Results 1 to 10 of about 4,209 (267)
MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile,
Samsul Huda +2 more
doaj +1 more source
GLOBAL RESEARCH TRENDS IN BLOCKCHAIN IN SMART GRID: A TEXT MINING BASED SCIENTOMETRIC STUDY [PDF]
Purpose - This paper analyze the trends on “Blockchain in Power Grid” in national and international research by bibliometric analysis. The bibliometric review of this study helps scientist/researchers to explore the trends in “Blockchain in Power Grid ...
Reetu Verma, Nidhi Gupta, Suman Mann
doaj +1 more source
MULTILINGUALISM IN EU LAW: HOW PROMULGATION AUTHENTICATES EQUALITY
EU law currently applies to 27 countries and is available in 23 languages which all carry equal status. In practice, this is achieved though translation and by the work of the DGT (Directorate General Translation), which hosts the largest translation service in the world. But from a legal point of view, translation is institutionally ‘non-existent’ and
openaire +2 more sources
Na Li,1 Xiang Yu,2 Michael Pecht3 1School of Law, Ningbo University, Ningbo, People’s Republic of China; 2School of Law and Politics, Ningbo Institute of Technology, Zhejiang University, Ningbo, People’s Republic of China; 3Center for ...
Li N, Yu X, Pecht M
doaj
Using pH Value as a Discriminating Feature for Scotch Whisky Authentication in Taiwan
While pH possesses inherent chemical significance and potential forensic value in Scotch whisky authentication, it has previously lacked a statistically rigorous exclusionary standard.
Ting-Chia Chang +3 more
doaj +1 more source
The use and implementation of disruptive technologies poses numerous challenges to be faced by the law. Biometric-based systems use personal data for their operation as they collect intrinsic and unalterable aspects of individuals to generate a biometric
Diana Paola González Mendoza
doaj +1 more source
Information Technology Act 2000 in India - Authentication of E-Documents
The Information Technology Act 2000 has enacted in India on 9th June 2000. This Act has mentioned provision of authentication of electronic document. It is the need of hour at that time that such provision is needed in the Indian Law system, especially ...
R. G. Pawar, B. S. Sawant, A. Kaiwade
doaj
A Blockchain-Based Framework for OSINT Evidence Collection and Identification
The rapid advancement of social media and the exponential increase in online information have made open-source intelligence an essential component of modern criminal investigations.
Han-Wen Huang +3 more
doaj +1 more source
Rad concept: authentic evidence women's specialties in Islamic heritage law
Basically, Islam is a religion explains existence of equivalents and parallelization between man and woman which placed woman in a fair position to get her rights in social, economy, politic, and Islamic inheritance law. This study aims to answer gender bias in the manner of describing woman uniqueness in rad concept by Islamic inheritance law.
openaire +3 more sources
Nikāh in the Digital Age: Evaluation of Video Online Marriage Contracts in terms of Islamic Law
In recent years, rapid digitalization, along with transformations in communication technologies and legal systems, has profoundly altered traditional practices.
Hasan Demir
doaj +1 more source

