Showing 101 - 120 results of 7,187 for search '"Copy protection', query time: 0.19s Refine Results
  1. 101

    Color Image Watermarking For Copyright Protection by Chua, Tiong Kin

    Published 2005
    “…Watermarking is an effective and potential method for copyright protection in digital audio, image and video data. …”
    Get full text
    Monograph
  2. 102
  3. 103

    Generation of a restriction minus enteropathogenic <it>Escherichia coli </it>E2348/69 strain that is efficiently transformed with large, low copy plasmids by Ward Jordan D, Price Nancy L, Hobson Neil, Raivio Tracy L

    Published 2008-08-01
    “…<p>Abstract</p> <p>Background</p> <p>Many microbes possess restriction-modification systems that protect them from parasitic DNA molecules. Unfortunately, the presence of a restriction-modification system in a given microbe also hampers genetic analysis. …”
    Get full text
    Article
  4. 104
  5. 105

    The protection of copyright in the development of new digital technologies by A. Seralieva, Z. Baimagambetova, A. Aronov

    Published 2018-10-01
    “…By considering a current situation, the author raises a legal question whether a legal framework for the protection of the copyright is effective or not. To answer for the question, the author shows some problems which have been emerged around copyright such as file sharing, illicit copying and piracy and refers to a number of cases which based on Anglo-American legal system. …”
    Get full text
    Article
  6. 106

    Avatar legal protection as an atypical copyright object by V. A. Kroitor

    Published 2023-09-01
    “…The legal protection of an avatar as an atypical copyright object has been investigated. …”
    Get full text
    Article
  7. 107

    DATA PROTECTION TECHNOLOGIES IN THE DISTANCE LEARNING SYSTEMS by Inna V. Herasymenko

    Published 2015-06-01
    “…Different security tools such as hardware, software, transformation security and organizational protection are considered. There are analyzed key places that require protection and suggested possible options for their protection, such as the use of CAPTCHA for registration, protection for the IP-address and service of copy protection. …”
    Get full text
    Article
  8. 108

    Fine-grain watermarking for intellectual property protection by Stefano Giovanni Rizzo, Flavio Bertini, Danilo Montesi

    Published 2019-07-01
    “…We evaluate and compare the robustness against common attacks, and we propose a new measure for partial copy and paste robustness. The results show the effectiveness of our approach providing an average length of 101 characters needed to embed the watermark and allowing to protect paragraph-long excerpt or smaller the 94.5% of the times.…”
    Get full text
    Article
  9. 109
  10. 110

    Image orientation watermarking technique for copyright protection by Jasim, Hend Muslim

    Published 2016
    “…Image copyright protection utilizes watermarking as one of the Digital Right Management techniques to protect digital images. …”
    Get full text
    Thesis
  11. 111

    Protection of Personal Information in Medical Journal Publications by Sun Huh

    Published 2019-03-01
    “…It aimed to present the definition of personal information based on Korean laws that protect personal information and the process of protection of personal information in journal publishing based on the guidelines of the International Committee of Medical Journal Editors and Committee of Publication Ethics. …”
    Get full text
    Article
  12. 112
  13. 113

    Intracerebral haemorrhage in down syndrome: protected or predisposed? by Buss, Lewis, Fisher, Elizabeth, Hardy, John, Nizetic, Dean, Groet, Jurgen, Pulford, Laura, Strydom, André

    Published 2018
    “…The amyloid precursor protein (APP) gene lies on chromosome 21 and its presence in three copies in DS is thought to largely drive the early onset AD. …”
    Get full text
    Get full text
    Journal Article
  14. 114

    CRIMINAL LAW PROTECTION OF DATABASE AT A GLANCE by LUCIAN T. POENARU

    Published 2012-05-01
    “…According to the law, it is considered to be a crime making available to the public, by any means, the special rights attributed to database owners or copies thereof. This paper will focus on, one hand, presenting the way database and database related products can be subject to a copyright general protection and, on the other, revealing the special sui generis right attributed to database owners. …”
    Get full text
    Article
  15. 115

    Television formats as (un)protected intellectual goods by Popović Dušan V.

    Published 2014-01-01
    “…The author concludes that certain elements of TV formats may enjoy copyright protection, while excluding such protection to the programme concept itself. …”
    Get full text
    Article
  16. 116

    Investigating the role of mitochondrial DNA D-loop variants, haplotypes, and copy number in polycystic ovary syndrome: implications for clinical phenotypes in the Chinese populatio... by Yang Chen, Yang Chen, Wei-jia Wu, Li-wei Xing, Xiao-juan Zhang, Jing Wang, Xiao-yan Xia, Rui Zhao, Rong Zhao, Rong Zhao

    Published 2023-09-01
    “…Moreover, a significant difference in mtDNA copy number was detected, with controls averaging 25.87 (21.84, 34.81), while PCOS patients had a mean of 129.91 (99.38, 168.63).ConclusionCertain mtDNA D-loop mutations and haplotypes appear to confer protection against PCOS in Chinese women. …”
    Get full text
    Article
  17. 117
  18. 118

    Compiler protection techniques against software vulnerabilities exploitation by A. R. Nurmukhametov, Sh. F. Kurmangaleev, V. V. Kaushan, S. S. Gaissaryan

    Published 2018-10-01
    “…After downloading of the binary copy attacker can create ROP-exploit for this copy but it would not be exploitable for another application copy. …”
    Get full text
    Article
  19. 119
  20. 120