Search
Now showing items 461-470 of 515
Inner sphere oxidation of N,N′-ethylenebis(isonitrosoacetyleacetoneimine)copper(II) by N-bromosuccinimide in aqueous weakly acidic solutions
(
Springer Nature
, 2013 , Article)
The kinetics of oxidation of N,N'-ethylenebis(isonitrosoacetyleacetoneimine) copper(II) complex, CuL, by N-bromosuccinimide (SBr) in weakly aqueous acidic solutions was studied under pseudo-first-order conditions. Plots ...
Digital library initiative: A project for educators in qatar
(
Association for Computing Machinery
, 2013 , Article)
This article presents the first phase of an exciting initiative in the Arabian Gulf State of Qatar that brings together four academic institutions working to develop a digital library infrastructure of people, services, ...
Use of mobile learning apps in workplace learning
(
IEEE Computer Society
, 2013 , Article)
Organizations are starting to use mobile learning to train workers and to provide professional development of workers so that they can function on the job. The training can be delivered using mobile apps which provides the ...
Structure-activity relationship investigation of methoxy substitution on anticancer pyrimido[4,5-c]quinolin-1(2H)-ones
(2013 , Article)
Pyrimido[4,5-c]quinolin-1(2H)-one derivatives were shown to exert interesting biological activities including anticancer, antimicrobial, and cardiovascular. Substitution with methoxy groups played a crucial role in the ...
Role of contextual properties in enterprise service migration to cloud computing
(
John Wiley and Sons Ltd
, 2013 , Article Review)
This paper attempts to identify the role of contextual properties of enterprise systems architecture in relation to service migration to cloud computing. In a cloud-based service architecture, the shift of ownership, scope, ...
Secure cloud services: Matrix multiplication revisited
(
IEEE
, 2013 , Conference Paper)
This paper revisits the issue of secure outsourcing of services. It proposes a data scrambling approach of transforming private data into public without public key encryption in the cloud computing context. The approach ...
Trust in cloud services: Providing more controls to clients
(
IEEE
, 2013 , Article)
Trust is more important than money and will ultimately determine cloud computing's success.
Automatic verification of health regulatory compliance in cloud computing
(
IEEE
, 2013 , Conference Paper)
This paper aims to develop an approach that enables cloud computing clients to verify health regulatory compliance claimed by cloud computing providers. In this approach, clients of cloud computing could check automatically ...
Social access control language (SocACL)
(
Association for Computing Machinery
, 2013 , Conference Paper)
Online Social Networks hold vast amounts of readily accessible personal information leaving them particularly vulnerable to privacy breach attacks [6]. With the impact these breaches varying from simply embarrassing the ...
The use of optical spectroscopy as abiomarker probe for fungi identification
(
Research India Publications
, 2013 , Article)
Spectroscopic techniques includinginfrared,Raman (FT-Raman) and ultraviolet spectroscopy (UV-Vis)spectroscopy were used to identify and differentiate three fungi within the same Aspergillus genus (A. fumigatus, A. terreusand ...