To see the other types of publications on this topic, follow the link: Reuse and protocol exchange.

Journal articles on the topic 'Reuse and protocol exchange'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Reuse and protocol exchange.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Aydin, Muhammed Iberia, Damla Ozaktac, Burak Yuzer, Mustafa Doğu, Hatice Inan, Hatice Eser Okten, Serdar Coskun, and Huseyin Selcuk. "Desalination and Detoxification of Textile Wastewater by Novel Photocatalytic Electrolysis Membrane Reactor for Ecosafe Hydroponic Farming." Membranes 12, no. 1 (December 23, 2021): 10. http://dx.doi.org/10.3390/membranes12010010.

Full text
Abstract:
In this study, a novel photoelectrocatalytic membrane (PECM) reactor was tested as an option for the desalination, disinfection, and detoxification of biologically treated textile wastewater (BTTWW), with the aim to reuse it in hydroponic farming. The anionic ion exchange (IEX) process was used before PECM treatment to remove toxic residual dyes. The toxicity evaluation for every effluent was carried out using the Vibrio fischeri, Microtox® test protocol. The disinfection effect of the PECM reactor was studied against E. coli. After PECM treatment, the 78.7% toxicity level of the BTTWW was reduced to 14.6%. However, photocatalytic desalination during treatment was found to be slow (2.5 mg L−1 min−1 at 1 V potential). The reactor demonstrated approximately 52% COD and 63% TOC removal efficiency. The effects of wastewater reuse on hydroponic production were comparatively investigated by following the growth of the lettuce plant. A detrimental effect was observed on the lettuce plant by the reuse of BTTWW, while no negative impact was reported using the PECM treated textile wastewater. In addition, all macro/micronutrient elements in the PECM treated textile wastewater were recovered by hydroponic farming, and the PECM treatment may be an eco-safe wastewater reuse method for crop irrigation.
APA, Harvard, Vancouver, ISO, and other styles
2

Termens, Miquel, Mireia Ribera, and Anita Locher. "An analysis of file format control in institutional repositories." Library Hi Tech 33, no. 2 (June 15, 2015): 162–74. http://dx.doi.org/10.1108/lht-10-2014-0098.

Full text
Abstract:
Purpose – The purpose of this paper is to analyze the file formats of the digital objects stored in two of the largest open-access repositories in Spain, DDUB and TDX, and determines the implications of these formats for long-term preservation, focussing in particular on the different versions of PDF. Design/methodology/approach – To be able to study the two repositories, the authors harvested all the files corresponding to every digital object and some of their associated metadata using the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH) and Open Archives Initiative Object Reuse and Exchange (OAI-ORE) protocols. The file formats were analyzed with DROID software and some additional tools. Findings – The results show that there is no alignment between the preservation policies declared by institutions, the technical tools available, and the actual stored files. Originality/value – The results show that file controls currently applied to institutional repositories do not suffice to grant their stated mission of long-term preservation of scientific literature.
APA, Harvard, Vancouver, ISO, and other styles
3

STINE, JOHN A., GUSTAVO DE VECIANA, KEVIN H. GRACE, and ROBERT C. DURST. "ORCHESTRATING SPATIAL REUSE IN WIRELESS AD HOC NETWORKS USING SYNCHRONOUS COLLISION RESOLUTION (SCR)." Journal of Interconnection Networks 03, no. 03n04 (September 2002): 167–95. http://dx.doi.org/10.1142/s0219265902000616.

Full text
Abstract:
We propose a novel medium access control protocol for ad hoc wireless networks data to send can contend simultaneously for the channel. Nodes contend for access using a synchronous signaling mechanism that achieves two objectives: it arbitrates contentions locally and it selects a subset of nodes across the network that attempt to transmit simultaneously. The subset of nodes that survive the signaling mechanism can be viewed as an orchestrated set of transmissions that are spatially reusing the channel shared by the nodes. Thus the 'quality' of the subset of nodes selected by the signaling mechanism is a key factor in determining the spatial capacity of the system. In this paper, we propose a general model for such synchronous signaling mechanisms and recommend a preferred design. We then focus via both analysis and simulation on the spatial and capacity characteristics of these access control mechanisms. Our work is unique in that it specifically focuses on the spatial capacity aspects of a MAC protocol, as would be critical for ad hoc networking, and shows SCR is a promising solution. Specifically, it does not suffer from congestion collapse as the density of contending nodes grows, it does not suffer from hidden or exposed node effects, it achieves high capacities with a spatial usage exceeding 1 (i.e. more than one packet exchange in the area covered by a transmission), and it facilitates the integration of new physical layer capacity increasing technologies.
APA, Harvard, Vancouver, ISO, and other styles
4

Cui, Hui, and Glen Mudra. "Authenticated Key Exchange under Bad Randomness, Revisited." Mathematics 11, no. 12 (June 15, 2023): 2721. http://dx.doi.org/10.3390/math11122721.

Full text
Abstract:
A bad randomness may cause catastrophic results in security; thus, it is of importance to make cryptographic systems secure against bad randomness. In this paper, we focus on a practical situation where an adversary is able to force participants in an authenticated key exchange (AKE) system to reuse the random values and the functions of these values, called related randomness attack (RRA). Following the existing randomness resetting security model of AKE and the RRA security model of public-key encryption, we present a model of RRA security for authenticated key exchange, as well as the necessary restrictions on the related randomness functions used to obtain the security definition. Then we show how a related randomness attack adversary breaks the security of some existing AKE protocols, and propose some constructions of RRA-secure authenticated key exchange in the random oracle model and standard model, respectively.
APA, Harvard, Vancouver, ISO, and other styles
5

Goncharov, M. V., and K. A. Kolosov. "On interoperability of metadata within RNPLS&T’s Single Open Information Archive." Scientific and Technical Libraries, no. 10 (November 12, 2021): 45–62. http://dx.doi.org/10.33186/1027-3689-2021-10-45-62.

