Results 81 to 90 of about 3,158,126 (357)
LEGAL RATIO OF INSTITUTIONAL ARRANGEMENTS CYBER NOTARY IN INDONESIA [PDF]
In the digital age, the boundaries that can hinder movement and trade and capital flows can be eliminated and bring the world closer to reach without restrictions, the use of technology is encouraged for the economic benefit of society with fast and ...
Jauharoh A. +3 more
doaj
The Horcrux Protocol: A Method for Decentralized Biometric-based Self-sovereign Identity
Most user authentication methods and identity proving systems rely on a centralized database. Such information storage presents a single point of compromise from a security perspective.
Callahan, John, Othman, Asem
core +1 more source
Bioprinting Organs—Science or Fiction?—A Review From Students to Students
Bioprinting artificial organs has the potential to revolutionize the medical field. This is a comprehensive review of the bioprinting workflow delving into the latest advancements in bioinks, materials and bioprinting techniques, exploring the critical stages of tissue maturation and functionality.
Nicoletta Murenu +18 more
wiley +1 more source
A Privacy Preserving Framework for RFID Based Healthcare Systems [PDF]
RFID (Radio Frequency IDentification) is anticipated to be a core technology that will be used in many practical applications of our life in near future. It has received considerable attention within the healthcare for almost a decade now. The technology’
Ahamed, Sheikh Iqbal +2 more
core +1 more source
This work presents a novel, dynamically perfused, configurable microfluidic system for epidermis‐only (E and full‐thickness skin (FT SoC) growth, emulating human skin structure and barrier function. Upon TiO2 nanoparticle exposure, the system reveals compromised barrier integrity, reduced metabolic activity, increased permeability, and chemokine‐driven
Samantha Costa +7 more
wiley +1 more source
On Practical Issues of Electric Network Frequency Based Audio Forensics
The transmission frequency of power grids, i.e., electric network frequency (ENF), has become a common criterion to authenticate audio recordings during the past decade, drawing much attention from both the academic researchers and law enforcement ...
Guang Hua +2 more
doaj +1 more source
Algorithm design for grip-pattern verification in smart gun [PDF]
The Secure Grip project1 focuses on the development of a hand-grip pattern recognition system, as part of the smart gun. Its target customer is the police. To explore the authentication performance of this system, we collected data from a group of police
Bazen, A.M. +3 more
core +2 more sources
Authentic Assessment - The Right Choice for Students Studying Law?
Law students benefit from authentic assessment. This was the clear result from a small study of the experiences of 16 law students in a new course where an assessment required them to write a research submission to a real entity. Students gained experience in undertaking a real-life task and the results were overwhelmingly positive and strongly in ...
openaire +2 more sources
The pyrogallol‐conjugated carboxymethylcellulose (CMC‐PG) hydrogel is applicated as a filler for the treatment of presbylaryngis, a vocal fold atrophy. CMC‐PG provides a bulking effect to the vocal folds. CMC‐PG is readily injectable and tissue adhesive, enabling sustained release of growth factor over long period.
Jihoon Jeon +7 more
wiley +1 more source
Authentic Interpretation of the Constitution in the Croatian Parliamentary Law
Having in mind that the authentic interpretation is an interpretation of a legal norm that, due to its ambiguity or misinterpretation in practice, is provided by the same body that enacted it, the paper examines whether Croatian parliamentary law empowers the Croatian Parliament, as a constitution-maker, for giving an authentic interpretation of the ...
openaire +2 more sources

