Showing 1,121 - 1,140 results of 1,197 for search '"counterfeit"', query time: 0.10s Refine Results
  1. 1121

    Falsificazione di medicinali, criminalità organizzata e cooperazione internazionale by Anna G. Micara

    Published 2016-07-01
    “…Vengono perciò in rilievo l’applicabilità della Convenzione UNCTOC alla falsificazione dei medicinali, il modello di legislazione UNODC sulle medicine fraudolente e le ipotesi di elaborazione di uno strumento internazionale di più ampio respiro.   Counterfeiting of medicines is a threat to the whole international community and is deeply related to organised crime. …”
    Get full text
    Article
  2. 1122

    Blockchain and Higher Education Diplomas by Renato Q. Castro, Manuel Au-Yong-Oliveira

    Published 2021-02-01
    “…Due to added mobility and the increase in international students worldwide, as well as the current problem regarding the counterfeiting of diplomas and the selling of fraudulent certificates, we propose a technological solution. …”
    Get full text
    Article
  3. 1123

    Energy-Efficient Security Solutions for Next-Generation Embedded Systems by Maji, Saurav

    Published 2023
    “…Finally, this work delves into anti-counterfeiting in agriculture and develops an interdisciplinary solution that combines materials engineering and computer science. …”
    Get full text
    Thesis
  4. 1124
  5. 1125

    IDENTIFIKASI BENTUK-BENTUK PELANGGARAN MEREK TERKENAL (STUDI ATAS PUTUSAN PENGADILAN NIAGA SEMARANG) by , Bunga Meluni Hapsari, SH, , Prof. Dr. Nindyo Pramono, S.H., M.H.

    Published 2011
    “…Based on the results of studies have identified several forms of violations of trademarks in the case at the Commercial Court of Semarang is as follows: The practice of imitation trademarks, Trademark counterfeiting practices and deeds that may confuse the public regarding the nature and origin of the marks. …”
    Thesis
  6. 1126

    Identification of several fractions of patchouli alcohol from patchouli oil (Pogostemon cablin Benth.) using combination method of infrared spectroscopy and principal component ana... by Puji Astuti, Khairan, Marthoenis, Hasballah, Kartini

    Published 2022
    “…The quality of it must be maintained and strictly controlled to prevent counterfeiting. In this study, the patchouli oil sample used was Aceh patchouli oil of the Tapak Tuan variety, Indonesia. …”
    Get full text
    Article
  7. 1127

    Dynamic multicolor emissions of multimodal phosphors by Mn2+ trace doping in self-activated CaGa4O7 by Yiqian Tang, Yiyu Cai, Kunpeng Dou, Jianqing Chang, Wei Li, Shanshan Wang, Mingzi Sun, Bolong Huang, Xiaofeng Liu, Jianrong Qiu, Lei Zhou, Mingmei Wu, Jun-Cheng Zhang

    Published 2024-04-01
    “…Abstract The manipulation of excitation modes and resultant emission colors in luminescent materials holds pivotal importance for encrypting information in anti-counterfeiting applications. Despite considerable achievements in multimodal and multicolor luminescent materials, existing options generally suffer from static monocolor emission under fixed external stimulation, rendering them vulnerability to replication. …”
    Get full text
    Article
  8. 1128

    Single‐Cell‐Driven Tri‐Channel Encryption Meta‐Displays by Muhammad Qasim Mehmood, Junhwa Seong, Muhammad Ashar Naveed, Joohoon Kim, Muhammad Zubair, Kashif Riaz, Yehia Massoud, Junsuk Rho

    Published 2022-12-01
    “…Therefore, the proposed metasurface opens new avenues in multi‐functional meta‐devices design and has promising applications in anti‐counterfeiting, optical storage and displays.​…”
    Get full text
    Article
  9. 1129

    Dual Responsive Dependent Background Color Based on Thermochromic 1D Photonic Crystal Multilayer Films by Yejin Kim, Seo Hyun Kim, Henok Getachew Girma, Seungju Jeon, Bogyu Lim, Seo-Hyun Jung

    Published 2022-12-01
    “…The films can be applied as anti-counterfeiting labels and can be used for smart decoration films. …”
    Get full text
    Article
  10. 1130

    A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT by Carlos D. Morales-Molina, Aldo Hernandez-Suarez, Gabriel Sanchez-Perez, Linda K. Toscano-Medina, Hector Perez-Meana, Jesus Olivares-Mercado, Jose Portillo-Portillo, Victor Sanchez, Luis Javier Garcia-Villalba

    Published 2021-05-01
    “…Then, a Dense Neural Network (DNN) is trained to maximize deep feature engineering, with the aim of improving classification results to protect against malicious counterfeiting attempts.…”
    Get full text
    Article
  11. 1131

    CAPTIVE: Constrained Adversarial Perturbations to Thwart IC Reverse Engineering by Amir Hosein Afandizadeh Zargari, Marzieh AshrafiAmiri, Minjun Seo, Sai Manoj Pudukotai Dinakarrao, Mohammed E. Fouda, Fadi Kurdahi

    Published 2023-12-01
    “…In addition, RE also facilitates different illicit activities such as the insertion of hardware Trojan, pirating, or counterfeiting a design, or developing an attack. In this work, we propose an approach to introduce cognitive perturbations, with the aid of adversarial machine learning, to the IC layout that could prevent the RE process from succeeding. …”
    Get full text
    Article
  12. 1132

    Consumer acceptance of an innovative Bio-QR code traceability system for edible bird’s nest by Praparast Ausawanetmanee, Jakkrit Thavorn, Achara Chandrachai, Worasak Klongthong, Viwat Vchirawongwin, Sanong Ekgasit

    Published 2024-03-01
    “…Therefore, this study is associated with an innovative EBN traceability system using Bio-QR code to safeguard against counterfeiting and to guarantee EBN authenticity. The primary aim of the study was to examine consumer acceptance of the proposed Bio-QR code traceability system for EBN and to elucidate factors related to consumer intention by integrating the Technology Acceptance Model (TAM) and its extensions with Diffusion of Innovation (DOI) theory. …”
    Get full text
    Article
  13. 1133

    Upconversion Nanocomposite Materials With Designed Thermal Response for Optoelectronic Devices by Eduardo D. Martínez, Carlos D. S. Brites, Luís D. Carlos, Ricardo R. Urbano, Carlos Rettori, Carlos Rettori

    Published 2019-03-01
    “…Applications of upconversion materials are wide and cover diverse areas such as bio-imaging, solar cells, optical thermometry, displays, and anti-counterfeiting technologies, among others. When these materials are synthesized in the form of nanoparticles, the effect of temperature on the optical emissions depends critically on their size, creating new opportunities for innovation. …”
    Get full text
    Article
  14. 1134

    Molecular identification of species and production origins of edible bird's nest using FINS and SYBR green I based real-time PCR by Meei, Chien Quek, Nyuk, Ling Chin, Sheau, Wei Tan, Yusof, Yus Aniza, Chung, Lim Law

    Published 2018
    “…A rapid and cost-effective identification alternative of SYBR green I based real-time PCR assay targeting a 177 bp of the mitochondrial Cyt b gene was developed and it efficiently differentiated genuine EBN from counterfeits. This FINS and SYBR green I based real-time PCR are highly sensitive, specific and reliable methods for identification of EBN origins and could be useful for preventing fraud substitution and mislabelling of EBN to ensure food safety.…”
    Get full text
    Article
  15. 1135

    Rapid and Nondestructive Identification of Origin and Index Component Contents of Tiegun Yam Based on Hyperspectral Imaging and Chemometric Method by Yue Zhang, Yuan Li, Cong Zhou, Junhui Zhou, Tiegui Nan, Jian Yang, Luqi Huang

    Published 2023-01-01
    “…The quality and price of Tiegun yam are affected by its origin, and counterfeiting and adulteration are common. Therefore, it is necessary to establish a method to identify the origin and index component contents of Tiegun yam. …”
    Get full text
    Article
  16. 1136

    Use of blockchain technology as supply chain management system involving air transport by I. O. Poleshkina, N. V. Vasilyeva

    Published 2020-04-01
    “…Overall tracking and monitoring of a product from the moment of its production to the destination simplifies the identification of any counterfeits, improves the quality of food safety control. …”
    Get full text
    Article
  17. 1137

    A Survey of Trust Management in the Internet of Vehicles by Sarah Ali Siddiqui, Adnan Mahmood, Quan Z. Sheng, Hajime Suzuki, Wei Ni

    Published 2021-09-01
    “…Diverse domains have been taking advantage of trust management models in the quest of alleviating diverse insider attacks, wherein messages generated by legitimate users are altered or counterfeited by malicious entities, subsequently, endangering the lives of drivers, passengers, and vulnerable pedestrians. …”
    Get full text
    Article
  18. 1138

    ECG Biometrics Based on Attention Enhanced Domain Adaptive Feature Fusion Network by Pan Yi, Yujuan Si, Wei Fan, Yang Zhang

    Published 2024-01-01
    “…Biometric systems are highly regarded for their strong resistance to counterfeiting. Among various biometric features, ECG signals are difficult to falsify and are less attack-prone. …”
    Get full text
    Article
  19. 1139

    Trusted Traceability and Certification of Refurbished Medical Devices Using Dynamic Composable NFTs by Senay A. Gebreab, Khaled Salah, Raja Jayaraman, Jamal Zemerly

    Published 2023-01-01
    “…The repositioning of refurbished devices into the market, however, is accompanied by a number of challenges, including concerns about quality and safety, as well as the risk of fraudulent activities such as counterfeiting. To address these challenges, we propose an NFT-based solution for managing refurbished medical devices that creates a secure, transparent, and verifiable record of the refurbishment process to ensure the safety and quality of these devices. …”
    Get full text
    Article
  20. 1140

    Dynamic and efficient vehicular cloud management scheme with privacy protection by Min XIAO, Tao YAO, Yuanni LIU, Yonghong HUANG

    Published 2022-12-01
    “…The vehicular cloud (VC) formed by vehicles is used for localization processing and consumption of traffic sensing data to achieve timely intelligent traffic management.The vehicle cloud is highly dynamic, self-organizing and timely, in which the identity and location privacy of vehicle users need to be protected as this poses challenges to the vehicular cloud management.A dynamic and self-organizing vehicle cloud management scheme based on the asymmetric group key agreement protocol was designed, where the vehicle cloud is automatically formed through the self-organized group key agreement of vehicles.The group key was used to control the provision and access of vehicle cloud services, and the dynamic management of the vehicle cloud was implemented through group key update.The scheme used traceable one-time pseudonym technology to achieve anonymous authentication and conditional privacy protection of vehicle users, and the group key agreement stage only included one bilinear pair operation to achieve high efficiency.In addition, the key negotiation and update process used lightweight signatures, supporting batch verification, to achieve efficient message source authentication and integrity authentication.Then the security and efficiency of vehicle cloud communications in the self-organizing environment can be ensured.The dynamic key update mechanism of the key agreement protocol realized the dynamic joining or exiting of vehicles in the vehicle cloud, adapting to the dynamic characteristics of the vehicle cloud.Under the random oracle model and the difficult assumption of the inverse computational Diffie Hellman (ICDH) problem, it was proved that the asymmetric group key agreement scheme satisfied the selective-plaintext security.The security analysis shows that the scheme can protect the identity and location privacy of vehicle users, realize the legal tracking of malicious vehicles, and ensure the confidentiality, integrity and anti-counterfeiting of communications, as well as the forward security of vehicle cloud dynamic management.The performance comparison analysis shows that this scheme has certain advantages in communication and computing efficiency under the condition of the same function and security level.…”
    Get full text
    Article