Full text
Abstract:
Russian National Public Library for Science and Technology has been developing the Single Open Information Archive (UOIA) to merge all digital full-text resources created or acquired by the Library. The authors examine the issues of interoperability when exchanging metadata between UOIA built on library automation software and open archives using OAI-PMH technology for metadata acquisition. Interoperability in information exchange between different ALIS is provided, for example, through applying SRU/SRW protocol and metadata scheme, while metadata exchange between OA repositories is provided mainly within Dublin Core (DC) scheme. ALIS – OA metadata transmission with transformation into DC results in information loss and prevents unambiguous reverse transformation.For a long time, DSpace has been the most popular software for open digital repositories. This product enables OAI-PMH metadata acquisition in DC and Qualified DC (QDC) formats, and supports Object Reuse and Exchange (ORE) standard, which enables to describe aggregated resources. ORE in DSpace enables to collect not only metadata but also connected files and to receive other connected data provided by importing source. DSpace uses rather simple ORE format based on Atom XML that allows binding several files of different functionality with RDF-triplets.The OAI-PMH software connector is designed for RNPLS&T SOIA and enables to present metadata in DC, QDC, MARC21, and ORE formats, which supports interoperability in information exchange with OA repositories with DSpace software. Beside metadata transmission, transmission of various data types is possible, e. g. document text or license information. Further development is to expand format structure to represent associated data, in particular using RDF.
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Wei, and Xin Wang. "Construction of Modularized English Teaching Platform for Multimedia Wireless Network Based on NS2 Simulation Software." Mobile Information Systems 2021 (October 19, 2021): 1–10. http://dx.doi.org/10.1155/2021/5329208.

Full text
Abstract:
Using the NS2 network simulation tool to teach the “wireless network” course can enhance students’ understanding of wireless network protocols through visualization and can also improve students’ ability to analyze problems hands on. We built a multimedia wireless network modularized English teaching platform based on NS2 simulation software; made full use of the rich components and network resources provided by NS2 to achieve a high degree of code reuse and reduce the time for developing simulation codes; designed the overall framework of this multimedia wireless network modular English teaching platform based on the B/S structure; and solved the weight coefficient and importance value of the learning input evaluation index, based on the feedback elite teaching optimization algorithm, the improved teaching formula, the increase in the number of exchanges, and the improvement in the learner’s performance. The experimental results show that the LEACH and LEACH-C protocols of the clustered NS2 simulation software have more surviving nodes most of the time, which indicates that the clustering routing protocol has better performance.
APA, Harvard, Vancouver, ISO, and other styles
7

Hardwick, Martin. "On STEP-NC and the Complexities of Product Data Integration." Journal of Computing and Information Science in Engineering 4, no. 1 (March 1, 2004): 60–67. http://dx.doi.org/10.1115/1.1641188.

Full text
Abstract:
For twenty years the manufacturing domain has been seeking to share product model data by defining an entity relationship model covering the life cycle of geometrically defined products. The data sharing is implemented by selecting subsets of these entities and relationships to define data exchange standards for CAD, CAE, CAM, CNC and PDM systems. The approach requires agreement on how data will be reused across the domains so an organization has been meeting to manage the required data definitions. Considerable success was achieved in 1995 when a standard was proposed and implemented by industry as a way to move 3D geometry between CAD systems. Now, a new protocol for exchanging manufacturing process information between CAM systems and CNC devices is being released. This protocol reuses much of the data defined for the other domains and will allow CNC manufacturing tools to process 3D data, but the complexity of the specification is causing controversy. In this paper we report on the new specification and analyze the advantages and disadvantages of its approach to defining CNC control programs.
APA, Harvard, Vancouver, ISO, and other styles
8

Meyer, Max-Arno, Lina Sauter, Christian Granrath, Hassen Hadj-Amor, and Jakob Andert. "Simulator Coupled with Distributed Co-Simulation Protocol for Automated Driving Tests." Automotive Innovation 4, no. 4 (October 16, 2021): 373–89. http://dx.doi.org/10.1007/s42154-021-00161-1.

Full text
Abstract:
AbstractTo meet the challenges in software testing for automated vehicles, such as increasing system complexity and an infinite number of operating scenarios, new simulation methods must be developed. Closed-loop simulations for automated driving (AD) require highly complex simulation models for multiple controlled vehicles with their perception systems as well as their surrounding context. For the realization of such models, different simulation domains must be coupled with co-simulation. However, widely supported model integration standards such as functional mock-up interface (FMI) lack native support for distributed platforms, which is a key feature for AD due to the computational intensity and platform exclusivity of certain models. The newer FMI companion standard distributed co-simulation protocol (DCP) introduces platform coupling but must still be used in conjunction with AD co-simulations. As part of an assessment framework for AD, this paper presents a DCP compliant implementation of an interoperable interface between a 3D environment and vehicle simulator and a co-simulation platform. A universal Python wrapper is implemented and connected to the simulator to allow its control as a DCP slave. A C-code-based interface enables the co-simulation platform to act as a DCP master and to realize cross-platform data exchange and time synchronization of the environment simulation with other integrated models. A model-in-the-loop use case is performed with the traffic simulator CARLA running on a Linux machine connected to the co-simulation master xMOD on a Windows computer via DCP. Several virtual vehicles are successfully controlled by cooperative adaptive cruise controllers executed outside of CARLA. The standard compliance of the implementation is verified by exemplary connection to prototypic DCP solutions from 3rd party vendors. This exemplary application demonstrates the benefits of DCP compliant tool coupling for AD simulation with increased tool interoperability, reuse potential, and performance.
APA, Harvard, Vancouver, ISO, and other styles
9

Yavari, Mostafa, Masoumeh Safkhani, Saru Kumari, Sachin Kumar, and Chien-Ming Chen. "An Improved Blockchain-Based Authentication Protocol for IoT Network Management." Security and Communication Networks 2020 (October 26, 2020): 1–16. http://dx.doi.org/10.1155/2020/8836214.

Full text
Abstract:
Communication security between IoT devices is a major concern in this area, and the blockchain has raised hopes that this concern will be addressed. In the blockchain concept, the majority or even all network nodes check the validity and accuracy of exchanged data before accepting and recording them, whether this data is related to financial transactions or measurements of a sensor or an authentication message. In evaluating the validity of an exchanged data, nodes must reach a consensus in order to perform a special action, in which case the opportunity to enter and record transactions and unreliable interactions with the system is significantly reduced. Recently, in order to share and access management of IoT devices information with distributed attitude a new authentication protocol based on blockchain is proposed and it is claimed that this protocol satisfies user privacy preserving and security. However, in this paper, we show that this protocol has security vulnerabilities against secret disclosure, replay, traceability, and Token reuse attacks with the success probability of 1 and constant complexity of also 1. We also proposed an improved blockchain-based authentication protocol (IBCbAP) that has security properties such as secure access management and anonymity. We implemented IBCbAP using JavaScript programming language and Ethereum local blockchain. We also proved IBCbAP’s security both informally and formally through the Scyther tool. Our comparisons showed that IBCbAP could provide suitable security along with reasonable cost.
APA, Harvard, Vancouver, ISO, and other styles
10

Gilissen, Valentijng, and Hella Hollander. "Archiving the Past While Keeping up with the Times." Studies in Digital Heritage 1, no. 2 (December 14, 2017): 194–205. http://dx.doi.org/10.14434/sdh.v1i2.23238.

