Results 71 to 80 of about 80,103 (295)
Internet of Things: Survey on Security and Privacy
The Internet of Things (IoT) is intended for ubiquitous connectivity among different entities or "things". While its purpose is to provide effective and efficient solutions, security of the devices and network is a challenging issue.
Mendez, Diego M. +2 more
core +1 more source
Tough and Rapidly Relaxing Hydrogels Via Programmable Crosslink Kinetics
A kinetic programming strategy encodes supramolecular crosslink lifetimes in single polymer networks via stoichiometric control of fast and slow hostguest interactions. This enables predictable stress relaxation on biologically relevant timescales (0.1‐100 s) while maintaining exceptional toughness (up to 14,500 J m−2), resolving the long‐standing ...
Yuanyuan Wei +3 more
wiley +1 more source
Fake Diplomas, Real Consequences: Legal and Ethical Challenges in the Legal Profession
Integrity and trust are fundamental in the legal profession, yet diploma forgery threatens these values, leading to ethical violations and diminished public trust. This study examines the legal implications of diploma forgery in Case No. 20/Pid.B/2024/PN
Dwanda Julisa Sistyawan +4 more
doaj +1 more source
The perspective presents an integrated view of neuromorphic technologies, from device physics to real‐time applicability, while highlighting the necessity of full‐stack co‐optimization. By outlining practical hardware‐level strategies to exploit device behavior and mitigate non‐idealities, it shows pathways for building efficient, scalable, and ...
Kapil Bhardwaj +8 more
wiley +1 more source
This paper explores the evidentiary significance of blockchain records and the procedural implications of integrating this technology into the U.S. judicial system, as several states have undertaken legislative measures to facilitate the admissibility of
Xukang Wang, Ying Cheng Wu, Zhe Ma
doaj +1 more source
Using shifted conjugacy in braid-based cryptography
Conjugacy is not the only possible primitive for designing braid-based protocols. To illustrate this principle, we describe a Fiat--Shamir-style authentication protocol that be can be implemented using any binary operation that satisfies the left self ...
Dehornoy, Patrick
core +1 more source
Transducers convert physical signals into electrical and optical representations, yet each mechanism is bounded by intrinsic trade‐offs across bandwidth, sensitivity, speed, and energy. This review maps transduction mechanisms across physical scale and frequency, showing how heterogeneous integration and multiphysics co‐design transform isolated ...
Aolei Xu +8 more
wiley +1 more source
Forgery Offences under Vietnam’s Law in the Digital Era, and Some Comparative Insights
In the context of digital transformation, this article conducts a comparative study on the Vietnamese criminal offence of forgery and use of counterfeit seals and documents in comparison with several civil law regimes. Rooted in the underlying doctrines
Tran Tuan Canh
doaj +1 more source
LEGAL RATIO OF INSTITUTIONAL ARRANGEMENTS CYBER NOTARY IN INDONESIA [PDF]
In the digital age, the boundaries that can hinder movement and trade and capital flows can be eliminated and bring the world closer to reach without restrictions, the use of technology is encouraged for the economic benefit of society with fast and ...
Jauharoh A. +3 more
doaj
This study reveals that abnormal mechanical stress downregulates the expression of HSP70 and impairs proteasome function in osteoarthritic bone cells, leading to misfolded collagen I accumulation and ER stress. When intracellular proteostasis capacity is exceeded, USP19 mediates the secretion of misfolded proteins into the extracellular space ...
Hailun Xu +20 more
wiley +1 more source

