Microkinetics of alcohol reforming for H2 production from a FAIR density functional theory database
The production of hydrogen from biomass is of fundamental importance for a sustainable future. Here, the authors present a multiscale method that allows the formulation of scaling relationships and microkinetics of C1-C2 alcohol decomposition based on a ...
Qiang Li +2 more
doaj +2 more sources
Composites are widely used in aeronautical manufacturing. Despite their excellent properties, composites suffer from barely visible impact damage caused by low-velocity objects. Random impacts need to be detected and located to alert pilots and engineers
Hongyang Li +3 more
doaj +3 more sources
A formal model for ledger management systems based on contracts and temporal logic
A key component of blockchain technology is the ledger, viz., a database that, unlike standard databases, keeps in memory the complete history of past transactions as in a notarial archive for the benefit of any future test.
Paolo Bottoni +2 more
doaj +1 more source
Data Governance Framework in Data Exchange Centers [PDF]
Purpose: Data governance frameworks have typically been discussed within the confines of an organization, with less focus on inter-organizational contexts.
Mohamadreza Mortazavi +2 more
doaj +1 more source
Middleware-based Database Replication: The Gaps between Theory and Practice [PDF]
The need for high availability and performance in data management systems has been fueling a long running interest in database replication from both academia and industry.
Ailamaki, Anastasia +2 more
core +8 more sources
THE PROBLEM OF FEATURE EXTRACTION OF CONCEPTS IN ONTOLOGICAL MODELING OF SUBJECT AREA
This article attempts to combining scientific knowledge in a logical theory and concepts of database theory in terms of determining the essential features of concepts (entities) and their properties.
Denis V. Vlasov
doaj +1 more source
Towards a Hybrid Immune Algorithm Based on Danger Theory for Database Security
In Databases, the most prevalent cause of data breaches comes from insiders who misuse their account privileges. Due to the difficulty of discovering such breaches, an adaptive, accurate, and proactive database security strategy is required.
Wael Said, Ayman Mohamed Mostafa
doaj +1 more source
Ramachandran mapping of peptide conformation using a large database of computed Raman and Raman optical activity spectra [PDF]
In the past few decades, Raman optical activity (ROA) spectroscopy has been shown to be very sensitive to the solution structure of peptides and proteins.
Barron, Laurence D. +2 more
core +1 more source
PathIN: an integrated tool for the visualization of pathway interaction networks
PathIN is a web-service that provides an easy and flexible way for rapidly creating pathway-based networks at several functional biological levels: genes, compounds and reactions.
George Minadakis +3 more
doaj +1 more source
From Causes for Database Queries to Repairs and Model-Based Diagnosis and Back [PDF]
In this work we establish and investigate connections between causes for query answers in databases, database repairs wrt. denial constraints, and consistency-based diagnosis.
Bertossi, Leopoldo, Salimi, Babak
core +3 more sources