Full text
Abstract:
The e-depot for Dutch archaeology started as a project at Data Archiving and Networked Services (DANS) in 2004 and developed into a successful service, which has ever since been part of the national archaeological data workflow of the Netherlands.While continuously processing archaeological datasets and publications and developing expertise regarding data preservation, various developments are taking place in the data landscape and direct involvement is necessary to ensure that the needs of the designated community are best met. Standard protocols must be defined for the processing of data with the best guarantees for long-term preservation and accessibility. Monitoring the actual use of file formats and the use of their significant characteristics within specific scientific disciplines is needed to keep strategies up-to-date.National developments includes the definition of a national metadata exchange protocol, its accommodation in the DANS EASY self-deposit archive and its role in the central channelling of information submission. In international context, projects such as ARIADNE and PARTHENOS enable further developments regarding data preservation and dissemination. The opportunities provided by such international projects enriched the data by improving options for data reuse, including allowing for the implementation of a map-based search facility on DANS EASY. The projects also provide a platform for sharing of expertise via international collaboration.This paper will detail the positioning of the data archive in the research data cycle and show examples of the data enrichment enabled by collaboration within international projects.
APA, Harvard, Vancouver, ISO, and other styles
11

Nosheen, Irum, Shoab A. Khan, and Umar Ali. "A Cross-Layer Design for a Multihop, Self-Healing, and Self-Forming Tactical Network." Wireless Communications and Mobile Computing 2019 (April 9, 2019): 1–16. http://dx.doi.org/10.1155/2019/1523906.

Full text
Abstract:
In mission and time critical applications, bandwidth and delay optimizations are the key goals of communication systems. This paper presents a cross-layer framework design that reduces the call setup time, provides collision-free communication, and reuses the empty slots of Time Division Multiple Access (TDMA) protocol which otherwise causes low throughput and large delay. As number of communicating nodes in tactical networks is small as compared to commercial mobile ad hoc networks (MANETs), classical TDMA will yield huge number of empty slots and any Carrier Sense Multiple Access/Collision Detection (CSMA/CD) technique may cause more delay in some critical scenarios. Proposed methodology gives a Cross-Layer Architecture for Network (NET) Layer and Medium Access Control (MAC) Layer. Our design provides bandwidth efficient, collision-free communication to Software-Defined Radios (SDRs) in self-forming and self-healing tactical networks with low call setup time and multihop routing. For this purpose TDMA as MAC layer protocol and Ad Hoc On Demand Distance Vector (AODV) as Network Layer Routing Protocol are used. Our slot allocation (SA) algorithm, Cross-Layer TDMA (CL-TDMA), consists of control phase where AODV control packets are exchanged and data transfer phase where transmission of data and voice occurs. All active radios in vicinity gather information about communicating nodes based on the exchange of control packets by SDRs. Our algorithm then uses this information to help all active SDRs find slot(s) that will be used for collision-free transmission. A number of experiments are performed to establish improved performance of the proposed technique compared to other established techniques and protocols.
APA, Harvard, Vancouver, ISO, and other styles
12

Tabassum, Tamanna, SK Alamgir Hossain, Md Anisur Rahman, Mohammed F. Alhamid, and M. Anwar Hossain. "An Efficient Key Management Technique for the Internet of Things." Sensors 20, no. 7 (April 6, 2020): 2049. http://dx.doi.org/10.3390/s20072049.

Full text
Abstract:
The Internet of Things (IoT) has changed our lives drastically. Customers, regulatory bodies, and industrial partners are driving us to use IoT. Although IoT provides new opportunities, security remains a key concern while providing various services. It is especially challenging how the data generated from IoT devices can be protected from potential security attacks and how to safeguard the exchange of these data while transiting through different nodes and gateways. In this research, we aim to ensure a safe IoT environment by proposing an efficient key management technique that uses a combination of symmetric and asymmetric cryptosystem to obtain the speed of the former as well as the security benefits of the latter. Our proposal considers a set of Smart Objects (SO) capable of key registration, generation and distribution for IoT data transmission. We used the open-source Message Queuing Telemetry Transport (MQTT) protocol to facilitate communications between the source and the destination nodes. The suitability of the proposed approach is measured experimentally and the results are comparable to existing works with respect to key conversion time, algorithm execution time, number of reuse connections, and bandwidth utilization.
APA, Harvard, Vancouver, ISO, and other styles
13

Shintaku, Milton, Lucas Ângelo Silveira, Alexandre Faria de Oliveira, Diego José Macedo, and Ingrid Torres Schiessl. "Uso do protocolo de interoperabilidade OAI-ORE para preservação digital." Revista Brasileira de Preservação Digital 4 (June 10, 2023): e023012. http://dx.doi.org/10.20396/rebpred.v4i00.17992.

Full text
Abstract:
Introdução: A preservação digital em Bibliotecas Digitais e Repositórios, no Brasil, tem sido um desafio, na medida em que grande parte desses sistemas estão implementados com o software livre DSpace, que não está preparado para atuar nesta atividade. Objetivo: Assim, o presente trabalho tem por objetivo apresentar uma nova opção para a preservação digital de documentos depositados em sistemas de informação implementados com o DSpace, com o uso do modelo Hipátia. Metodologia: Para tanto, o estudo faz uso de técnicas de pesquisas aplicadas em computação, voltados para inovação e resolução de problemas. Resultados: Os resultados apresentam os ajustes necessários, no DSpace, para utilizar o protocolo nativo Open Archives Initiative - Object Reuse and Exchange (OAI-ORE) para integração com o Modelo Hipátia. Conclusão: Com isso, contribui com a integração de ferramentas ao modelo Hipátia, voltado à preservação digital, de forma simples, utilizando um protocolo nativo do DSpace.
APA, Harvard, Vancouver, ISO, and other styles
14

Wong, Kok-Seng, and Myung Ho Kim. "Towards Self-Awareness Privacy Protection for Internet of Things Data Collection." Journal of Applied Mathematics 2014 (2014): 1–9. http://dx.doi.org/10.1155/2014/827959.

