-
861
Non-Contact Heart Rate Detection Based on Hand Vein Transillumination Imaging
Published 2021-09-01“…Although this has high anti-counterfeiting performance, it is possible to fabricate artificial hands that simulate vein characteristics to deceive the identity authentication system. …”
Get full text
Article -
862
A Green Analytical Method Combined with Chemometrics for Traceability of Tomato Sauce Based on Colloidal and Volatile Fingerprinting
Published 2022-08-01“…Despite standards regulating the production of tomato derivatives, the market suffers frpm fraud such as product adulteration, origin mislabelling and counterfeiting. Methods suitable to discriminate the geographical origin of food samples and identify counterfeits are required. …”
Get full text
Article -
863
Multiple Energy Transfer Channels in Rare Earth Doped Multi‐Exciton Emissive Perovskites
Published 2024-03-01“…This work provides new insight for investigating the ET efficiency among multiple ET processes and presents great potentiality of multi‐exciton emissive perovskites in the fields of anti‐counterfeiting and X‐ray imaging.…”
Get full text
Article -
864
Research on Preparation of Three-Component Composite Fiber with Complex Cross-Sectional Pattern
Published 2022-05-01“…Moreover, the fibers with complex cross-sectional patterns obtained by this method have a certain anti-counterfeiting effect and can also be blended with other yarns to obtain fabrics with anti-counterfeiting effects.…”
Get full text
Article -
865
Blockchain and its applications
Published 2024“…Amidst the rapid expansion of the e-commerce industry, counterfeits emerge as a significant threat to brands by causing revenue losses and damage to reputations, ultimately weakening trust between businesses and consumers. …”
Get full text
Final Year Project (FYP) -
866
Development and validation of a two-step assay for differentiation of Penis et testis cervi from cervi nippon Temmink and cervi elaphus Linnaeus based on specific-species polymeras...
Published 2023-12-01“…Species-specific PCR reactions were optimized to differentiate authentic Sika deer and Red deer Penis et testis cervi from their counterfeits or adulterants. PCR-RFLP using single restriction enzyme Hpy188III was performed in Cyt b regions to identify the species of Sika deer and Red deer. …”
Get full text
Article -
867
Optical and magnetic properties of PAA@Fe nanocomposite films
Published 2013-07-01“…PAA@Fe films can be used in many areas including decoration, display and multifunctional anti-counterfeiting applications.…”
Get full text
Article -
868
Panoptic brand protection? Algorithmic ascendancy in online marketplaces
Published 2024“…Leading online marketplaces including Amazon, eBay, and the Alibaba group, have embraced proactive automated content recognition (ACR) filters, to detect counterfeits that infringe trade mark rights. However, there has been a recent shift from explainable, rules-based filters to more opaque, machine-learning-powered technology. …”
Journal article -
869
Perlindungan undang-undang harta intelek cap dagangan di Malaysia dan Indonesia
Published 2005“…Legal protection on it is vital especially in order to determine who is the lawful owner of it and to prevent growth in counterfeiting activities. The most apparent difference with regards to protection provided by laws in Malaysia and Indonesia is the need for registration. …”
Article -
870
KEDUDUKAN HUKUM MINUTA AKTA NOTARIS DALAM TINDAK PIDANA PEMALSUAN DI KOTA PADANG
Published 2012“…The purpose of this study was to determine the basis for consideration minuta Notary deed can be used as evidence in a criminal case, to find out how making procedures minuta Deed as evidence in a criminal case, to know the constraints the police investigators in solving the crime of counterfeiting minuta contained in the Notary deed. Research conducted is sociological empirical research, that is/was done against the issues having regard to the legal norms and legislation as well as the opinion of experts with regard to theoretical concepts to next viewed its application in field, how data collection is carried out by research field which use guidelines interviews and research library use studies documents. …”
Thesis -
871
The factor of lend-lease
Published 2015-06-01“…70 years after the end of World War II there is ongoing debate on the exact role of lendlease in the victory of the USSR, moreover, many Russian and foreign authors use the story for the most unseemly purposes, trying to downplay the feat of the Soviet people, to devalue its victims unprecedented in human history. To confront counterfeiters, turning conscientious qualified research and publishing their results, is an important task for our historians and economists. …”
Get full text
Article -
872
PIXE and RES as a tool for the analysis of historic copper halfpennies
Published 1999“…RES and PIXE microbeam analysis is used to investigate the trace element concentrations as well as the surface corrosion of counterfeited copper halfpennies from the mid 18th century. …”
Conference item -
873
Blockchain Technology for Secure Supply Chain Management: A Comprehensive Review
Published 2022-01-01“…Some major issues with present SCM systems are security, transactional transparency, traceability, stakeholder involvement, product counterfeiting, additional delays, fraud, and instabilities. …”
Get full text
Article -
874
Quantum Money from Hidden Subspaces
Published 2012“…We give the first private-key quantum money scheme that allows unlimited verifications and that remains unconditionally secure, even if the counterfeiter can interact adaptively with the bank. …”
Get full text
Get full text
Article -
875
Harnessing multiplex PCR assay targeting specific mitochondrial DNA elements for simultaneous identification of antelope species in Cornu Saigae Tataricae
Published 2019-07-01“…When a mixture of antelope hornand fake species was assayed, it exhibited powerful differentiation capability. 5 out of 12 batches of commercialproducts were identified to be counterfeited or adulterated with Ovis aries Linnaeus and/or Capra hircus Linnaeus. …”
Get full text
Article -
876
Photoacoustic Laser System for Food Fraud Detection
Published 2021-06-01“…Reliable techniques for the rapid screening of counterfeited ingredients in the supply chain need further development. …”
Get full text
Article -
877
Crypto and digital currencies- will governments allow these forms of new payments?
Published 2023-05-01“…It is no surprise that central banks are pursuing their own digital currency in order to boost the security of transactions and reduce counterfeiting. Throughout this paper, we are going to analyze and compare the market valuation of the ten most valuable cryptocurrencies and explain if it is possible that one of them could become a viable and widely used currency in the future. …”
Get full text
Article -
878
INTERNATIONAL MARKETING : ANALYSIS AND STRATEGY /
Published 1997“…There are also in depth discussions of topics such as marketing barriers, foreign exchange, physical distribution, documentation, bribery, counterfeiting, intellectual property, gray marketing, dumping, political risks, services, free-trade zones, countertrade, and more. …”
text -
879
Magnetic Nanowires for Nanobarcoding and Beyond
Published 2021-07-01“…Remote sensing of MNWs for authentication and/or anti-counterfeiting is not only limited to engineering their properties, but also requires reliable sensing and decoding platforms. …”
Get full text
Article -
880
Imperceptible of Watermarking in Digital Image Based Singular Value Decomposition
Published 2006-11-01“…Watermarking is a commonly used technique to protect digital image from unintended used such as counterfeiting. This paper will address one of the techniques to embed a watermark to digital image which is based on the singular value decomposition. …”
Get full text
Article