|
|
|
Ken Polasko, Pedro Ponce and Arturo Molina
Engineering education pushes the creation of new technology to solve community problems. The process of technology transfer promotes educational innovation in universities, a vital process that can improve citizens? quality of life in cities and rural co...
ver más
|
|
|
|
|
|
|
Leonardo Francisco Panes Martínez
Con el desarrollo del protocolo de red IP se ha generado un crecimiento explosivo de Internet en los últimos diez o quince años, que ha llevado a la proliferación de múltiples servicios de comunicación, dada la naturaleza de este protocolo se hace necesa...
ver más
|
|
|
|
|
|
|
Nor Asyikin Rozali
Pág. 43
Molecularly imprinted polymers (MIPs) have remained as the supreme convenient and selected methods in recognition and extraction for various kinds of specific targets molecule in different fields. MIPs were prepared by mixing template molecule with funct...
ver más
|
|
|
|
|
|
|
Xuan Dau Hoang and Hong Ky Pham
On the high-speed connections of the Internet or computer networks, the IP (Internet Protocol) packet traffic passing through the network is extremely high, and that makes it difficult for network monitoring and attack detection applications. This paper ...
ver más
|
|
|
|
|
|
|
Meenakshisundaram Menaga, Perepi Rajasulochana, Sugantham Felix, Shanmugam Sudarshan, Ashish Kapoor, Kumaraswamy Gandla, Moustafa M. Saleh, Adel Ehab Ibrahim and Sami El Deeb
A comparison of the growth performance of Penaeus vannamei was ascertained by supplementing the potential probiotics isolated from a biofloc system incorporated through feed. Post-larvae shrimp (0.045 ± 0.005 g) were stocked at a density of 500/m3 in FRP...
ver más
|
|
|
|
|
|
|
Natalija Vlajic, Mashruf Chowdhury and Marin Litoiu
In recent years, a trend that has been gaining particular popularity among cybercriminals is the use of public Cloud to orchestrate and launch distributed denial of service (DDoS) attacks. One of the suspected catalysts for this trend appears to be the i...
ver más
|
|
|
|
|
|
|
Chao-Jung Lai, Ming-Hsien Hsueh, Cheng-Wen Chang and Tsz-Ming Ip
Currently, people spend many more hours on smartphones, and the potential impact of phone radiation is receiving more attention. Reducing the impact of a phone?s magnetic field on human health is vital. Although many studies advise changing phone use hab...
ver más
|
|
|
|
|
|
|
I.P. Gladilina,S.L. Razumovskiy,E.A. Rumyantseva,S.A. Sergeeva,E.A. Vetrova,I.G. Shadskaja
Pág. 270 - 274
The contemporary higher professional education strictly formulates one of the most important goals of science ? development of creativity in students. In the creative process only, new ideas are brought, stereotypes holding back the civilizational progre...
ver más
|
|
|
|
|
|
|
Charles H. K. Lam, Alvin W. M. Ip, John Patrick Barford and Gordon McKay
This study reviews the characteristics of municipal solid waste incineration (MSWI) ashes, with a main focus on the chemical properties of the ashes. Furthermore, the possible treatment methods for the utilization of ash, namely, separation processes, so...
ver más
|
|
|
|
|
|
|
I.P. Hollingsworth,W. Keogh,M.H. Atkins
This paper shows how Quality Costs can be a measure of software quality. The relationship between Quality Costs and other software quality metrics is briefly explained, and software development oriented versions of the two principal Quality Cost models a...
ver más
|
|
|
|
|
|
|
Phuoc-Nguyen Tran,Nadia Boukhatem
Pág. 67 - 73
Designing an IP-based RFID system allows low costdeployment and easy integration with IP-based services. In this paper, we propose an IP-based RFID architecture and focus on location management which allows determining ?where? the object is after moving....
ver más
|
|
|
|
|
|
|
Ivan Nedyalkov
This paper proposes the use of the GNS3 IP network modeling platform to study/verify whether the exchanged information between power electronic devices and a control center (Monitoring and Control Centre) is secure. For the purpose of this work, a power ...
ver más
|
|
|
|
|
|
|
Ali A. Hammadi and Zaid H. Nasralla
As the Internet grows in capacity, the energy consumption of Information and Communication Technologies (ICT) are significantly increasing. Significant research efforts on energy conservation have been devoted to devise different technological solutions ...
ver más
|
|
|
|
|
|
|
Omar I. Dallal Bashi, Shymaa Mohammed Jameel, Yasir Mahmood Al Kubaisi, Husamuldeen K. Hameed and Ahmad H. Sabry
Security identification solutions against WLAN network attacks according to straightforward digital detectors, such as SSID, IP addresses, and MAC addresses, are not efficient in identifying such hacking or router impersonation. These detectors can be si...
ver más
|
|
|
|
|
|
|
Husam H. Hasan and Zainab T. Alisa
The Internet of Things (IoT) connects devices via the Internet. Network congestion is one of the key problems that has been identified by researchers in the IoT field. When there is a huge number of IoT devices connected to the internet, this creates net...
ver más
|
|
|
|
|
|
|
Despoina Chochtoula, Aristidis Ilias, Yannis C. Stamatiou and Christos Makris
SCADA systems monitor critical industrial, energy and other physical infrastructures in order to detect malfunctions, issue alerts and, in many cases, propose or even take remedial actions. However, due to their attachment to the Internet, SCADA systems ...
ver más
|
|
|
|
|
|
|
Shoujiang Dang and Rui Han
In scientific domains such as high-energy particle physics and genomics, the quantity of high-speed data traffic generated may far exceed the storage throughput and be unable to be in time stored in the current node. Cooperating and utilizing multiple st...
ver más
|
|
|
|
|
|
|
Amr Bahaa, Mohamed Shehata, Safa M. Gasser and Mohamed S. El-Mahallawy
An explosion of traffic volume is the main driver behind launching various 5G services. The 5G network will utilize the IP Multimedia Subsystems (IMS) as a core network, same as in 4G networks. Thus, ensuring a high level of survivability and efficient f...
ver más
|
|
|
|
|
|
|
Babu R. Dawadi, Abhishek Thapa, Roshan Guragain, Dilochan Karki, Sandesh P. Upadhaya and Shashidhar R. Joshi
Legacy IPv4 networks are strenuous to manage and operate. Network operators are in need of minimizing the capital and operational expenditure of running network infrastructure. The implementation of software-defined networking (SDN) addresses those issue...
ver más
|
|
|
|
|
|
|
Mohammad Al mojamed
The Mobile ad hoc Network (MANET) is a collection of mobile devices that forms a self-created, self-administered, and self-organized network. It is an infrastructureless network that does not require an existing infrastructure to operate. MANET suits sce...
ver más
|
|
|
|