Threats and security defense of next generation networks

Walter Baluja García, Caridad Anías Calderón
  • Páges : 7 - 16 |
  • 235 | 34
DOI: https://doi.org/10.25100/iyc.v8i2.2496
  • Páges : 17 - 24 |
  • 123 | 56
DOI: https://doi.org/10.25100/iyc.v8i2.2497
DOI: https://doi.org/10.25100/iyc.v8i2.2498

Implementation of a Web architecture for the execution of workflows in bioinformatics

Gustavo Salazar, Yesid Cuesta Astroz, Oscar E Restrepo, Fernando Barraza
  • Páges : 34 - 45 |
  • 146 | 76
DOI: https://doi.org/10.25100/iyc.v8i2.2499
DOI: https://doi.org/10.25100/iyc.v8i2.2500
  • Páges : 55 - 63 |
  • 182 | 121
DOI: https://doi.org/10.25100/iyc.v8i2.2501
  • Páges : 64 - 79 |
  • 238 | 156
DOI: https://doi.org/10.25100/iyc.v8i2.2502
  • Páges : 80 - 93 |
  • 218 | 65
DOI: https://doi.org/10.25100/iyc.v8i2.2503

Evaluation of the cleaning system of a Kraft paper mill

María J. Tovar, Lady Sandoval, Oscar Sabogal, Edgar Mora, Fiderman Machuca
  • Páges : 94 - 100 |
  • 162 | 38
DOI: https://doi.org/10.25100/iyc.v8i2.2504
  • Páges : 101 - 111 |
  • 155 | 54
DOI: https://doi.org/10.25100/iyc.v8i2.2505
  • Páges : 112 - 127 |
  • 2367 | 753
DOI: https://doi.org/10.25100/iyc.v8i2.2506