Results 21 to 30 of about 4,385 (192)
Simulation of hydrogen auto-ignition in a turbulent co-flow of heated air with LES and CMC approach [PDF]
Large-Eddy Simulations (LES) with the first order Conditional Moment Closure (CMC) approach of a nitrogen-diluted hydrogen jet, igniting in a turbulent co-flowing hot air stream, are discussed. A detailed mechanism (nine species, 19 reactions) is used to
Lacor, Chris +4 more
core +1 more source
Nonribosomal Peptides Produced by Minimal and Engineered Synthetases with Terminal Reductase Domains
Peptide aldehyde production: An aldehyde‐releasing reductase (R) domain has been identified as part of a minimal nonribosomal peptide synthetase (NRPS) in X. indica. We also show that the R domain from the tilivalline‐producing NRPS can be used in engineered synthetases to introduce an aldehyde group and subsequently produce natural and unnatural ...
Andreas Tietze +3 more
wiley +1 more source
Interleaved converter to both charge/discharge and to extend the battery life. (a) The design process of a sliding‐mode controller that guarantee the system stability. (b) Each branch of the interleaved converter has a dedicated sliding‐mode controller.
Juan Pablo Villegas Ceballos +4 more
wiley +1 more source
Plan director de seguridad para la implementación de un SGSI basado en la norma ISO 27001:2013
Basado en la norma ISO 27001:2013, se evaluará el estado actual de los procesos relacionados con la seguridad de la información en la Empresa, realizándose un análisis de riesgos en miras a identificar y desarrollar los proyectos a generarse que le permitan la implementación de un sistema de Seguridad de la información.
Javier Benítez Cascajares
openalex +2 more sources
El artículo tiene como objetivo desarrollar habilidades en los ingenieros de sistemas, que les permitan conducir proyectos de diagnóstico, para la implementación e implantación de sistemas de seguridad de la información – SGSI alineado con el estándar ...
Francisco Nicolás Solarte Solarte +2 more
doaj +4 more sources
This work is based on the identification of threats and vulnerabilities to the most critical assets of an industrial enterprise; after knowing that vulnerabilities, can materialize adequate controls based on ISO 27001 standard, so that the company can minimize the risks.
Claudia Valle, Leslie Chilán Rodríguez
openalex +2 more sources
Partial Polarization in Interfered Plasmon Fields
We describe the polarization features for plasmon fields generated by the interference between two elemental surface plasmon modes, obtaining a set of Stokes parameters which allows establishing a parallelism with the traditional polarization model. With the analysis presented, we find the corresponding coherence matrix for plasmon fields incorporating
P. Martínez Vara +5 more
wiley +1 more source
This paper proposes an active postfilter based on two Buck converters, connected in parallel, operating in complementary interleaving. In such a configuration the ripple in the load current could be virtually eliminated to improve the power quality in comparison with classical Point‐Of‐Load (POL) regulators based on a single Buck converter.
S. I. Serna-Garcés +3 more
wiley +1 more source
Manual safety information to state colombian agency [PDF]
El manual de seguridad de la información permite determinar las fortalezas y debilidades que tiene la organización frente a los activos de información, conocer el estado actual ante seguridad de información y sus controles, con el fin de crear ...
Santamaría Ramírez, Juliana Andrea
core +2 more sources
Old-Age Security Abroad: The Background of Titles II and VIII of the Social Security Act [PDF]
This research is an attempt to create a comprehensive assessment framework for identifying and assessing potential improvement options of cement production systems. From an environmental systems analysis perspective, this study provides both an empirical
Armstrong, Barbara Nachtries
core +3 more sources

