بحث بسيط
السجلات المعروضة 411 -- 420 من 458
Open Education Resources and Mobile Technology to Narrow the Learning Divide
(
Athabasca University Press
, 2013 , Article)
As the world becomes more digitized, there will be an increasing need to make available learning resources in electronic format for access by information and communication technologies. The question education will face is ...
Inner sphere oxidation of N,N′-ethylenebis(isonitrosoacetyleacetoneimine)copper(II) by N-bromosuccinimide in aqueous weakly acidic solutions
(
Springer Nature
, 2013 , Article)
The kinetics of oxidation of N,N'-ethylenebis(isonitrosoacetyleacetoneimine) copper(II) complex, CuL, by N-bromosuccinimide (SBr) in weakly aqueous acidic solutions was studied under pseudo-first-order conditions. Plots ...
Digital library initiative: A project for educators in qatar
(
Association for Computing Machinery
, 2013 , Article)
This article presents the first phase of an exciting initiative in the Arabian Gulf State of Qatar that brings together four academic institutions working to develop a digital library infrastructure of people, services, ...
Use of mobile learning apps in workplace learning
(
IEEE Computer Society
, 2013 , Article)
Organizations are starting to use mobile learning to train workers and to provide professional development of workers so that they can function on the job. The training can be delivered using mobile apps which provides the ...
Structure-activity relationship investigation of methoxy substitution on anticancer pyrimido[4,5-c]quinolin-1(2H)-ones
(2013 , Article)
Pyrimido[4,5-c]quinolin-1(2H)-one derivatives were shown to exert interesting biological activities including anticancer, antimicrobial, and cardiovascular. Substitution with methoxy groups played a crucial role in the ...
Role of contextual properties in enterprise service migration to cloud computing
(
John Wiley and Sons Ltd
, 2013 , Article Review)
This paper attempts to identify the role of contextual properties of enterprise systems architecture in relation to service migration to cloud computing. In a cloud-based service architecture, the shift of ownership, scope, ...
Secure cloud services: Matrix multiplication revisited
(
IEEE
, 2013 , Conference Paper)
This paper revisits the issue of secure outsourcing of services. It proposes a data scrambling approach of transforming private data into public without public key encryption in the cloud computing context. The approach ...
Trust in cloud services: Providing more controls to clients
(
IEEE
, 2013 , Article)
Trust is more important than money and will ultimately determine cloud computing's success.
Automatic verification of health regulatory compliance in cloud computing
(
IEEE
, 2013 , Conference Paper)
This paper aims to develop an approach that enables cloud computing clients to verify health regulatory compliance claimed by cloud computing providers. In this approach, clients of cloud computing could check automatically ...
Social access control language (SocACL)
(
Association for Computing Machinery
, 2013 , Conference Paper)
Online Social Networks hold vast amounts of readily accessible personal information leaving them particularly vulnerable to privacy breach attacks [6]. With the impact these breaches varying from simply embarrassing the ...