Full text
Abstract:
The Internet of Things (IoT) is now an emerging global Internet-based information architecture used to facilitate the exchange of goods and services. IoT-related applications are aiming to bring technology to people anytime and anywhere, with any device. However, the use of IoT raises a privacy concern because data will be collected automatically from the network devices and objects which are embedded with IoT technologies. In the current applications, data collector is a dominant player who enforces the secure protocol that cannot be verified by the data owners. In view of this, some of the respondents might refuse to contribute their personal data or submit inaccurate data. In this paper, we study a self-awareness data collection protocol to raise the confidence of the respondents when submitting their personal data to the data collector. Our self-awareness protocol requires each respondent to help others in preserving his privacy. The communication (respondents and data collector) and collaboration (among respondents) in our solution will be performed automatically.
APA, Harvard, Vancouver, ISO, and other styles
15

Murugesan, Senthil, Krishna Venkata, Narendra Mupparaju, and Rayudu Kommi. "Quality of Service Enhancement in Wireless LAN and MANET." International Journal of Wireless and Ad Hoc Communication 1, no. 2 (2020): 08–18. http://dx.doi.org/10.54216/ijwac.010201.

Full text
Abstract:
In this dissertation, the author introduces a novel MAC technique that uses directional antennas to reduce interference, allowing the channel effectively reuse in various places. A node will wait for the Additional Control Gap (ACG) period after exchanging the RTSCTS packet using the suggested protocol before starting the transmission of data packets. Other nodes in the area may plan simultaneous transmission at this ACG time by exchanging RTSCTS packets with one another. This technique of installing directional antennas to avoid interference while simultaneously ensuring simultaneous transmissions among nodes in the vicinity may enhance the overall throughput and latency of wireless ad hoc networks. The suggested MAC protocol, in combination with TCP, serves to lessen the possibility of medium congestion and collisions in multi-hop situations by scheduling simultaneous transmissions. After identifying the bottleneck node on the high-traffic route, the heavy-traffic route moved to a different dedicated path to facilitate longhop flow. This makes it feasible for longhop flow to use the completely available bandwidth of the recently allotted dedicated lane and ensures that traffic on the congested route will reduce. Additionally, the dissertation offers a simple but efficient hybrid model as a solution to the issues that could come up when carrying out disaster relief activities. According to the suggested concept, stationary SANET grid nodes that is installed will allow mobile MANET nodes that are more than 13 kilometres outside of the transmission range of the infrastructure network to connect to the internet and the central command. In the case of a disaster, this method increases the coverage area of MANET nodes, enabling those nodes to connect with and exchange data with the rescue and relief operations centre
APA, Harvard, Vancouver, ISO, and other styles
16

Wang, Le, Xuefeng Liu, and Xiaodong Lin. "A Fair and Privacy-Preserving Image Trading System Based on Blockchain and Group Signature." Security and Communication Networks 2021 (October 31, 2021): 1–18. http://dx.doi.org/10.1155/2021/5701258.

Full text
Abstract:
With the rise of digital images in our daily lives, there is a growing need to provide an image trading market where people can monetize their images and get desired images at prices that fit their budget. Those images are usually uploaded and stored onto centralized image trading service providers’ servers and the transactions for image trading are processed by these providers. Unfortunately, transaction unfairness and users’ privacy breaches have become major concerns since the service providers might be untrusted and able to manipulate image trading prices and infer users’ private information. Recently, several approaches have been proposed to address the unfairness issue by using the decentralized ledger technique and smart contract, but users’ privacy protection is not considered. In this paper, we propose a fair and privacy-preserving protocol that supports image fair exchange and protect user privacy. In particular, we exploit blockchain and Merkle tree to construct a fair image trading protocol with low communication overhead based on smart contract, which serves as an external judge that resolves disputes between buyers and sellers in image transactions. Moreover, we extend a popular short group signature scheme to protect users’ identity privacy, prevent linkability of transactions from being inferred, and ensure traceability of malicious users who may sell fake images and/or refuse to pay. Finally, we design and build a practical and open-source image trading system to evaluate the performance of our proposed protocol. Experimental results demonstrate its effectiveness and efficiency in real-world applications.
APA, Harvard, Vancouver, ISO, and other styles
17

Arana-Peña, Sara, Diego Carballares, Vicente Cortés Corberan, and Roberto Fernandez-Lafuente. "Multi-Combilipases: Co-Immobilizing Lipases with Very Different Stabilities Combining Immobilization via Interfacial Activation and Ion Exchange. The Reuse of the Most Stable Co-Immobilized Enzymes after Inactivation of the Least Stable Ones." Catalysts 10, no. 10 (October 19, 2020): 1207. http://dx.doi.org/10.3390/catal10101207.

Full text
Abstract:
The lipases A and B from Candida antarctica (CALA and CALB), Thermomyces lanuginosus (TLL) or Rhizomucor miehei (RML), and the commercial and artificial phospholipase Lecitase ultra (LEU) may be co-immobilized on octyl agarose beads. However, LEU and RML became almost fully inactivated under conditions where CALA, CALB and TLL retained full activity. This means that, to have a five components co-immobilized combi-lipase, we should discard 3 fully active and immobilized enzymes when the other two enzymes are inactivated. To solve this situation, CALA, CALB and TLL have been co-immobilized on octyl-vinyl sulfone agarose beads, coated with polyethylenimine (PEI) and the least stable enzymes, RML and LEU have been co-immobilized over these immobilized enzymes. The coating with PEI is even favorable for the activity of the immobilized enzymes. It was checked that RML and LEU could be released from the enzyme-PEI coated biocatalyst, although this also produced some release of the PEI. That way, a protocol was developed to co-immobilize the five enzymes, in a way that the most stable could be reused after the inactivation of the least stable ones. After RML and LEU inactivation, the combi-biocatalysts were incubated in 0.5 M of ammonium sulfate to release the inactivated enzymes, incubated again with PEI and a new RML and LEU batch could be immobilized, maintaining the activity of the three most stable enzymes for at least five cycles of incubation at pH 7.0 and 60 °C for 3 h, incubation on ammonium sulfate, incubation in PEI and co-immobilization of new enzymes. The effect of the order of co-immobilization of the different enzymes on the co-immobilized biocatalyst activity was also investigated using different substrates, finding that when the most active enzyme versus one substrate was immobilized first (nearer to the surface of the particle), the activity was higher than when this enzyme was co-immobilized last (nearer to the particle core).
APA, Harvard, Vancouver, ISO, and other styles
18

Liang, Steve H. L., Sara Saeedi, Soroush Ojagh, Sepehr Honarparvar, Sina Kiaei, Mahnoush Mohammadi Jahromi, and Jeremy Squires. "An Interoperable Architecture for the Internet of COVID-19 Things (IoCT) Using Open Geospatial Standards—Case Study: Workplace Reopening." Sensors 21, no. 1 (December 24, 2020): 50. http://dx.doi.org/10.3390/s21010050.

