Results 31 to 40 of about 3,158,126 (357)

Blockchain Applications for the Police Task Force of IRI: A Conceptual Framework Using Fuzzy Delphi Method [PDF]

open access: yesJournal of Information Technology Management, 2022
Blockchain is one of the trending emerging technologies that enables immutable data storage over distributed ledgers. The fundamental features of blockchain technology, such as record and identity traceability and immutability makes it an attractive ...
Abouzar Arabsorkhi, Shahriar Ebrahimi
doaj   +1 more source

Tongue prints- Unique as well as potential forensic tool for biometric authentication

open access: yesArchives of Dental Research, 2023
Forensic odontology proves to be an important branch of science when it comes to solve various criminal cases as well as in person identification by providing dental expertise in the court of law so that proper justice can be delivered.
Tanha Khan   +4 more
semanticscholar   +1 more source

On the Trail of the German Purity Law: Distinguishing the Metabolic Signatures of Wheat, Corn and Rice in Beer

open access: yesFrontiers in Chemistry, 2021
Here, we report a non-targeted analytical approach to investigate the influence of different starch sources on the metabolic signature in the final beer product. An extensive sample set of commercial beers brewed with barley, wheat, corn and/or rice were
Stefan A. Pieczonka   +4 more
doaj   +1 more source

Cryptocurrency as a New Financial and Legal Instrument: Defining Cryptoassets in Property Law [PDF]

open access: yesSHS Web of Conferences, 2021
The scientific research study is about the approach to crypto assets in property law. The cryptocurrency, possessing the signs of many civil rights, at the same time does not belong to any of them and does not correspond with anyone in a complete way ...
Astrakhantseva Irina   +1 more
doaj   +1 more source

DNA-Based Platform for Halal Authentication and Combat Food Threat

open access: yesJOURNAL OF HALAL INDUSTRY & SERVICES, 2023
The molecular recognition of a particular DNA target is essential not only for the development of new drugs, forensic research, and medical diagnostics but also for Halal authentication.
Md Mahfujur Rahman   +2 more
semanticscholar   +1 more source

The Legal Category of Authenticity. An Attempt at Definition

open access: yesТеория и практика судебной экспертизы, 2017
In law enforcement and in scientific research the category of authenticity is used both for theoretical conceptualization and in practical contexts.
O. A. Krestovnikov
doaj   +1 more source

DESIGN AND LEGAL ASPECT OF CENTRAL BANK DIGITAL CURRENCY: A LITERATURE REVIEW

open access: yesJournal of Central Banking Law and Institutions, 2022
The development of digitalisation in the financial services sector has compelled Bank Indonesia to develop Central Bank Digital Currency (CBDC). CBDC as a new type of money requires adjustments in terms of applicable laws and regulations.
Fitri Handayani, Fatma Yuliana
doaj   +1 more source

Dynamical and nonstandard computational analysis of heroin epidemic model

open access: yesResults in Physics, 2022
Numerical modelling of real-world problems has a significant role in different disciplines like biology, physics, chemistry, economics, and many more. The numerical results are the authentication of the results of the dynamical analysis.
Ali Raza   +6 more
doaj   +1 more source

Biometric multi‐factor authentication: On the usability of the FingerPIN scheme

open access: yesSecurity and Privacy, 2022
Fingerprint‐based authentication has been successfully adopted in a wide range of applications, including law enforcement and immigration, due to its numerous advantages over traditional password‐based authentication.
Emanuela Marasco   +4 more
semanticscholar   +1 more source

Protection of personal data under martial law in Ukraine

open access: yesLaw and Safety, 2023
The article is devoted to the issue of personal data protection under martial law in Ukraine. A detailed study of this issue has been carried out, aspects of the regulatory environment and levels of personal data protection in such difficult conditions ...
V. A. Svitlychnyi
doaj   +1 more source

Home - About - Disclaimer - Privacy