Results 101 to 110 of about 5,949,154 (313)

Cognitive Hacking and Digital Government: Digital Identity [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2004
Recently the National Center for Digital Government held a workshop on "The Virtual Citizen: Identity, Autonomy, and Accountability: A Civic Scenario Exploration of the Role of Identity in On-Line.
Paul Thompson
doaj  

Using computer vision in security applications [PDF]

open access: yes, 2002
In this paper we present projects developed in the Computer Vision Laboratory, which address the issue of safety. First, we present the Internet Video Server (IVS) monitoring system [5] that sends live video stream over the Internet and enables remote ...
Batagelj, Borut   +2 more
core  

A Concept of a Digital and Traceable Manufacturing Documentation Based on Formalized Process Description Applied on Composite Aircraft Moveable

open access: yesAdvanced Engineering Materials, EarlyView.
The documentation of component manufacture has become an essential part of today's production processes, especially for the analysis and optimization of production or component design with regard to structural performance, economic efficiency, and sustainability.
Björn Denker   +4 more
wiley   +1 more source

When all computers shut down: the clinical impact of a major cyber-attack on a general hospital

open access: yesFrontiers in Digital Health
ImportanceHealthcare organizations operate in a data-rich environment and depend on digital computerized systems; thus, they may be exposed to cyber threats. Indeed, one of the most vulnerable sectors to hacks and malware is healthcare.
Benyamine Abbou   +17 more
doaj   +1 more source

SPAN security policies and guidelines [PDF]

open access: yes
A guide is provided to system security with emphasis on requirements and guidelines that are necessary to maintain an acceptable level of security on the network. To have security for the network, each node on the network must be secure.
Green, James L., Sisson, Patricia L.
core   +1 more source

Compressible Flow Exfoliation of Two‐Dimensional Nanomaterials: Insights Into Layer Separation Informed by Gas Dynamics

open access: yesAdvanced Engineering Materials, EarlyView.
This study elucidates the mechanism of compressible flow exfoliation for producing 2D hexagonal boron nitride (h‐BN). Fluid dynamics analysis reveals that acceleration‐driven aerodynamic shear forces, rather than shock waves alone, drive effective layer separation.
Md Farhadul Islam   +3 more
wiley   +1 more source

Evaluation of computer ethics: confirmatory factor models using PROC CALIS [PDF]

open access: yes, 2008
The computer is considered one of the most essential technological advances and has become an everyday tool. Many tertiary institutions have become heavily dependent on computers, Internet and informations systems for educational purpose.
Ismail, Zuraini, Masrom, Maslin
core  

3D‐Printed Giant Magnetoresistive (GMR) Sensors Based on Self Compliant Springs

open access: yesAdvanced Engineering Materials, EarlyView.
This work explores 3D‐printed GMR sensors utilizing self‐compliant spring structures and conductive PLA composites. By optimizing arm width, we achieved high piezoresistive (0.34%/mm) and magnetoresistive (0.77%/mT) sensitivities. Demonstrated through Bluetooth‐integrated pressure and magnetic position sensing, these full printed low‐cost, customizable
Josu Fernández Maestu   +4 more
wiley   +1 more source

On‐Demand Activation of Thin Alginate Shell Encapsulated Volatile Liquid for Untethered Pneumatic Soft Actuation

open access: yesAdvanced Engineering Materials, EarlyView.
Phase‐changing liquids enable untethered pneumatic actuation in soft robotics but suffer from volatility and storage challenges. This work reports a simple method to encapsulate Novec 7000 within micron‐thin alginate shells via in situ injection and ionic crosslinking.
Rayan A. M. Basodan   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy