Results 41 to 50 of about 3,663 (177)

Forensic Analysis of Fountain Pen Calligraphy–II. Real Evidence Analysis at the Public Prosecutor's Office

open access: yesX-Ray Spectrometry, EarlyView.
ABSTRACT The present study is a report of the real forensic analysis of characters written by fountain pen(s) on two sheets of paper. One sheet is the calligraphy written by the victim of the Sayama incident. The other is number characters written with a fountain pen found on the lintel of the suspect's house.
Jun Kawai   +2 more
wiley   +1 more source

Development of a Bluetooth-Based Contactless Automated Attendance Capture System for Large Halls and Auditoriums [PDF]

open access: yes, 2015
The g Attendance capture for large populations still remains a challenge for organizations such as Schools, Universities and Event organizers.
Idachaba, F.E., Oni, O.O.
core  

Watch Me, but Don't Touch Me! Contactless Control Flow Monitoring via Electromagnetic Emanations

open access: yes, 2017
Trustworthy operation of industrial control systems depends on secure and real-time code execution on the embedded programmable logic controllers (PLCs).
Etigowni, Sriharsha   +4 more
core   +1 more source

Emergent Freestanding Complex Oxide Membranes for Multifunctional Applications

open access: yesAdvanced Materials, Volume 38, Issue 16, 17 March 2026.
This review surveys freestanding oxide membranes and covers fabrication and three pathways for studies and devices: strain‐free and strained membranes, and van der Waals‐integrated heterostructures. We show how coupled oxide responses map onto these routes and cross‐couple to expand behaviors.
Baowen Li   +6 more
wiley   +1 more source

Analysis of the latest trends in mobile commerce using the NFC technology [PDF]

open access: yes, 2011
The aim of this research is to propose new mobile commerce proximity payment architecture, based on the analysis of existing solutions and current and future market needs.
Jovanovic, Mateja   +1 more
core   +2 more sources

A novel hand reconstruction approach and its application to vulnerability assessment [PDF]

open access: yes, 2014
This is the author’s version of a work that was accepted for publication in Information Sciences. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may ...
Ferrer, Miguel Ángel   +5 more
core   +2 more sources

Ionic–Bionic Interfaces: Advancing Iontronic Strategies for Bioelectronic Sensing and Therapy

open access: yesAdvanced Science, Volume 13, Issue 16, 18 March 2026.
Ionic–bionic interfaces for bioelectronics leverage ions as multifunctional mediators that combine mechanical compliance, ionic and electronic functionalities, and therapeutic effects. These systems offer real‐time biosignal transduction, effective wound dressing, responsive drug delivery, and seamless interaction between soft tissues and electronic ...
Yun Goo Ro   +6 more
wiley   +1 more source

Fingerprinting of Nitroaromatic Explosives Realized by Aphen-functionalized Titanium Dioxide

open access: yesSensors, 2019
Developing sensing materials for military explosives and improvised explosive precursors is of great significance to maintaining homeland security.
Guanshun Xie, Bingxin Liu
doaj   +1 more source

IEDs on the Road to Fingerprint Authentication : Biometrics have vulnerabilities that PINs and passwords don't [PDF]

open access: yes, 2016
Almost every 2016 flagship mobile phone, whether Android or iOS-based, is set to come with an integrated fingerprint reader. The convenience benefits of fingerprint readers are clear to users, but is the underlying technology really ready for widespread ...
Irvine, James, Paul, Greig
core   +1 more source

Multi-factor Authentication and Their Approaches [PDF]

open access: yes, 2017
A multi-factor authentication is an approach to authentication which requires the presentation of two or more of the three authentication factors: a knowledge factor ("something the user knows"), a possession factor ("something the user has"), and an ...
Singh, S. (Saroj)
core   +1 more source

Home - About - Disclaimer - Privacy