Results 131 to 140 of about 3,158,126 (357)
Using pH Value as a Discriminating Feature for Scotch Whisky Authentication in Taiwan
While pH possesses inherent chemical significance and potential forensic value in Scotch whisky authentication, it has previously lacked a statistically rigorous exclusionary standard.
Ting-Chia Chang +3 more
doaj +1 more source
Functional compensation between clarin‐1 and clarin‐2 in cochlear hair cells. Hearing loss associated with CLRN1 mutations shows striking phenotypic variability; however, the underlying mechanisms remain poorly understood. This study reveals that clarin‐1 and clarin‐2 function cooperatively in cochlear hair cells to sustain mechanoelectrical ...
Maureen Wentling +17 more
wiley +1 more source
Na Li,1 Xiang Yu,2 Michael Pecht3 1School of Law, Ningbo University, Ningbo, People’s Republic of China; 2School of Law and Politics, Ningbo Institute of Technology, Zhejiang University, Ningbo, People’s Republic of China; 3Center for ...
Li N, Yu X, Pecht M
doaj
Fingerprint Recognition System based on Artificial Neural Networks integrated with Machine Learning [PDF]
This study represents a fingerprint recognition approach that combines Artificial Neural Networks (ANN) with Machine Learning (ML) approaches to improve biometric identification in terms of precision, efficiency, and dependability.
Nagamani Ummadisetty +5 more
doaj +1 more source
Key Management Building Blocks for Wireless Sensor Networks [PDF]
Cryptography is the means to ensure data confidentiality, integrity and authentication in wireless sensor networks (WSNs). To use cryptography effectively however, the cryptographic keys need to be managed properly.
Doumen, J.M., Law, Y.W., Palaniswami, M.
core +2 more sources
The metallic 1T and semiconducting 1H phases of MoS2 enable phase‐engineered 1T/1H/1T homojunctions that exhibit MIM‐diode‐like rectification without dissimilar electrodes. Asymmetric 1T/1H interfaces induce interface dipoles and a built‐in potential drop across the 1H barrier, creating a trapezoidal tunnel barrier at zero bias and yielding diode‐like ...
Elias Eckmann +3 more
wiley +1 more source
Information Technology Act 2000 in India - Authentication of E-Documents
The Information Technology Act 2000 has enacted in India on 9th June 2000. This Act has mentioned provision of authentication of electronic document. It is the need of hour at that time that such provision is needed in the Indian Law system, especially ...
R. G. Pawar, B. S. Sawant, A. Kaiwade
doaj
Chip and Skim: cloning EMV cards with the pre-play attack [PDF]
EMV, also known as "Chip and PIN", is the leading system for card payments worldwide. It is used throughout Europe and much of Asia, and is starting to be introduced in North America too. Payment cards contain a chip so they can execute an authentication
Anderson, Ross +4 more
core +1 more source
MULTILINGUALISM IN EU LAW: HOW PROMULGATION AUTHENTICATES EQUALITY
EU law currently applies to 27 countries and is available in 23 languages which all carry equal status. In practice, this is achieved though translation and by the work of the DGT (Directorate General Translation), which hosts the largest translation service in the world. But from a legal point of view, translation is institutionally ‘non-existent’ and
openaire +2 more sources
RRAM Variability Harvesting for CIM‐Integrated TRNG
This work demonstrates a compute‐in‐memory‐compatible true random number generator that harvests intrinsic cycle‐to‐cycle variability from a 1T1R RRAM array. Parallel entropy extraction enables high‐throughput bit generation without dedicated circuits. This approach achieves NIST‐compliant randomness and low per‐bit energy, offering a scalable hardware
Ankit Bende +4 more
wiley +1 more source

