Results 131 to 140 of about 3,158,126 (357)

Using pH Value as a Discriminating Feature for Scotch Whisky Authentication in Taiwan

open access: yesChemosensors
While pH possesses inherent chemical significance and potential forensic value in Scotch whisky authentication, it has previously lacked a statistically rigorous exclusionary standard.
Ting-Chia Chang   +3 more
doaj   +1 more source

Compensatory Interplay Between Clarin‐1 and Clarin‐2 Deafness‐Associated Proteins Governs Phenotypic Variability in Hearing

open access: yesAdvanced Science, EarlyView.
Functional compensation between clarin‐1 and clarin‐2 in cochlear hair cells. Hearing loss associated with CLRN1 mutations shows striking phenotypic variability; however, the underlying mechanisms remain poorly understood. This study reveals that clarin‐1 and clarin‐2 function cooperatively in cochlear hair cells to sustain mechanoelectrical ...
Maureen Wentling   +17 more
wiley   +1 more source

Position and enforcement practice of the People's Republic of China's pharmaceutical data exclusivity protection

open access: yesDrug Design, Development and Therapy, 2016
Na Li,1 Xiang Yu,2 Michael Pecht3 1School of Law, Ningbo University, Ningbo, People’s Republic of China; 2School of Law and Politics, Ningbo Institute of Technology, Zhejiang University, Ningbo, People’s Republic of China; 3Center for ...
Li N, Yu X, Pecht M
doaj  

Fingerprint Recognition System based on Artificial Neural Networks integrated with Machine Learning [PDF]

open access: yesITM Web of Conferences
This study represents a fingerprint recognition approach that combines Artificial Neural Networks (ANN) with Machine Learning (ML) approaches to improve biometric identification in terms of precision, efficiency, and dependability.
Nagamani Ummadisetty   +5 more
doaj   +1 more source

Key Management Building Blocks for Wireless Sensor Networks [PDF]

open access: yes, 2007
Cryptography is the means to ensure data confidentiality, integrity and authentication in wireless sensor networks (WSNs). To use cryptography effectively however, the cryptographic keys need to be managed properly.
Doumen, J.M., Law, Y.W., Palaniswami, M.
core   +2 more sources

MIM‐Diode‐Like Rectification in Lateral 1T/1H/1T‐MoS2 Homojunctions via Interfacial Dipole Engineering

open access: yesAdvanced Electronic Materials, EarlyView.
The metallic 1T and semiconducting 1H phases of MoS2 enable phase‐engineered 1T/1H/1T homojunctions that exhibit MIM‐diode‐like rectification without dissimilar electrodes. Asymmetric 1T/1H interfaces induce interface dipoles and a built‐in potential drop across the 1H barrier, creating a trapezoidal tunnel barrier at zero bias and yielding diode‐like ...
Elias Eckmann   +3 more
wiley   +1 more source

Information Technology Act 2000 in India - Authentication of E-Documents

open access: yesJournal of Digital Forensics, Security and Law, 2007
The Information Technology Act 2000 has enacted in India on 9th June 2000. This Act has mentioned provision of authentication of electronic document. It is the need of hour at that time that such provision is needed in the Indian Law system, especially ...
R. G. Pawar, B. S. Sawant, A. Kaiwade
doaj  

Chip and Skim: cloning EMV cards with the pre-play attack [PDF]

open access: yes, 2012
EMV, also known as "Chip and PIN", is the leading system for card payments worldwide. It is used throughout Europe and much of Asia, and is starting to be introduced in North America too. Payment cards contain a chip so they can execute an authentication
Anderson, Ross   +4 more
core   +1 more source

MULTILINGUALISM IN EU LAW: HOW PROMULGATION AUTHENTICATES EQUALITY

open access: yesComparative Legilinguistics, 2010
EU law currently applies to 27 countries and is available in 23 languages which all carry equal status. In practice, this is achieved though translation and by the work of the DGT (Directorate General Translation), which hosts the largest translation service in the world. But from a legal point of view, translation is institutionally ‘non-existent’ and
openaire   +2 more sources

RRAM Variability Harvesting for CIM‐Integrated TRNG

open access: yesAdvanced Electronic Materials, EarlyView.
This work demonstrates a compute‐in‐memory‐compatible true random number generator that harvests intrinsic cycle‐to‐cycle variability from a 1T1R RRAM array. Parallel entropy extraction enables high‐throughput bit generation without dedicated circuits. This approach achieves NIST‐compliant randomness and low per‐bit energy, offering a scalable hardware
Ankit Bende   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy