electronic storage
Recently Published Documents


TOTAL DOCUMENTS

65
(FIVE YEARS 18)

H-INDEX

5
(FIVE YEARS 2)

2021 ◽  
Author(s):  
Song Shiyong ◽  
Xing Yuxia

Abstract The management and legal protection of trade secrets is the common goal for all countres. Block Chain was found a huge advantage in protecting trade secrets as an advanced form of mathematical application. To better protect trade secrets for solutions, this study was to find out the legal risks faced with Block Chain. Basic theories of trade secrets and Block Chain were analyzed after reviewed literatures and empirical. The contemporary risks faced were put forward combined in practice. The better ways to protect trade secrets were discussed based on the current judicial practice of China. It was argued that problems of electronic storage and evidence collection of trade secrets would be solved Block Chain protection of trade secrets. Great risks and challenges would be confronted ahead albeit confirmed by the judiciary. It was concluded that a long time was dispensable for Block Chain managing and protecting trade secrets.


2021 ◽  
Author(s):  
Manikandan Dhayalan ◽  
Priadharsini Karikalan ◽  
Mohammed Riyaz Savaas Umar ◽  
Nalini Srinivasan

Nanotechnology is a branch of science and engineering dedicated to materials, having dimensions in the order of nanometer scale and it has been widely used for the development of more efficient technology. Nanoparticles offer many benefits to bulk particles such as increased surface-to-volume ratio, and increased magnetic properties. In recent years, nanotechnology has been embraced by industrial sectors due to its applications in the field of electronic storage systems, biotechnology, magnetic separation and pre concentration of target analytes, targeted drug delivery, and vehicles for gene and drug delivery. Over the year’s nanomaterials such as nanoparticles, nanoclusters, nanoreods, nanoshells, and nanocages have been continuously used and modified to enable their use as a diagnostic and therapeutic agent in biomedical applications. Thus, In this chapter, introduction to metal nanoparticles, synthesis (Chemical and green synthesis) and biomedical application silver nanoparticles are presented.


PLoS ONE ◽  
2021 ◽  
Vol 16 (7) ◽  
pp. e0255376
Author(s):  
Li Xiaoru ◽  
Guo Ling

The development of information technology has produced massive amounts of data, which has brought severe challenges to information storage. Traditional electronic storage media cannot keep up with the ever-increasing demand for data storage, but in its place DNA has emerged as a feasible storage medium with high density, large storage capacity and strong durability. In DNA data storage, many different approaches can be used to encode data into codewords. DNA coding is a key step in DNA storage and can directly affect storage performance and data integrity. However, since errors are prone to occur in DNA synthesis and sequencing, and non-specific hybridization is prone to occur in the solution, how to effectively encode DNA has become an urgent problem to be solved. In this article, we propose a DNA storage coding method based on the equilibrium optimization random search (EORS) algorithm, which meets the Hamming distance, GC content and no-runlength constraints and can reduce the error rate in storage. Simulation experiments have shown that the size of the DNA storage code set constructed by the EORS algorithm that meets the combination constraints has increased by an average of 11% compared with previous work. The increase in the code set means that shorter DNA chains can be used to store more data.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Christoph Wronka

