Showing 861 - 880 results of 1,197 for search '"counterfeit"', query time: 0.08s Refine Results
  1. 861

    Non-Contact Heart Rate Detection Based on Hand Vein Transillumination Imaging by Shuqiang Yang, Deqiang Cheng, Jun Wang, Huafeng Qin, Yike Liu

    Published 2021-09-01
    “…Although this has high anti-counterfeiting performance, it is possible to fabricate artificial hands that simulate vein characteristics to deceive the identity authentication system. …”
    Get full text
    Article
  2. 862

    A Green Analytical Method Combined with Chemometrics for Traceability of Tomato Sauce Based on Colloidal and Volatile Fingerprinting by Alessandro Zappi, Valentina Marassi, Nicholas Kassouf, Stefano Giordani, Gaia Pasqualucci, Davide Garbini, Barbara Roda, Andrea Zattoni, Pierluigi Reschiglian, Dora Melucci

    Published 2022-08-01
    “…Despite standards regulating the production of tomato derivatives, the market suffers frpm fraud such as product adulteration, origin mislabelling and counterfeiting. Methods suitable to discriminate the geographical origin of food samples and identify counterfeits are required. …”
    Get full text
    Article
  3. 863

    Multiple Energy Transfer Channels in Rare Earth Doped Multi‐Exciton Emissive Perovskites by Huwei Li, Kai Han, Zheyu Li, Hongxia Yue, Xinyu Fu, Xinyu Wang, Zhiguo Xia, Shuyan Song, Jing Feng, Hongjie Zhang

    Published 2024-03-01
    “…This work provides new insight for investigating the ET efficiency among multiple ET processes and presents great potentiality of multi‐exciton emissive perovskites in the fields of anti‐counterfeiting and X‐ray imaging.…”
    Get full text
    Article
  4. 864

    Research on Preparation of Three-Component Composite Fiber with Complex Cross-Sectional Pattern by Ronggen Zhang, Pei Feng, Chongchang Yang

    Published 2022-05-01
    “…Moreover, the fibers with complex cross-sectional patterns obtained by this method have a certain anti-counterfeiting effect and can also be blended with other yarns to obtain fabrics with anti-counterfeiting effects.…”
    Get full text
    Article
  5. 865

    Blockchain and its applications by Gao, Siyu

    Published 2024
    “…Amidst the rapid expansion of the e-commerce industry, counterfeits emerge as a significant threat to brands by causing revenue losses and damage to reputations, ultimately weakening trust between businesses and consumers. …”
    Get full text
    Final Year Project (FYP)
  6. 866

    Development and validation of a two-step assay for differentiation of Penis et testis cervi from cervi nippon Temmink and cervi elaphus Linnaeus based on specific-species polymeras... by Tong Zhou, Peiyao Li, Ying Zhang, Nan Wu, Yutong Zhang, Yangyang Li, Jinxia Ai, Mingcheng Li

    Published 2023-12-01
    “…Species-specific PCR reactions were optimized to differentiate authentic Sika deer and Red deer Penis et testis cervi from their counterfeits or adulterants. PCR-RFLP using single restriction enzyme Hpy188III was performed in Cyt b regions to identify the species of Sika deer and Red deer. …”
    Get full text
    Article
  7. 867

    Optical and magnetic properties of PAA@Fe nanocomposite films by Jing-jing Zhang, Xue Hou, Li-hu Liu, Hui-yuan Sun

    Published 2013-07-01
    “…PAA@Fe films can be used in many areas including decoration, display and multifunctional anti-counterfeiting applications.…”
    Get full text
    Article
  8. 868

    Panoptic brand protection? Algorithmic ascendancy in online marketplaces by Gangjee, DS

    Published 2024
    “…Leading online marketplaces including Amazon, eBay, and the Alibaba group, have embraced proactive automated content recognition (ACR) filters, to detect counterfeits that infringe trade mark rights. However, there has been a recent shift from explainable, rules-based filters to more opaque, machine-learning-powered technology. …”
    Journal article
  9. 869

    Perlindungan undang-undang harta intelek cap dagangan di Malaysia dan Indonesia by Ahmad Shamsul Abd Aziz

    Published 2005
    “…Legal protection on it is vital especially in order to determine who is the lawful owner of it and to prevent growth in counterfeiting activities. The most apparent difference with regards to protection provided by laws in Malaysia and Indonesia is the need for registration. …”
    Article
  10. 870

    KEDUDUKAN HUKUM MINUTA AKTA NOTARIS DALAM TINDAK PIDANA PEMALSUAN DI KOTA PADANG by , Fakhlisa Hesti, , Sigid Riyanto, SH, M.si.

