نتایج جستجو برای: supply security aspects

تعداد نتایج: 658145  

2012
Azadeh Alebrahim Thein Than Tun Yijun Yu Maritta Heisel Bashar Nuseibeh

Affecting multiple parts in software systems, security requirements often tangle with functional requirements. In order to separate crosscutting concerns and increase modularity, we propose to represent security requirements as aspects that can be woven into functional requirements. Using problem frames to model the functional requirements, weaving is achieved by composing the modules represent...

Food losses refer to edible food mass decrease throughout the human food chain. Food losses occurring at consumption stage are called food waste. Food Losses and Waste (FLW) represent one of the most critical social, economic and ecological challenges facing humanity, besides being also an ethical issue. FAO data show that roughly one-third of food produced for human consumption is lost or wast...

2017
Azadeh Alebrahim Thein Than Tun Yijun Yu Maritta Heisel Bashar Nuseibeh

Affecting multiple parts in software systems, security requirements often tangle with functional requirements. In order to separate crosscutting concerns and increase modularity, we propose to represent security requirements as aspects that can be woven into functional requirements. Using problem frames to model the functional requirements, weaving is achieved by composing the modules represent...

Journal: :IJMTM 2010
Bharatendu Srivastava

The benefits of radio frequency identification (RFID) technology in the supply chain are fairly compelling. It has the potential to revolutionise the efficiency, accuracy and security of the supply chain with significant impact on overall profitability. A number of companies are actively involved in testing and adopting this technology. It is estimated that the market for RFID products and serv...

2012
Caroline Howard

As reflected in this issue, organizations are increasingly using information and communication technology to enhance their processes and strategy. Virtual communications, collaborations , alliances, business intelligence, and knowledge management are becoming critical for organizational success along with the underlying information technology investments and security. Through articles describin...

2008
Jorge Tavares Fernando J. Velez João M. Ferro

Some applications of Wireless Sensor Networks (WSNs) to the automobile are identified, and the use of Crossbow MICAz motes operating at 2.4 GHz is considered together with TinyOS support. These WSNs are conceived in order to measure, process and supply to the user diverse types of information during an automobile journey. Examples are acceleration and fuel consumption, identification of incorre...

With the advent and development of the Internet of Things, new needs arose and more attention was paid to these needs. These needs include: low power consumption, low area consumption, low supply voltage, higher security and so on. Many solutions have been proposed to improve each one of these needs. In this paper, we try to reduce the power consumption and enhance the security by using SPGAL, ...

In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...

ستایشنظر, مهرداد, نظام‌آبادی, حسین,

This paper addresses the bidding problem faced by a virtual power plant (VPP) in energy, spinning reserve service, and reactive power service market simultaneously. Therefore, a non-equilibrium model based on security constraints price-based unit commitment (SCPBUC), which is take into account the supply-demand balancing and security constraints of VPP, is proposed. By the presented model, VPP ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید