Results 101 to 110 of about 5,949,154 (313)
Cognitive Hacking and Digital Government: Digital Identity [PDF]
Recently the National Center for Digital Government held a workshop on "The Virtual Citizen: Identity, Autonomy, and Accountability: A Civic Scenario Exploration of the Role of Identity in On-Line.
Paul Thompson
doaj
Computer security incident response teams: are they legally regulated? The Swiss example. [PDF]
Meyer P, Métille S.
europepmc +1 more source
Using computer vision in security applications [PDF]
In this paper we present projects developed in the Computer Vision Laboratory, which address the issue of safety. First, we present the Internet Video Server (IVS) monitoring system [5] that sends live video stream over the Internet and enables remote ...
Batagelj, Borut +2 more
core
The documentation of component manufacture has become an essential part of today's production processes, especially for the analysis and optimization of production or component design with regard to structural performance, economic efficiency, and sustainability.
Björn Denker +4 more
wiley +1 more source
When all computers shut down: the clinical impact of a major cyber-attack on a general hospital
ImportanceHealthcare organizations operate in a data-rich environment and depend on digital computerized systems; thus, they may be exposed to cyber threats. Indeed, one of the most vulnerable sectors to hacks and malware is healthcare.
Benyamine Abbou +17 more
doaj +1 more source
SPAN security policies and guidelines [PDF]
A guide is provided to system security with emphasis on requirements and guidelines that are necessary to maintain an acceptable level of security on the network. To have security for the network, each node on the network must be secure.
Green, James L., Sisson, Patricia L.
core +1 more source
This study elucidates the mechanism of compressible flow exfoliation for producing 2D hexagonal boron nitride (h‐BN). Fluid dynamics analysis reveals that acceleration‐driven aerodynamic shear forces, rather than shock waves alone, drive effective layer separation.
Md Farhadul Islam +3 more
wiley +1 more source
Evaluation of computer ethics: confirmatory factor models using PROC CALIS [PDF]
The computer is considered one of the most essential technological advances and has become an everyday tool. Many tertiary institutions have become heavily dependent on computers, Internet and informations systems for educational purpose.
Ismail, Zuraini, Masrom, Maslin
core
3D‐Printed Giant Magnetoresistive (GMR) Sensors Based on Self Compliant Springs
This work explores 3D‐printed GMR sensors utilizing self‐compliant spring structures and conductive PLA composites. By optimizing arm width, we achieved high piezoresistive (0.34%/mm) and magnetoresistive (0.77%/mT) sensitivities. Demonstrated through Bluetooth‐integrated pressure and magnetic position sensing, these full printed low‐cost, customizable
Josu Fernández Maestu +4 more
wiley +1 more source
Phase‐changing liquids enable untethered pneumatic actuation in soft robotics but suffer from volatility and storage challenges. This work reports a simple method to encapsulate Novec 7000 within micron‐thin alginate shells via in situ injection and ionic crosslinking.
Rayan A. M. Basodan +3 more
wiley +1 more source