Full text
Abstract:
To safely protect workplaces and the workforce during and after the COVID-19 pandemic, a scalable integrated sensing solution is required in order to offer real-time situational awareness and early warnings for decision-makers. However, an information-based solution for industry reopening is ineffective when the necessary operational information is locked up in disparate real-time data silos. There is a lot of ongoing effort to combat the COVID-19 pandemic using different combinations of low-cost, location-based contact tracing, and sensing technologies. These ad hoc Internet of Things (IoT) solutions for COVID-19 were developed using different data models and protocols without an interoperable way to interconnect these heterogeneous systems and exchange data on people and place interactions. This research aims to design and develop an interoperable Internet of COVID-19 Things (IoCT) architecture that is able to exchange, aggregate, and reuse disparate IoT sensor data sources in order for informed decisions to be made after understanding the real-time risks in workplaces based on person-to-place interactions. The IoCT architecture is based on the Sensor Web paradigm that connects various Things, Sensors, and Datastreams with an indoor geospatial data model. This paper presents a study of what, to the best of our knowledge, is the first real-world integrated implementation of the Open Geospatial Consortium (OGC) Sensor Web Enablement (SWE) and IndoorGML standards to calculate the risk of COVID-19 online using a workplace reopening case study. The proposed IoCT offers a new open standard-based information model, architecture, methodologies, and software tools that enable the interoperability of disparate COVID-19 monitoring systems with finer spatial-temporal granularity. A workplace cleaning use case was developed in order to demonstrate the capabilities of this proposed IoCT architecture. The implemented IoCT architecture included proximity-based contact tracing, people density sensors, a COVID-19 risky behavior monitoring system, and the contextual building geospatial data.
APA, Harvard, Vancouver, ISO, and other styles
19

Campbell, Walter S., Daniel Karlsson, Daniel J. Vreeman, Audrey J. Lazenby, Geoffrey A. Talmon, and James R. Campbell. "A computable pathology report for precision medicine: extending an observables ontology unifying SNOMED CT and LOINC." Journal of the American Medical Informatics Association 25, no. 3 (September 13, 2017): 259–66. http://dx.doi.org/10.1093/jamia/ocx097.

Full text
Abstract:
Abstract Background The College of American Pathologists (CAP) introduced the first cancer synoptic reporting protocols in 1998. However, the objective of a fully computable and machine-readable cancer synoptic report remains elusive due to insufficient definitional content in Systematized Nomenclature of Medicine – Clinical Terms (SNOMED CT) and Logical Observation Identifiers Names and Codes (LOINC). To address this terminology gap, investigators at the University of Nebraska Medical Center (UNMC) are developing, authoring, and testing a SNOMED CT observable ontology to represent the data elements identified by the synoptic worksheets of CAP. Methods Investigators along with collaborators from the US National Library of Medicine, CAP, the International Health Terminology Standards Development Organization, and the UK Health and Social Care Information Centre analyzed and assessed required data elements for colorectal cancer and invasive breast cancer synoptic reporting. SNOMED CT concept expressions were developed at UNMC in the Nebraska Lexicon© SNOMED CT namespace. LOINC codes for each SNOMED CT expression were issued by the Regenstrief Institute. SNOMED CT concepts represented observation answer value sets. Results UNMC investigators created a total of 194 SNOMED CT observable entity concept definitions to represent required data elements for CAP colorectal and breast cancer synoptic worksheets, including biomarkers. Concepts were bound to colorectal and invasive breast cancer reports in the UNMC pathology system and successfully used to populate a UNMC biobank. Discussion The absence of a robust observables ontology represents a barrier to data capture and reuse in clinical areas founded upon observational information. Terminology developed in this project establishes the model to characterize pathology data for information exchange, public health, and research analytics.
APA, Harvard, Vancouver, ISO, and other styles
20

Bukovetskyi, Vasyl, and Vasyl Rizak. "Developing the algorithm and software for access token protection using request signing with temporary secret." Eastern-European Journal of Enterprise Technologies 1, no. 9(115) (February 28, 2022): 56–62. http://dx.doi.org/10.15587/1729-4061.2022.251570.

Full text
Abstract:
This paper proposes a method for protecting the access tokens in client-server data exchange without saving the state based on the formation of the signature of the request using a temporary secret. The devised method allows one not to transfer access tokens with each request, which would make it possible for the attacker to authenticate as a valid user when compromising the connection, for example, when using a «person in the middle» attack. Two variants of the method have been proposed and substantiated – simplified and improved, the scope of which depends on the needs for protection and technical capabilities of their implementation. The robustness of both variants is ensured by the practical inability to select the initial input data of the hash function used to form the signature. The improved version also makes it possible to protect access tokens at the stage of receiving them and provides protection against the attack of the recurrence of the request. Initial user authentication protection is achieved by using the Diffie-Hellman protocol to exchange a secret and access token. Using query IDs and time labels prevents the query from being reused. Advanced security for access tokens is important because having an attacker’s access token gives the attacker full control over the user account. The use of SSL/TLS may not produce the desired level of protection for such important data. It was established that the use of the proposed method does not add significant time costs. The SHA-256 hash function example shows that the relationship between message size and extra time to send and receive a message is linear. When using the proposed method in the browser, the absolute value of additional time spent for messages from 100 bytes to 2,048 KB ranges from 0.4 ms to 142 ms. Given this, the proposed method could be used without significant impact on the experience of use.
APA, Harvard, Vancouver, ISO, and other styles
21

Cho, Youngil, Kyoung Min Kim, and Tae-Jin Lee. "Air Charging Protocol With Spatial-Reuse." IEEE Wireless Communications Letters 9, no. 3 (March 2020): 298–301. http://dx.doi.org/10.1109/lwc.2019.2953067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Liu, Xiaosha, and Dennis A. Clifford. "Ion exchange with denitrified brine reuse." Journal - American Water Works Association 88, no. 11 (November 1996): 88–99. http://dx.doi.org/10.1002/j.1551-8833.1996.tb06650.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Anfinsen, Christian B., Paul J. Flory, and Arno A. Penzias. "NAS Exchange Protocol." Science 228, no. 4699 (May 3, 1985): 530. http://dx.doi.org/10.1126/science.228.4699.530.b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

ANFINSEN, C. B., P. J. FLORY, and A. A. PENZIAS. "NAS Exchange Protocol." Science 228, no. 4699 (May 3, 1985): 530. http://dx.doi.org/10.1126/science.228.4699.530-a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Tonova, Konstantza. "Ionic liquid-assisted biphasic systems for downstream processing of fermentative enzymes and organic acids." Physical Sciences Reviews 6, no. 3 (December 8, 2020): 1–33. http://dx.doi.org/10.1515/psr-2018-0068.

