Results 21 to 30 of about 1,740,915 (271)
The Significance of Computer Forensics in Electronic Documents as Evidence in Criminal Law
Forensic science standards, no crime never leaves traces. Along with the emergence of cybercrime, a new type of evidence emerged as an expansion of conventional evidence in Indonesian criminal procedural law, namely electronic evidence as stated in the ...
Aris Hardinanto +2 more
doaj +1 more source
New version of PLNoise: a package for exact numerical simulation of power-law noises [PDF]
In a recent paper I have introduced a package for the exact simulation of power-law noises and other colored noises (E. Milotti, Comput. Phys. Commun. {\bf 175} (2006) 212): in particular the algorithm generates $1/f^\alpha$ noises with $0 < \alpha \leq ...
Ahrens +25 more
core +3 more sources
This study evaluates and compares the suitability for child–computer interaction (CCI, the branch within human–computer interaction focused on interactive computer systems for children) of two devices: a standard computer mouse and the ENLAZA interface ...
Cristina Sanchez +5 more
doaj +1 more source
Electronic (computer-held) systematization of international law
Of vital importance is proper systematization of sources of law. Nowadays of more and more importance in the process of systematization of international law sources becomes the modern means o communication, analyzes, classification and search of ...
V. O. Petrov
doaj +1 more source
In the process of decision making, the probabilistic linguistic term set (PLTS) is a useful tool to express the evaluation information provided by decision makers (DMs).
Huimin Xiao, Shouwen Wu, Chunsheng Cui
doaj +1 more source
Recurrence and transience for the frog model on trees [PDF]
The frog model is a growing system of random walks where a particle is added whenever a new site is visited. A longstanding open question is how often the root is visited on the infinite $d$-ary tree.
Hoffman, Christopher +2 more
core +1 more source
Boundary-induced heterogeneous absorbing states [PDF]
We study two different types of systems with many absorbing states (with and without a conservation law) and scrutinize the effect of walls/boundaries (either absorbing or reflecting) into them.
Joaquín Marro +4 more
core +2 more sources
KOMPUTER JAKO NARZĘDZIE PRZESTĘPSTWA
The Computer as the Tool of the Crime Summary The article presented the classification of computer crimes on the basis of Polish criminal law and some issues concerning computer crime.
Maria Szczepaniec
doaj +1 more source
Time after time – circadian clocks through the lens of oscillator theory
Oscillator theory bridges physics and circadian biology. Damped oscillators require external drivers, while limit cycles emerge from delayed feedback and nonlinearities. Coupling enables tissue‐level coherence, and entrainment aligns internal clocks with environmental cues.
Marta del Olmo +2 more
wiley +1 more source
We developed and validated a DNA methylation–based biomarker panel to distinguish pleural mesothelioma from other pleural conditions. Using the IMPRESS technology, we translated this panel into a clinically applicable assay. The resulting two classifier models demonstrated excellent performance, achieving high AUC values and strong diagnostic accuracy.
Janah Vandenhoeck +12 more
wiley +1 more source

