منابع مشابه
Estudio experimental de la efectividad de la entrevista abierta frente a la entrevista independiente de contexto
Resumen. OBJETIVO: Estudiar la efectividad relativa de las técnicas de entrevista abierta y entrevista independiente de contexto en la identificación de requisitos para sistemas software. MÉTODO: Experimento controlado ensayando dos factores: “tipo de entrevista” (abierta e independiente de contexto) y “tipo de problema” (identificación de requisitos para dos sistemas software distintos). Debid...
متن کاملIridoids from Avicennia marina.
Three new iridoid glucosides, 10-O-[(E)-cinnamoyl]-geniposidic acid, 10-O-[(E)-p-coumaroyl]-geniposidic acid, 10-O-[(E)-caffeoyl]-geniposidic acid and the known iridoid glucoside, 2'-O-[(E)-cinnamoyl]-mussaenosidic acid have been isolated from Avicennia marina. The structures were determined primarily by NMR spectroscopy. The assignment of NMR signals was performed by means of 1H-1H COSY, HMQC ...
متن کامل45 - 49 Marina AM.pmd
A rapid method for quantitative analysis of free fatty acids in virgin coconut oil (VCO) was determined using Fourier transform infrared (FTIR) spectroscopy. Thirty training samples of VCO were prepared by spiking lauric acid to VCO samples covering a range of 0.1% to 5% of free fatty acids. FTIR spectra between 1730 and 1690 cm-1 was used for quantitative determination of free fatty acids. A p...
متن کاملVisualization Dot Com
In this article, we explore the seemingly well-worn subject of distance-based, or remote visualization. Current practices in remote visualization tend to clump into two broad categories. One approach, which we’ll call render-remote, is to render an image remotely, then transmit the image to the user. Another option, render-local, transfers raw data to the user, where it is then visualized and r...
متن کاملCriptografia com Curvas Elípticas
This paper presents an overview of the use of elliptic curves in cryptography. The security of this cryptosystem is based on the discrete logarithm problem, which appears to be much harder compared to the discrete logarithm problem in other cryptosystems. An overview of common cryptosystems is given, such as Diffie-Hellman and RSA, and an elliptic curve cryptography scheme is discussed. -------...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ILUMINURAS
سال: 2019
ISSN: 1984-1191
DOI: 10.22456/1984-1191.90187