Purpose The aim of this paper is to assess the relevance of cryptocurrencies with regard to the money laundering risk on the market and to present widespread money laundering techniques and recognizable patterns of abuse. In addition, this paper aims to find an answer to the question to what extent the measures of the fifth EU Anti-Money Laundering Directive (AMLD) as well as other appropriate preventive measures are sufficient to reduce the money laundering risk in the area of virtual currencies (VC). Design/methodology/approach Firstly, the analysis requires a consideration of the theoretical foundations of money laundering methods, as well as a presentation of the technical foundations of cryptocurrencies and their ecosystem. Secondly, it is discussed to what extent VC are suitable for money laundering, which characteristics enable them to launder money and which new money laundering techniques result from this. In addition, a comparison of different money laundering risk classification is done in relation to VC from the perspective of different actors in the financial market. Findings Owing to their simple electronic storage and transferability, crypto assets pose a concrete risk of money laundering. Their inclusion in the fifth AMLD was therefore a necessary step by the European legislator. However, the question arises to whether the directive and the further preventive measures presented in this paper sufficiently fulfil the objective of reducing the money laundering risk in relation to VC. One positive aspect is the inclusion of the crypto custody business as a financial service in the German Banking Act. According to the definition in Section 1 (1a) sentence 2 no. 6, the offering of wallets is subject to authorization and the offering party becomes an obligated party within the meaning of the Germany Money Laundering Act. From a supervisory point of view, the new licensing requirement is very much welcomed, as the custody of private cryptographic keys entails considerable risks. However, non-custodian wallet providers who do not store the private keys of their users, are not covered. A closer analysis of the amending directive to the fourth EU AMLD reveals that other relevant players in the crypto market, such as mixer and tumbler services, are also not covered. Originality/value It is quite clear that cryptocurrencies and the blockchain technology will continue to accompany one in the coming years. Further credit institutions arising in the market exposed to the described risks will be seen. The paper will therefore present and evaluate possible risk reduction/options for anti-money laundering for new and existing financial institutions.


2021 ◽  
Vol 8 (1) ◽  
pp. 60
Author(s):  
Ngadino Ngadino

The notary protocol is a state archive that must be kept and guarded by a notary public. Due to security concerns, maintenance costs and the size of space required further electronic storage of notary protocols can be carried out. This legal research uses a normative juridical approach as a result of the absence of norms. The technique of using legal materials used is the card system technique. The results show that the notary protocol that is stored electronically is important to do considering the duties of a notary as a public official who has the task of searching for the public in the field of civil cases so that the state must make rules regarding the storage of notary electronic protocols in its arrangement with Cyber Notary. The mechanism is to use the transfer media in digital form or scanning. The strength of notary protocol evidence stored in the field of civil law only functions as a backup, not as an electronic one which has binding power because it does not meet the requirements for document authenticity as regulated in Article 1 paragraph. 7 of the Amendments to the Law on Notaries and Article 1868 of the Civil Code and in the field of criminal procedural law, namely that it can be evidence to show evidence that shows other evidence.


Author(s):  
D. Zaharov ◽  
YEkatyerina Kashtanova

This article discusses the features of ensuring electronic storage of personnel documents in an organization. Basic terms have been defined, such as an automated system for maintaining an archive of electronic document management, access rights, and electronic business. The procedure for recording an electronic personnel document per storage unit has been laid out. The types of documents that can be stored in electronic form are indicated. The procedure for storing an electronic personnel document is considered in detail. The process of ensuring information security of personnel documentation, as well as the procedure for submitting electronic documents at the request of authorized organizations or the application of employees, is considered. The procedure for access of officials to electronic personnel documents is considered separately.


Author(s):  
Robin S. McCutcheon

Imagining and creating new courses, or updating old courses, can be a fun project if the instructor possesses several crucial tools: a Franklin Planner-type calendar for time management control, a skeletal framework for the course, and a learning management system that facilitates several different modes of electronic storage. With careful planning, the course designer can create a fun and instructive course that benefits both student and instructor in a myriad of ways both during the semester and long after the term has ended.


Author(s):  
Adetola Kehinde

This chapter presents a holistic view of digital libraries and the role of digital librarians. Technological changes and the use of electronic storage and retrieval information systems have changed the way students and researchers are able to access, retrieve and use information. Key topics presented in the chapter include the concept of digitization, reasons for digitization, definitions of digital library, features of digital library, characteristics of digital libraries, advantages and disadvantages of digital library, collection development and content creation, digital librarianship, role of librarians in digital libraries, issues of concern to digital librarians, process of digitization of library resources, digital library components, and digital rights management.


