Threats and security defense of next generation networks

Walter Baluja García, Caridad Anías Calderón
  • Páges : 7 - 16 |
  • 243 | 36
DOI: https://doi.org/10.25100/iyc.v8i2.2496
  • Páges : 17 - 24 |
  • 130 | 58
DOI: https://doi.org/10.25100/iyc.v8i2.2497
DOI: https://doi.org/10.25100/iyc.v8i2.2498

Implementation of a Web architecture for the execution of workflows in bioinformatics

Gustavo Salazar, Yesid Cuesta Astroz, Oscar E Restrepo, Fernando Barraza
  • Páges : 34 - 45 |
  • 161 | 84
DOI: https://doi.org/10.25100/iyc.v8i2.2499
DOI: https://doi.org/10.25100/iyc.v8i2.2500
  • Páges : 55 - 63 |
  • 188 | 122
DOI: https://doi.org/10.25100/iyc.v8i2.2501
  • Páges : 64 - 79 |
  • 246 | 158
DOI: https://doi.org/10.25100/iyc.v8i2.2502
  • Páges : 80 - 93 |
  • 225 | 66
DOI: https://doi.org/10.25100/iyc.v8i2.2503

Evaluation of the cleaning system of a Kraft paper mill

María J. Tovar, Lady Sandoval, Oscar Sabogal, Edgar Mora, Fiderman Machuca
  • Páges : 94 - 100 |
  • 170 | 42
DOI: https://doi.org/10.25100/iyc.v8i2.2504
  • Páges : 101 - 111 |
  • 163 | 56
DOI: https://doi.org/10.25100/iyc.v8i2.2505
  • Páges : 112 - 127 |
  • 2380 | 775
DOI: https://doi.org/10.25100/iyc.v8i2.2506