Results 31 to 40 of about 76,752 (276)
The COVID-19-crisis has exposed the shortcomings of formal requirements for legal acts which involve the physical presence of others. This is in particular true with regard to last wills which require the physical presence of a notary and/or witnesses ...
J. W. A. Biemans
doaj +1 more source
A Hybrid Deep Learning Approach for Secure Biometric Authentication Using Fingerprint Data
Despite significant advancements in fingerprint-based authentication, existing models still suffer from challenges such as high false acceptance and rejection rates, computational inefficiency, and vulnerability to spoofing attacks.
Abdulrahman Hussian +3 more
doaj +1 more source
Fragile and blind watermarking technique based on Weber's law for medical image authentication
In developing countries such as India, transmission of medical images over the network is essential for providing health services to rural/remote population. During this transmission, a small distortion in the medical image may lead to wrong conclusions.
Ekta Walia, Anu Suneja
doaj +1 more source
Digital Evidence and Cloud Forensics: Contemporary Legal Challenges and the Power of Disposal
Fighting crime in cyberspace requires law enforcement authorities to immerse in a digital ocean of vast amount of information and also to acquire and objectify the evidence of criminal activity.
Christos Karagiannis, Kostas Vergidis
doaj +1 more source
A spin group (SG)‐based mechanism is proposed to realize a single pair of Weyl points. PT‐symmetric nodal lines (NLs) persist under T‐breaking, protected by the combination of SG and P symmetry. When considering spin‐orbit coupling, the SG‐protected NL will split into Weyl points, which will also induce anomalous transport phenomena arising from ...
Shifeng Qian +6 more
wiley +1 more source
The complexity of law enforcement in online trading fraud cases poses significant challenges. Sellers can carry out fraudulent activities through product counterfeiting or making transactions outside of e-commerce platforms, while buyers can commit fraud
Anton Satila +4 more
doaj +1 more source
Objective: to specify the models of legal regulation in the sphere of biometric identification and authentication with facial recognition technology in order to elaborate recommendations for increasing information security of persons and state-legal ...
D. Utegen, B. Zh. Rakhmetov
doaj +1 more source
Intellectual Coherence in an Evidence Code [PDF]
The Federal Rules of Evidence (Federal Rules or Rules) were created in large part to promote uniformity and predictability in federal trials by providing a relatively instructive guide for judges and lawyers concerning the admissibility of evidence.
Rothstein, Paul F
core +2 more sources
Identity principles in the digital age: a closer view [PDF]
Identity and its management is now an integral part of web-based services and applications. It is also a live political issue that has captured the interest of organisations, businesses and society generally.
Savirimuthu, J, Wong, R
core +1 more source
High‐density BNNT films, enabling mechanical robustness and high space radiation shielding effectiveness, are fabricated using surfactant‐stabilized BNNT liquid crystal. Simulations indicate that a 50 g cm−2 BNNT film can reduce radiation exposure by 56% compared to zero shielding, potentially doubling the duration of astronaut missions on the lunar ...
Young‐Kyeong Kim +17 more
wiley +1 more source

