-
1181
Application of flash GC e-nose and FT-NIR combined with deep learning algorithm in preventing age fraud and quality evaluation of pericarpium citri reticulatae
Published 2024-03-01“…Therefore, we did this study with the aim of establishing a rapid and nondestructive method to identify the counterfeiting of PCR storage year, so as to protect the legitimate rights and interests of consumers. …”
Get full text
Article -
1182
A Combined Non-Destructive and Micro-Destructive Approach to Solving the Forensic Problems in the Field of Cultural Heritage: Two Case Studies
Published 2021-07-01“…The present paper shows data from the non-destructive and micro-destructive analysis of different artworks and objects provided by the Cosenza Carabinieri Unit for the Protection of Cultural Heritage and Anti-Counterfeiting (Calabria, Italy). In particular, two oil paintings on canvas depicting cherubs (Italian: <i>putti</i>), recovered as fragments of larger religious artworks, and two bronze belt and helmet fragments were investigated. …”
Get full text
Article -
1183
Sequencing and analyses on chloroplast genomes of Tetrataenium candicans and two allies give new insights on structural variants, DNA barcoding and phylogeny in Apiaceae subfamily...
Published 2019-11-01“…Analyses on DNA polymorphism located 29 candidate cp DNA barcodes for the authentication of ‘Danggui’ counterfeits. Meanwhile, 34 hyper-variable markers were also located by the five Tordyliinae chloroplast genomes, and 11 of them were screened for population genetics of T. candicans based on plastome information from two individuals. …”
Get full text
Article -
1184
Specific Species DNA Amplification as a Halal Authentication Method in Sausage Based on Genetic Markers
Published 2023-10-01“…Sausage is a processed meat food that is susceptible to counterfeiting by mixing non-halal meat, so a valid, fast and cheap halal authentication method is needed for sausages. …”
Get full text
Article -
1185
La redevance pour copie privée, un exutoire à l’ère du numérique ?
Published 2022-08-01“…New information and communication technologies have paved the way for counterfeiting, downloading, miniaturization of media, etc. …”
Get full text
Article -
1186
مراقبة بعض الأدوية الفيتامينية الوطنية والمهربة الموجودة في السوق المحلية
Published 2019-01-01“…The phenomenon of spreading the smuggled and counterfeited drugs is not confined to any limits, but it has spread the whole world and Syria is not far from it. …”
Get full text
Article -
1187
A Região Vinhateira do Alto Douro, entre o livre-cambismo e o proteccionismo
Published 2006-01-01“…This new reality, together with the emergence of vine phylloxera and business competitors in which both internal and external frauds and counterfeits abounded, gave rise to a profound crisis. …”
Get full text
Article -
1188
Privacy Preservation in Patient Information Exchange Systems Based on Blockchain: System Design Study
Published 2022-03-01“…Our PIE system protects the patient’s EMR from security threats such as counterfeiting and privacy attacks during data sharing. …”
Get full text
Article -
1189
مراقبة بعض الأدوية الفيتامينية الوطنية والمهربة الموجودة في السوق المحلية
Published 2019-01-01“…The phenomenon of spreading the smuggled and counterfeited drugs is not confined to any limits, but it has spread the whole world and Syria is not far from it. …”
Get full text
Article -
1190
Extreme Point Sort Transformation Combined With a Long Short-Term Memory Network Algorithm for the Raman-Based Identification of Therapeutic Monoclonal Antibodies
Published 2022-04-01“…Therapeutic monoclonal antibodies (mAbs) are a new generation of protein-based medicines that are usually expensive and thus represent a target for counterfeiters. In the present study, a method based on Raman spectroscopy that combined extreme point sort transformation with a long short-term memory (LSTM) network algorithm was presented for the identification of therapeutic mAbs. …”
Get full text
Article -
1191
Authenticity and species identification of Fritillariae cirrhosae: a data fusion method combining electronic nose, electronic tongue, electronic eye and near infrared spectroscopy
Published 2023-04-01“…This paper focuses on determining the authenticity and identifying the species of Fritillariae cirrhosae using electronic nose, electronic tongue, and electronic eye sensors, near infrared and mid-level data fusion. 80 batches of Fritillariae cirrhosae and its counterfeits (including several batches of Fritillaria unibracteata Hsiao et K.C. …”
Get full text
Article -
1192
ATHENIAN MERCANTILISM: A NEW APPROACH TO THE ATHENIAN COINAGE DECREE AND THE LAW OF NICOPHON
Published 2019-10-01“…Namely, do coin finds signify the regularization of anti-counterfeiting measures? (4) Is there any perceivable quantitative reduction of non-Athenian silver coinage following the Decree or Law? …”
Get full text
Article -
1193
Three-dimensional surface-enhanced Raman scattering platforms : large-scale plasmonic hotspots for new applications in sensing, microreaction, and data storage
Published 2020“…We highlight the emergence of 3D SERS-based data storage platforms with 10-100-fold higher storage density than 2D platforms, featuring a new approach in the development of level 3 security (L3S) anti-counterfeiting labels. Ultimately, we recognize that 3D SERS research can only be developed further when its sensing capabilities are concurrently strengthened. …”
Get full text
Journal Article -
1194
Universal Jurisdiction between Unity and Fragmentation of International Criminal Law
Published 2011-04-01“…It might also be interesting to see whether States have different conditions for UJ over core crimes than over other international or transnational crimes, which would be a sign of real fragmentation between modern ICL (the core crimes) and transnational ICL (crimes such as terrorism, piracy, money counterfeiting, etc.).In section 2, on the basis of a few selected case studies, I will ask whether the exercise of UJ has the tendency to lead to fragmented jurisprudence on substantive ICL. …”
Get full text
Article -
1195
-
1196
Criminals and the law in the reign of Richard II
Published 1976“…The law of treason, for example, rested very largely on political expediency, with a fairly generous attitude towards petty counterfeiters. The law of homicide showed unexpected simplicity; on the other hand, the historian cannot wholly disentangle the contortions into which the law of rape threw the practice of prosecuting it.…”
Thesis -
1197
Grupuskulaarne identiteediloome paremäärmuslaste võrgusuhtluses / The Formation of Groupuscular Identity in the Web Communication of the Estonian Extreme Right
Published 2015-06-01“…For example, in the case of the topic of ratification of ACTA (The Anti-Counterfeiting Trade Agreement), a reference to extensive corruption among various administrative units of the European Union percolates through the Estonian groupuscules (on a broader level, a reference to the decadence of liberalism and the new world order). …”
Get full text
Article