Search
Now showing items 951-960 of 1037
Multi-cloud distribution of virtual functions and dynamic service deployment: OpenADN perspective
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Network Function Virtualization (NFV) and Service Chaining (SC) are novel service deployment approaches in the contemporary cloud environments for increased flexibility and cost efficiency to the Application Service Providers ...
Monoamine oxidase inhibitors extracted from tobacco smoke as neuroprotective factors for potential treatment of Parkinson’s disease
(
Bentham Science Publishers B.V.
, 2015 , Article)
Parkinson’s disease (PD) is a neurodegenerative disease characterized by the loss of mainly the nigrostriatal dopaminergic neurons, which leads to motor dysfunction. Although, most of the drugs are currently used for ...
Glucose- and triglyceride-lowering dietary penta-O-galloyl-α-D-glucose reduces expression of PPARγ and C/EBPα, induces p21-Mediated G1 phase cell cycle arrest, and inhibits adipogenesis in 3T3-L1 preadipocytes
(
Thieme
, 2015 , Article)
Plant polyphenols, such as hydrolysable tannins, are present in the human diet and known to exhibit anti-diabetic and anti-obesity activity. We previously reported that the representative hydrolysable tannin compound ...
Overproduction of the Bacillus thuringiensis Vip3Aa16 toxin and study of its insecticidal activity against the carob moth Ectomyelois ceratoniae
(
Elsevier
, 2015 , Article)
The vip3Aa16 gene of Bacillus thuringiensis strain BUPM95 was cloned and expressed in Escherichia coli. Optimization of Vip3A16 protein expression was conducted using Plackett–Burman design and response surface methodology. ...
Data Obfuscation for Privacy and Confidentiality in Cloud Computing
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
This paper proposes a data obfuscation approach in outsourcing matrix multiplication to cloud computing. It is primarily based on splitting the rows and columns of matrices to alter their actual dimension coupled with ...
Managing Security Control Assumptions Using Causal Traceability
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Security control specifications of software systems are designed to meet their security requirements. It is difficult to know both the value of assets and the malicious intention of attackers at design time, hence assumptions ...
A Process Model for Customisation of Software in Multi-tenant SaaS Model
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
This paper outlines a generic process framework for customisation of software in cloud computing. The flexibility for client-specific customisation of the software offered by software-as-a-service (SaaS) is limited. The ...
Model for transforming engineering education using technology-enhanced learning
(
Springer International Publishing
, 2015 , Book chapter)
Engineering education is important for all countries to progress and to be competitive in the twenty-first century. This is especially true for countries in the Middle East and North Africa (MENA), which are developing ...
E-learning and mobile learning development in the state of Qatar
(
Taylor and Francis
, 2015 , Book chapter)
The State of Qatar's National Vision 2030 (QNV 2030) defines long-term outcomes for this oil-rich and gas-rich state. It aims at transforming Qatar into an advanced nation, capable of sustaining its own development and ...
Cultural traditions and architectural form of Italian transnational houses in Australia
(
ArchNet
, 2015 , Article)
The purpose of this article is to investigate the connection between cultural traditions and house form which, according to scholars, is in danger of being lost, and so contribute to the revival of critical interest in ...