Full text
Abstract:
Abstract Room-temperature ionic liquids (ILs) represent molten salts entirely consisting of ions, usually a charge-stabilized organic cation and an inorganic or organic anion. ILs are liquids at ambient temperature but possess characteristics unusual for the common liquid solvents, such as negligible vapor pressure, high thermal stability and most over the ability to mix and match libraries of cations and anions in order to acquire desirable physical and chemical properties [1]. The opportunity to obtain tunable density, viscosity, polarity and miscibility with common molecular liquids gave rise to a variety of applications of the ILs [2] as environmentally benign solvents, extractants or auxiliaries. In particular, numbers of innovations in the methods for recovery and purification of biologically derived compounds involve ILs used solo or partnered with other liquids in biphasic systems [3,4,5]. It should be noted that the ILs are not intrinsically greener than the traditional solvents, given that their production is usually more resource-demanding, but the inherent potential for recycling and reuse, and for prevention of chemical accidents gives the ILs advantages ahead. The present chapter provides a state-of-the-art overview on the basic applications of the ILs in biphasic systems aimed at downstream processing of valuable fermentative products, enzymes and organic acids. Main industrially important enzymes, lipases and carbohydrases, are considered and a description of the IL-assisted aqueous biphasic systems (ABS) and the results obtained in view of enzyme yield and purity is made. ILs serve different functions in the ABS, main phase-segregating constituents (mostly in the IL/salt ABS) or adjuvants to the polymer/salt ABS. Enzyme isolation from the contaminant proteins present in the feedstock can be carried out either in the IL-rich or in the salt-rich phase of the ABS and for the reader’s convenience the two options are described separately. Discussion on the factors and parameters affecting the enzyme partitioning in the ABS with ILs guides the reader through the ways by which the interactions between the IL and the enzyme can be manipulated in favor of the enzyme purification through the choice of the ABS composition (IL, salt, pH) and the role of the water content and the IL-rich phase structure. The second part of the chapter is dedicated to the recovery of fermentative organic acids. Mostly hydrophobic ILs have been engaged in the studies and the biphasic systems thereof are summarized. The systems are evaluated by the extraction efficiency and partition coefficient obtained. Factors and parameters affecting the extraction of organic acids by ILs are highlighted in a way to unravel the extraction mechanism. The choice of IL and pH determines the reactive mechanism and the ion exchange, while the water content and the IL phase structure play roles in physical extraction. Procedures undertaken to enhance the efficiency and to intensify the process of extraction are also looked over. Finally, the experimental holes that need fill up in the future studies are marked. According to the author’s opinion an intense research with hydrophobic ILs is suggested as these ILs have been proved milder to the biological structures (both the microbial producer and the enzyme product), more effective in the organic acid recovery and suitable to perform “in situ” extraction. Extractive fermentation entails validation of ecological and toxicological characteristics of the ILs. The protocols for re-extraction of fermentative products separated by IL-assisted biphasic systems should be clearly settled along with the methods for ILs recycling and reuse. Novel more flexible approaches to process intensification can be implemented in order to adopt the separation by biphasic systems for use in industry.
APA, Harvard, Vancouver, ISO, and other styles
26

Funabashi, Kiyomi, Tetsuo Fukasawa, Fumio Kawamura, Hideo Yusa, Makoto Kikuchi, Noriharu Sasaki, and Toshio Yamadera. "Reuse System for Powdered Ion-Exchange Resins." Nuclear Technology 73, no. 2 (May 1986): 220–27. http://dx.doi.org/10.13182/nt86-a33786.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Laitala, Kirsi, and Ingun Grimstad Klepp. "Clothing reuse: The potential in informal exchange." Clothing Cultures 4, no. 1 (March 1, 2017): 61–77. http://dx.doi.org/10.1386/cc.4.1.61_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Todd, T. D., and A. M. Bignell. "A slot-reuse protocol for rearrangeable dual-bus networks." IEEE Transactions on Communications 42, no. 2/3/4 (February 1994): 1131–40. http://dx.doi.org/10.1109/tcomm.1994.580222.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Meshram, A. J., C. Meshram, S. D. Bagde, and R. R. Meshram. "RIPIC BASED KEY EXCHANGE PROTOCOL." Advances in Mathematics: Scientific Journal 9, no. 12 (December 31, 2020): 11169–77. http://dx.doi.org/10.37418/amsj.9.12.97.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Gucma, Maciej, and Paulina Hatłas. "Data Exchange Protocol in Repsail." Annual of Navigation 24, no. 1 (December 1, 2017): 221–29. http://dx.doi.org/10.1515/aon-2017-0016.

Full text
Abstract:
AbstractArticle presents implantation and theoretical considerations of data exchange protocol developed for the RepSail project, where main objective was design and building innovative hybrid yacht. One of problems during the design process was improper functioning of data exchange protocols that were available in the commercially available devices to mention navigation purpose NMEA183 or 2000 as well as automation dedicated ones (CAN and similar). Author shows the basis of the dedicated format of exchange for in board devices.
APA, Harvard, Vancouver, ISO, and other styles
31

Wang, Hao, Heqing Guo, Manshan Lin, Jianfei Yin, Qi He, and Jun Zhang. "A new dependable exchange protocol." Computer Communications 29, no. 15 (September 2006): 2770–80. http://dx.doi.org/10.1016/j.comcom.2005.10.028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Batres, Rafael, Atsushi Aoyama, and Yuji Naka. "A life-cycle approach for model reuse and exchange." Computers & Chemical Engineering 26, no. 4-5 (May 2002): 487–98. http://dx.doi.org/10.1016/s0098-1354(01)00794-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Corvo, Atelier Do, Desirée Pedro, and Carlos Antunes. "Reuse of Modern Schools." Joelho Revista de Cultura Arquitectonica, no. 9 (December 27, 2018): 50–67. http://dx.doi.org/10.14195/1647-8681_9_2.

