Intelligent Operator‐Independent Flexibility in Robotic Non‐Destructive Evaluation
Non‐destructive evaluation of high‐value components remains a manufacturing bottleneck due to rigid robotic calibration and fixturing. This study presents a flexible, adaptable system integrating 3D vision and force‐position control with a collaborative KUKA LBR robot. The geometry‐agnostic system enables pose‐independent ultrasonic inspection, detects
Amine Hifi +11 more
wiley +1 more source
Exploring the links between Large Igneous Provinces and dramatic environmental impact
An emerging consensus suggests that Large Igneous Provinces (LIPs) and Silicic LIPs (SLIPs) are a significant driver of dramatic global environmental and biological changes, including mass extinctions.
Benjamin Black +4 more
wiley +1 more source
ABSTRACT Mobile money—a digital financial service—has proliferated in many developing countries. Owing to its ability to reduce transaction costs and allow even the poor to be financially included, it has been widely adopted. While a growing body of literature has examined its welfare effects, its effects on diet quality of households and individuals ...
Francis E. Ndip +1 more
wiley +1 more source
IDENTITAS JEMAAH AHMADIYAH INDONESIA DALAM KONTEKS MULTIKULTURAL
Jemaah Ahmadiyah Indonesia (JAI) is known as a group on behalf of themselves as part of Islam adherents, however, their acceptance as part of Islam become an issue led to the creation of conflict.
Flavius Floris Andries +2 more
doaj +1 more source
No App, No Entry: Conceptualizing Digital Technology Captivity in Service Access
ABSTRACT We introduce Digital Technology Captivity (DTC), a form of consumer vulnerability that arises when digital technologies become the mandatory gateway to essential services. When access is tied to systems that feel unfamiliar, complex, or intimidating—and when preferred alternatives are limited—consumers may experience heightened vulnerability ...
Carolyn Wilson‐Nash +4 more
wiley +1 more source
Embedded Eavesdropping on Java Card [PDF]
In this article we present the first Combined Attack on a Java Card targeting the APDU buffer itself, thus threatening both the security of the platform and of the hosted applications as well as the privacy of the cardholder. We show that such an attack, which combines malicious application and fault injection, is achievable in practice on the latest ...
Guillaume Barbu +2 more
openaire +1 more source
Testing a Java Card applet using the LIME Interface Test Bench : a case study [PDF]
The LIME Interface Test Bench is a collection of tools that allow to compile programs in a way such that they monitor interface specifications at runtime in Java and C programs. Specifications can be made using the LIME specification language.
Kindermann, Roland
core
Formal Verification of Security Protocol Implementations: A Survey [PDF]
Automated formal verification of security protocols has been mostly focused on analyzing high-level abstract models which, however, are significantly different from real protocol implementations written in programming languages.
A Bauer +27 more
core +3 more sources
Wild meat consumption in changing rural landscapes of Indonesian Borneo
Abstract Wild meat can play a crucial role in the food system of rural communities residing near tropical forests. Yet, socio‐ecological changes across tropical landscapes are impacting the patterns and sustainability of meat consumption. To understand the prevalence, frequency and drivers of wild meat, domestic meat and fish consumption in this ...
Katie L. Spencer +12 more
wiley +1 more source
Household Expenditure for Java in Health Costs Compared to The Island Java
The Health funding is a key element in the health system in various countries. This study aims to determine the cost of household expenditure on health in Indonesia.
Wira Iqbal +2 more
doaj +1 more source