    Published 2012
    “…The purpose of this study was to determine the basis for consideration minuta Notary deed can be used as evidence in a criminal case, to find out how making procedures minuta Deed as evidence in a criminal case, to know the constraints the police investigators in solving the crime of counterfeiting minuta contained in the Notary deed. Research conducted is sociological empirical research, that is/was done against the issues having regard to the legal norms and legislation as well as the opinion of experts with regard to theoretical concepts to next viewed its application in field, how data collection is carried out by research field which use guidelines interviews and research library use studies documents. …”
    Thesis
  11. 871

    The factor of lend-lease by N. I. Ryzhkov

    Published 2015-06-01
    “…70 years after the end of World War II there is ongoing debate on the exact role of lendlease in the victory of the USSR, moreover, many Russian and foreign authors use the story for the most unseemly purposes, trying to downplay the feat of the Soviet people, to devalue its victims unprecedented in human history. To confront counterfeiters, turning conscientious qualified research and publishing their results, is an important task for our historians and economists. …”
    Get full text
    Article
  12. 872

    PIXE and RES as a tool for the analysis of historic copper halfpennies by Abraham, M, Grime, G, Northover, J, Smith, C

    Published 1999
    “…RES and PIXE microbeam analysis is used to investigate the trace element concentrations as well as the surface corrosion of counterfeited copper halfpennies from the mid 18th century. …”
    Conference item
  13. 873

    Blockchain Technology for Secure Supply Chain Management: A Comprehensive Review by Udit Agarwal, Vinay Rishiwal, Sudeep Tanwar, Rashmi Chaudhary, Gulshan Sharma, Pitshou N. Bokoro, Ravi Sharma

    Published 2022-01-01
    “…Some major issues with present SCM systems are security, transactional transparency, traceability, stakeholder involvement, product counterfeiting, additional delays, fraud, and instabilities. …”
    Get full text
    Article
  14. 874

    Quantum Money from Hidden Subspaces by Aaronson, Scott, Christiano, Paul F.

    Published 2012
    “…We give the first private-key quantum money scheme that allows unlimited verifications and that remains unconditionally secure, even if the counterfeiter can interact adaptively with the bank. …”
    Get full text
    Get full text
    Article
  15. 875

    Harnessing multiplex PCR assay targeting specific mitochondrial DNA elements for simultaneous identification of antelope species in Cornu Saigae Tataricae by Yufei Chen, Yaya Yang, Yinhuan Qian, Roselyn Tehzee Gblinwon, Zhaoqun Jiao, Liqun Chen, Ling Lin, Yang Zheng, Huan Yang, Yuping Shen

    Published 2019-07-01
    “…When a mixture of antelope hornand fake species was assayed, it exhibited powerful differentiation capability. 5 out of 12 batches of commercialproducts were identified to be counterfeited or adulterated with Ovis aries Linnaeus and/or Capra hircus Linnaeus. …”
    Get full text
    Article
  16. 876

    Photoacoustic Laser System for Food Fraud Detection by Luca Fiorani, Florinda Artuso, Isabella Giardina, Antonia Lai, Simone Mannori, Adriana Puiu

    Published 2021-06-01
    “…Reliable techniques for the rapid screening of counterfeited ingredients in the supply chain need further development. …”
    Get full text
    Article
  17. 877

    Crypto and digital currencies- will governments allow these forms of new payments? by Ciel Man

    Published 2023-05-01
    “…It is no surprise that central banks are pursuing their own digital currency in order to boost the security of transactions and reduce counterfeiting. Throughout this paper, we are going to analyze and compare the market valuation of the ten most valuable cryptocurrencies and explain if it is possible that one of them could become a viable and widely used currency in the future. …”
    Get full text
    Article
  18. 878

    INTERNATIONAL MARKETING : ANALYSIS AND STRATEGY / by Onkvisit, Sak, author 432503, Shaw, John J., author 432524

    Published 1997
    “…There are also in depth discussions of topics such as marketing barriers, foreign exchange, physical distribution, documentation, bribery, counterfeiting, intellectual property, gray marketing, dumping, political risks, services, free-trade zones, countertrade, and more. …”
    text
  19. 879

    Magnetic Nanowires for Nanobarcoding and Beyond by Mohammad Reza Zamani Kouhpanji, Bethanie J. H. Stadler

    Published 2021-07-01
    “…Remote sensing of MNWs for authentication and/or anti-counterfeiting is not only limited to engineering their properties, but also requires reliable sensing and decoding platforms. …”
    Get full text
    Article
  20. 880

    Imperceptible of Watermarking in Digital Image Based Singular Value Decomposition by Cahyana, T. Basaruddin

    Published 2006-11-01
    “…Watermarking is a commonly used technique to protect digital image from unintended used such as counterfeiting. This paper will address one of the techniques to embed a watermark to digital image which is based on the singular value decomposition. …”
    Get full text
    Article