Full text
Abstract:
The two projects selected for the Reuse of Modernist Buildings are examples of our way of understanding this subject. These projects are neither typical rehabilitations, nor refurbishment, but an intense exchange between the diverse existing layers and the new ones required. The aims of these projects focused on giving clarity to the existing facilities and removing the ambiguities which resulted from the successive additions and uses to which the building has been subjected to over time, thus enabling a clear proposal for new buildings. In these projects, the renovation and remodelling of existing structures, as well as the proposal for new constructions, was grounded on the principle of a dialogue between the existing and the new, between the past and the present.
APA, Harvard, Vancouver, ISO, and other styles
34

R. Tan, Raymond Girard, and Dennis E. Cruz. "Synthesis of Robust Water Reuse Networks Using Fuzzy Nonlinear Programming:Mass Exchange-Based Processes." ASEAN Journal of Chemical Engineering 5, no. 1 (June 1, 2005): 22. http://dx.doi.org/10.22146/ajche.50160.

Full text
Abstract:
Water consumption and effluent generation in industrial plants can be effectively reduced by maximizing utilization of partially contaminated water. A dual approach consisting of graphical pinch methods for targeting followed by the synthesis of water reuse networks using such techniques as mathematical programming is usually employed. Reliable process data is necessary for successful plant retrofitting. In most cases, however, the necessary limiting concentrations and mass loads must be deduced from limited information. It thus becomes necessary to balance the conflicting objectives of minimizing water usage and of ensuring that sufficient stream concentrations fall within their limiting values. The use of fuzzy nonlinear programming for the synthesis of robust water reuse networks is demonstrated using a four-process case study from the literature. Keywords: Fuzzy nonlinear programming, process integration, and water reuse network (WRN).
APA, Harvard, Vancouver, ISO, and other styles
35

S, Mustafa. "Capture Aware Channel Access Protocol in Wireless Network." Journal of Engineering Research [TJER] 13, no. 1 (January 31, 2018): 73. http://dx.doi.org/10.24200/tjer.vol15iss1pp73-87.

Full text
Abstract:
Spatial reuse in wireless networks is limited by the SINR threshold and it might be feasible to capture a packet in the presence of ongoing foreign transmission. This work considers a new capture aware channel access protocol by incorporating global channel state information in the decision making process for the channel access jointly with adaptive power framework. The protocol employs power heterogeneous ad-hoc networks; it assigns different transmission power level to individual nodes based on dynamic observation of the network traffic. It exploits spatial heterogeneity of flows at a given channel allocation and sets up either symmetric or asymmetric carrier sensing which in turn schedules the data packets transmission to maintain adequate service quality and fairness enjoyed by a user. It stands atop capture capable PHY to leverage the channel reuse which is of paramount importance in the design of high capacity ad-hoc networks. Through extensive simulations, the paper demonstrates the efficacy of the new protocol. It delivers high network utilization and also provides fair access to the media.
APA, Harvard, Vancouver, ISO, and other styles
36

Gharzouli, Mohamed. "Reuse and Improvement of Peersim Open Source Packages." International Journal of Open Source Software and Processes 7, no. 3 (July 2016): 39–55. http://dx.doi.org/10.4018/ijossp.2016070103.

Full text
Abstract:
This paper presents the reuse of two open source implementations of P2P protocols for Peersim simulator. Firstly, we will present the new implementation of Chord, which is considered as the most popular P2P protocol among the structured family of P2P networks. In this latter, the search requests generally use a Data Hash Table (DHT) to find a requested resource. This kind of systems is generally known as Structured and Informed Protocols. In this context, to improve the search mechanism of Chord, we modify its open source implementation for Peersim to introduce another type of resource search that supports semantic and blind requests. The main objective is to show how we have modified the open source code to achieve our goals. Also, in this paper, we will present how we have improved the display of results by the Peersim simulator through another open source package that implements Cloudcast protocol.
APA, Harvard, Vancouver, ISO, and other styles
37

Valladares Linares, Rodrigo, Zhenyu Li, Victor Yangali-Quintanilla, Qingyu Li, and Gary Amy. "Cleaning protocol for a FO membrane fouled in wastewater reuse." Desalination and Water Treatment 51, no. 25-27 (June 3, 2013): 4821–24. http://dx.doi.org/10.1080/19443994.2013.795345.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Cheng, Ray-Guang, Ruei-I. Chang, and Kuo-Lun Hua. "IWTRP: Spatial-reuse Enhancement of the Wireless Token Ring Protocol." IEEE Communications Letters 11, no. 8 (August 2007): 701–3. http://dx.doi.org/10.1109/lcomm.2007.070203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

JIANG, M. "Access Protocol with Efficient Slot Reuse in WDM Metro Ring." IEICE Transactions on Communications E88-B, no. 4 (April 1, 2005): 1685–88. http://dx.doi.org/10.1093/ietcom/e88-b.4.1685.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

COSTAGLIOLA, GENNARO, RITA FRANCESE, and GIUSEPPE SCANNIELLO. "A VISUAL SYSTEM SUPPORTING SOFTWARE REUSE IN THE BANKING LEGACY SYSTEM CONTEXT." International Journal of Software Engineering and Knowledge Engineering 13, no. 01 (February 2003): 83–101. http://dx.doi.org/10.1142/s0218194003001202.

Full text
Abstract:
Banking legacy systems intensively exchange messages in electronic format. Such systems are, for their nature, difficult to update and maintain. As a consequence, the introduction of new types of messages is a hard task. Adding new functionalities requires custom coding and software reuse is seen as a key to obtain a better time-to-market factor, risk and cost reduction. In this paper we describe the architecture and part of the implementation of the SI.RE. Visual System, an Interbanking Network Information System that lets us generate gateways for the exchange of electronic messages among banking legacy systems and supports software reuse. In particular, the SI.RE visual system contains a Visual Programming Environment that allows us to obtain a rapid development of the message handling functions. This environment implements a Visual Programming Language UVG that allows a programmer to reuse COBOL routines.
APA, Harvard, Vancouver, ISO, and other styles
41

Lai, Jia Yen, Lock Hei Ngu, and Farouq Twaiq. "Template Recycling and Reuse in MCM-41 Synthesis: Statistical Study." Journal of Applied Science & Process Engineering 5, no. 1 (March 31, 2018): 213–26. http://dx.doi.org/10.33736/jaspe.416.2018.

