Results 11 to 20 of about 2,383,360 (354)
Mathematical model for controlling CO2 concentration in greenhouses late in MATLAB [PDF]
The article is devoted to the development of an automated control system for irradiation facilities. The system will optimize the electricity cost for supplementary lighting plants in greenhouses without economic losses. A number of scientific researches
Ivliev Sergey N. +3 more
doaj +1 more source
The problems of development and construction of a universal consolidated strategy of interaction of IT services and information security, which is based on the study and in-depth analysis of statistics on the current situation with the interaction of ...
Serhii Lubenets +2 more
doaj +1 more source
SECURITY TOKEN SERVICE SYSTEM ADMINISTRATOR GUIDE [PDF]
The Security Token Service (STS) is a partial implementation of the OASIS WS-Trust specification.It is a service that can be used for transforming an existing security token into another security token ...
White, John
core +1 more source
Performance Verification of SeqType® P52 Human Ancestry Identification SNP Detection Kit [PDF]
Objective To evaluate the discrimination efficiency of the SeqType P52 Human Ancestry Identification SNP Detection Kit based on a high-throughput sequencing platform in five Chinese ethnic groups.
WANG Ying-xi, MA Yuan, LI Fu, et al.
doaj +1 more source
An architecture for certification-aware service discovery [PDF]
Service-orientation is an emerging paradigm for building complex systems based on loosely coupled components, deployed and consumed over the network. Despite the original intent of the paradigm, its current instantiations are limited to a single trust ...
Bezzi, M., Sabetta, A., Spanoudakis, G.
core +1 more source
Specificities of non-intelligence work of modern security services [PDF]
The security services, from their inception to the present day have played a very important, if not decisive, role in all major events that have taken place in states since their inception.
Labović Dejan R. +2 more
doaj +1 more source
Mobile integrated conditional access system [PDF]
This paper presents design of a novel security architecture integrating mobile and broadcasting technologies in the Pay-TV system. The security architecture proposed herein is a state-of-the-art solution to tackle well-known problems challenging current ...
Birch, N +4 more
core +1 more source
Background Since the end of January 2020, the coronavirus (COVID-19) pandemic has been responsible for a global health crisis. In England a number of non-pharmaceutical interventions have been introduced throughout the pandemic, including guidelines on ...
Claire F. Ferraro +8 more
doaj +1 more source
Secure sessions for web services [PDF]
We address the problem of securing sequences of SOAP messages exchanged between web services and their clients. The WS-Security standard defines basic mechanisms to secure SOAP traffic, one message at a time. For typical web services, however, using WS-Security independently for each message is rather inefficient; moreover, it is often ...
Bhargavan, Karthikeyan +3 more
openaire +3 more sources
Constructing secure service compositions with patterns [PDF]
In service based applications, it is often necessary to construct compositions of services in order to provide required functionality in cases where this is not possible through the use of a single service.
Pino, L., Spanoudakis, G.
core +1 more source