2021 ◽  
Vol 192 ◽  
pp. 600-658

600Diplomatic relations — Diplomatic privileges and immunities — Inviolability of diplomatic correspondence and archives — Admissibility in courts of the receiving State of illegally obtained diplomatic documents — Document emanating from United States Embassy in United Kingdom — Document probably obtained unlawfully from United States electronic storage facilities in United States — Document already subject of public discussion — Whether United Kingdom court should treat as inadmissible — Vienna Convention on Diplomatic Relations, 1961, Articles 24 and 27Environment — Marine environment — Marine protected area (“MPA”) — Nature of MPA — Effect on rights of other States — Chagos Islands — Proclamation by United Kingdom of MPA around Islands — Rights of Mauritius — Fishing rights — Consultation exercise — Whether flawed because of failure to raise issue of fishing rightsHuman rights — Right of abode — Chagos Islands — Separation from Mauritius in 1965 — Removal of population — Policy of no resettlement on the Islands — Establishment of marine protected area — Whether actuated by desire to prevent resettlementTerritory — Colony — Dependency of colony — Separation of dependency from colony prior to independence of colony — Removal of population of dependency — The law of the United Kingdom


JURTEKSI ◽  
2020 ◽  
Vol 7 (1) ◽  
pp. 15-22
Author(s):  
Fandy Indra Pratama ◽  
Mustagfirin Mustagfirin ◽  
Ardian Fachreza

Abstract: Activities in the world of education and institutions are documents that must be documented which can be used as activity reports to the leadership. One such documentation is attendance documentation because attendance is sometimes very sensitive because it affects the prerequisites for further activities. Meanwhile, most attendance systems currently use conventional methods, namely printing attendance forms and participants taking notes on the form. After completion of the event, it is recorded in an electronic storage and the original sheet is archived. Meanwhile, universities and schools are required to be sensitive to technology so that they are not out of date. So the researchers proposed a presence system based on Scan Id QR Code based on Restful Web Service technology with the following process: (i) Schedule 1 time in advance; (ii) attendance by scanning the QR-Code ID to a scanner; (iii) Attendance monitoring. This proposed technology can be used for multi-platform and multi-event, so that to use this presence system, each agency can list its activities and its members. And as a member, you can do attendance by just scanning the QR-Code Id you have into a scanner. The development of this system uses the web engineering method because this method is appropriate for developing this system. So that the system is deemed capable of trimming the administration of the committee and minimizing the problem of data fraud and corruption.            Keywords: presence, qr-code, web engineering  Abstrak: Kegiatan pada dunia pendidikan dan instansi merupakan dokumen yang wajib didokumentasikan yang dapat digunakan sebagai laporan kegiatan ke pimpinan. Salah satu dokumentasi tersebut adalah dokumentasi presensi kehadiran karena presensi kehadiran terkadang sangat sensitif karena mempengaruhi prasyarat kegiatan selanjutnya. Sedangkan hampir besar sistem presensi saat ini menggunakan cara konvensional yaitu cetak formulir presensi dan peserta mencatat di formulir tersebut. Setelah selesai acara, dicatat di penyimpanan elektronik dan lembar aslinya diarsipkan. Sedangkan universitas dan sekolah dituntut peka terhadap teknologi agar tidak ketinggalan zaman. Sehingga peneliti mengusulkan sistem presensi berbasis dengan Scan Id qr-code berbasis teknologi Restful Web Service dengan proses sebagai berikut: (i) Jadwal 1 kali diawal; (ii) Presensi dengan cara scan Id qr-code ke mesin scanner; (iii) Pemantauan kehadiran. Teknologi yang diusulkan ini dapat digunakan untuk multi platform dan multi event, sehingga untuk menggunakan sistem presensi ini, setiap instansi dapat membuat daftar kegiatan dan anggotanya masing-masing. Serta sebagai anggota dapat melakukan presensi hanya melakukan scan Id qr-code yang dimiliki ke mesin scanner. Pengembangan sistem ini menggunakan metode web engineering karena metode tersebut tepat untuk mengembangkan sistem ini. Sehingga sistem tersebut dirasa mampu memangkas administrasi panitia dan memperkecil permasalahan kecurangan dan rusaknya data. Kata kunci: presensi, qr-code, web engineering


Sign in / Sign up

Export Citation Format

Share Document