Full text
Abstract:
The recycle and reuse of template in MCM-41 synthesis were analysed using 23 full factorial design in order to study the effect of the template extraction parameters on the mass of MCM-41 powder produced. Four consecutive MCM-41 synthesis cycles utilizing the recycled template were studied with three factors that are ethanol fraction (A), amount of ion exchange agent (B) and the type of ion exchange agent (C). The significant effects contributed by the factors A, B and C and their interactions were identified through the half-normal probability plot and normal probability plot of the residuals. F-test and t-test were carried out to test the contribution of regression coefficients for synthesis cycles of MCM-41 synthesis models. AB interaction showed that larger mass of MCM-41 powder was obtained at high ethanol volume fraction and high quantity of ion exchange agent when either type of ion exchange agent was used.
APA, Harvard, Vancouver, ISO, and other styles
42

Ali, Ahmed Kamal. "Architecture within a circular economy: Process mapping a resource-based design-bid-build project delivery system." Enquiry A Journal for Architectural Research 14, no. 1 (December 17, 2017): 48–61. http://dx.doi.org/10.17831/enq:arcc.v14i1.432.

Full text
Abstract:
In this paper, we develop a novel method for integrating system thinking into architectural design by mapping its processes in a standard process modeling language. We structured a decision-support framework using process mapping workflows to incorporate sustainable building materials and resource-based design decisions into the architectural practice. We turned to other disciplines’ knowledgebases, such as Business Information Technology (BIT), to develop a workflow for the Design-Bid-Build project delivery method (DBB). Mapping both current and the proposed design processes, including their activities, workflow, and decision nodes, was critical in defining roles, flow of information, and subsequent decisions. In this study, we utilized a qualitative methodology to capture the required knowledge from industry experts in resource-based design and then integrated our findings into a set of process maps to support the materials decisions by the architectural project team. This study establishes a system of information exchange to support the growth of the newly emerging industry of reuse stores and vendors. Through numerous interviews and knowledge capturing sessions with industry experts from the building material reuse industry that acknowledged an absence of a "system of information exchange." It is through this study that an overall system of information exchange will connect the links between the reuse industry and the AEC industry. The primary outcome of this study is a structured process for design with resource reuse. This process will redefine the DBB traditional design process by introducing new procedures, define information exchange and identify key decisions within the proposed processes, define responsibilities and identify key stakeholders. The author conducted an extensive multi-year knowledge capturing process with constructive feedback from the industry experts.
APA, Harvard, Vancouver, ISO, and other styles
43

Abd El-Naby, Ashraf Saied, Yehia M. Helmy, and Emadeldin Helmy Khalil. "The Strategic Goals of -Using Service Oriented Architecture Principles." Future Computing and Informatics Journal 6, no. 2 (November 24, 2021): 124–42. http://dx.doi.org/10.54623/fue.fcij.6.2.6.

Full text
Abstract:
Organizations use heterogonous systems and legacy systems, they are implemented at different platforms, different databases, and different language programs. These systems need to exchange information and reuse the same functionality to achieve integration between these systems. Many Software companies failed to achieve information follow and reuse the same functionality. This paper introduces guidelines introduces Service-Oriented Architecture Principles guidelines and rules to help Applications developers to achieve information integrations and reuse the same functionality, SOA principles providing rules and guidelines that specify exactly how solution logic should be decomposed and molded into technology solutions
APA, Harvard, Vancouver, ISO, and other styles
44

Delmas-Glass, Emmanuelle. "THE YCBA HISTORIC FRAME COLLECTION: USING SEMANTIC WEB TECHNOLOGY TO CONTRIBUTE TO THE SCHOLARSHIP OF BRITISH ART." ARTis ON, no. 2 (February 12, 2016): 9–23. http://dx.doi.org/10.37935/aion.v0i2.37.

Full text
Abstract:
Following a technical survey of its of historic frame collection, the Yale Center for British Art has catalogued its frames as extensively as its art collection, and now shares it with the world via web pages for human users as well as through machine readable formats (LIDO XML, CIDOC-CRM RDF) for data aggregators. This paper proposes a data management and dissemination strategy model that relies on data exchange protocols and Linked Open Data to ensure that our rich cultural knowledge can be reused by scholars and contributes to the study of frames and the British art in general.
APA, Harvard, Vancouver, ISO, and other styles
45

Alaraj, Abdullah M. "Optimizing One Fair Document Exchange Protocol." International Journal of Network Security & Its Applications 4, no. 1 (January 31, 2012): 1–12. http://dx.doi.org/10.5121/ijnsa.2012.4101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Ya-juan, Zhang, Zhu Yue-fei, and Huang Qiu-sheng. "An identity-based key-exchange protocol." Wuhan University Journal of Natural Sciences 10, no. 1 (January 2005): 235–38. http://dx.doi.org/10.1007/bf02828658.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Lu, Rongxing, and Zhenfu Cao. "Simple three-party key exchange protocol." Computers & Security 26, no. 1 (February 2007): 94–97. http://dx.doi.org/10.1016/j.cose.2006.08.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Fogel, Brent L., and Mark T. McNally. "Trace Contamination Following Reuse of Anion-Exchange DNA Purification Resins." BioTechniques 28, no. 2 (February 2000): 299–302. http://dx.doi.org/10.2144/00282bf02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Pagliari, Stefano, and Kevin L. Young. "Exploring information exchange among interest groups: a text-reuse approach." Journal of European Public Policy 27, no. 11 (November 1, 2020): 1698–717. http://dx.doi.org/10.1080/13501763.2020.1817132.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Shen, Ren Jie, Wen Wei Zhang, and Lei Wang. "Using Mathematical Programming Optimization Work Exchange Networks." Advanced Materials Research 889-890 (February 2014): 612–16. http://dx.doi.org/10.4028/www.scientific.net/amr.889-890.612.

Full text
Abstract:
For the work exchange network, this paper proposed an optimal matching network mathematical to achieve the maxime reuse target. Based on this method, a case is studied, the corresponding work exchange network is optimized and the optimal matching network is obtained. The case study also shows that this method is more efficient and specific than the graphical and problem table methods, which is proved by the correctness, efficiency and benefits of mathematical programming method.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography