, Vancouver, ISO, and other styles
3

Data Encryption Standard. Gaithersburg, MD: National Institute of Standards and Technology, 1988. http://dx.doi.org/10.6028/nist.fips.46-1.

Full text
Abstract:
The selective application of technological and related procedural safeguards is an important responsibility of every Federal organization in providing adequate security to its ADP systems. This publication provides a standard to be used by Federal organizations when these organizations specify that cryptographic protection ia to be used for 11emitive or valuable computer data. Protection of computer data during transmission between electronic components or while in storage may be necessary to maintain the confidentiality and integrity of the Information represented by that data. The standard specifies an encryption algorithm which is to be implemented in an el.ectronJc device for use in Federal ADP systems and networks. The algorithm uniquely defines the mathematical steps required to transform computer data into a cryptographic cipher. It also specifies the steps required to transform the cipher back to its original form. A device performing this algorithm may be used in many applications areas where cryptographic data protection is needed. Within the context of a total security program comprising physical security procedures, good information management practices and computer system/network access controls, the Data Encryption Standard is being made available for use by Federal agencies. This revision supersedes FIPS 46.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography