Results 91 to 100 of about 258,635 (295)
Usage Of Smart Card E-Payment In Public Transportation And Other Enterprises. An Empirical Study In Penang [PDF]
Kad pintar hari ini digunakan di seluruh dunia sebagai kad pengenalan peribadi untuk akses komputer peribadi peralatan kawalan dan sistem keselamatan bangunan korporat. Today smart cards are used all over the world as personal identification cards for
Liew, Choy Foon
core
Abstract Background Violence against women remains a serious public health problem and a violation of human rights that affects women's health. Healthcare providers play a fundamental role in preventing and responding to violence against women and girls.
Odette del Risco Sánchez +4 more
wiley +1 more source
Ohio Can Design a Leading Prepaid Debit Card for State Tax Refunds: New Approach Can Save Millions, Help Under-Banked Families [PDF]
Over the last few years, state governments have begun issuing prepaid debit cards rather than paper checks for government payments to individuals. Unemployment compensation, supplemental food assistance (referred to as SNAP or food stamps), and most ...
David Rothstein
core
Lead‐free inorganic halide perovskites enable resistive switching synaptic devices capable of mimicking biological learning and multimodal information processing, offering a promising platform for next‐generation neuromorphic computing and artificial intelligence hardware. Abstract Inorganic halide perovskites (IHPs) have emerged as promising materials
Subhasish Chanda +7 more
wiley +1 more source
Money in the twenty-first century. [PDF]
What implications do 21st century monetary innovations bring for holdings of central bank money and standards of value? Emerging technologies such as cybercash, e-cash, and smart cards can be expected to reduce demand for central bank money, but the ...
Edward J. Stevens, Jerry L. Jordan
core
Farmer‐Led Strategies for Water Conservation in the Urmia Lake Basin, Iran
ABSTRACT This study examines the urgent issues of water scarcity and limited farmer livelihoods in the Urmia Lake basin. To address these challenges, we apply the Governance, Autonomy, Integration, and Needs orientation (GAIN) methodology. Our participatory approach revealed that farmers prioritised actionable measures for water management, yield ...
Sina Besharat +20 more
wiley +1 more source
Adição de funções de criptografia simétrica em um applet de código aberto com suporte via middleware OpenSC [PDF]
TCC(graduação) - Universidade Federal de Santa Catarina. Centro Tecnológico. Ciências da Computação.O sigilo dos dados é um dos principais pilares da segurança em computação.
da Palma, Lucas Machado +1 more
core
ABSTRACT Introduction Technology plays a dual role in adolescents' lives, offering valuable avenues for social engagement and support while also introducing risks of social comparison, harassment, and loneliness. Qualitative data that centers on adolescent voices and contexts can illuminate the interplay of these protective and risk factors.
Xiaoqi Ma +5 more
wiley +1 more source
CO-TSM: A Flexible Model for Secure Embedded Device Ownership and Management
The Consumer-Oriented Trusted Service Manager (CO-TSM) model has been recognised as a significant advancement in managing applications on Near Field Communication (NFC)-enabled mobile devices and multi-application smart cards. Traditional Trusted Service
Konstantinos Markantonakis +5 more
doaj +1 more source
Robust Fourier Watermarking for ID Images on Smart Card Plastic Supports
Security checking can be improved by watermarking identity (ID) images printed on smart cards plastic supports. The major challenge is resistance to attacks: printing the images on the plastic cards, durability and other attacks then scanning the image
RIAD, R. +4 more
doaj +1 more source

