Showing 1,181 - 1,197 results of 1,197 for search '"counterfeit"', query time: 0.09s Refine Results
  1. 1181

    Application of flash GC e-nose and FT-NIR combined with deep learning algorithm in preventing age fraud and quality evaluation of pericarpium citri reticulatae by Yuwen Qin, Qi Zhao, Dan Zhou, Yabo Shi, Haiyan Shou, Mingxuan Li, Wei Zhang, Chengxi Jiang

    Published 2024-03-01
    “…Therefore, we did this study with the aim of establishing a rapid and nondestructive method to identify the counterfeiting of PCR storage year, so as to protect the legitimate rights and interests of consumers. …”
    Get full text
    Article
  2. 1182

    A Combined Non-Destructive and Micro-Destructive Approach to Solving the Forensic Problems in the Field of Cultural Heritage: Two Case Studies by Michela Ricca, Maria F. Alberghina, Luciana Randazzo, Salvatore Schiavone, Antonio Donato, Maria P. Albanese, Mauro F. La Russa

    Published 2021-07-01
    “…The present paper shows data from the non-destructive and micro-destructive analysis of different artworks and objects provided by the Cosenza Carabinieri Unit for the Protection of Cultural Heritage and Anti-Counterfeiting (Calabria, Italy). In particular, two oil paintings on canvas depicting cherubs (Italian: <i>putti</i>), recovered as fragments of larger religious artworks, and two bronze belt and helmet fragments were investigated. …”
    Get full text
    Article
  3. 1183

    Sequencing and analyses on chloroplast genomes of Tetrataenium candicans and two allies give new insights on structural variants, DNA barcoding and phylogeny in Apiaceae subfamily... by Lu Kang, Dengfeng Xie, Qunying Xiao, Chang Peng, Yan Yu, Xingjin He

    Published 2019-11-01
    “…Analyses on DNA polymorphism located 29 candidate cp DNA barcodes for the authentication of ‘Danggui’ counterfeits. Meanwhile, 34 hyper-variable markers were also located by the five Tordyliinae chloroplast genomes, and 11 of them were screened for population genetics of T. candicans based on plastome information from two individuals. …”
    Get full text
    Article
  4. 1184

    Specific Species DNA Amplification as a Halal Authentication Method in Sausage Based on Genetic Markers by Nurul Purnomo, Musdalifa Mansur, Angga Nugraha, Muh. Ihsan A. Dagong, Asmuddin Natsir

    Published 2023-10-01
    “…Sausage is a processed meat food that is susceptible to counterfeiting by mixing non-halal meat, so a valid, fast and cheap halal authentication method is needed for sausages. …”
    Get full text
    Article
  5. 1185

    La redevance pour copie privée, un exutoire à l’ère du numérique ? by Donald SINDANI KANDAMBU

    Published 2022-08-01
    “…New information and communication technologies have paved the way for counterfeiting, downloading, miniaturization of media, etc. …”
    Get full text
    Article
  6. 1186

    مراقبة بعض الأدوية الفيتامينية الوطنية والمهربة الموجودة في السوق المحلية by مفيد ياسين, محمد هارون, غنوة إسماعيل

    Published 2019-01-01
    “…The phenomenon of spreading the smuggled and counterfeited drugs is not confined to any limits, but it has spread the whole world and Syria is not far from it. …”
    Get full text
    Article
  7. 1187

    A Região Vinhateira do Alto Douro, entre o livre-cambismo e o proteccionismo by Carla Sequeira

    Published 2006-01-01
    “…This new reality, together with the emergence of vine phylloxera and business competitors in which both internal and external frauds and counterfeits abounded, gave rise to a profound crisis. …”
    Get full text
    Article
  8. 1188

    Privacy Preservation in Patient Information Exchange Systems Based on Blockchain: System Design Study by Sejong ­Lee, Jaehyeon Kim, Yongseok Kwon, Teasung Kim, Sunghyun Cho

    Published 2022-03-01
    “…Our PIE system protects the patient’s EMR from security threats such as counterfeiting and privacy attacks during data sharing. …”
    Get full text
    Article
  9. 1189

    مراقبة بعض الأدوية الفيتامينية الوطنية والمهربة الموجودة في السوق المحلية by مفيد ياسين, محمد هارون, غنوة إسماعيل

    Published 2019-01-01
    “…The phenomenon of spreading the smuggled and counterfeited drugs is not confined to any limits, but it has spread the whole world and Syria is not far from it. …”
    Get full text
    Article
  10. 1190

    Extreme Point Sort Transformation Combined With a Long Short-Term Memory Network Algorithm for the Raman-Based Identification of Therapeutic Monoclonal Antibodies by Jin Ling, Luxia Zheng, Mingming Xu, Gang Chen, Xiao Wang, Danzhuo Mao, Hong Shao

    Published 2022-04-01
    “…Therapeutic monoclonal antibodies (mAbs) are a new generation of protein-based medicines that are usually expensive and thus represent a target for counterfeiters. In the present study, a method based on Raman spectroscopy that combined extreme point sort transformation with a long short-term memory (LSTM) network algorithm was presented for the identification of therapeutic mAbs. …”
    Get full text
    Article
  11. 1191

    Authenticity and species identification of Fritillariae cirrhosae: a data fusion method combining electronic nose, electronic tongue, electronic eye and near infrared spectroscopy by Xin-Jing Gui, Xin-Jing Gui, Xin-Jing Gui, Xin-Jing Gui, Xin-Jing Gui, Han Li, Rui Ma, Liang-Yu Tian, Fu-Guo Hou, Hai-Yang Li, Xue-Hua Fan, Yan-Li Wang, Yan-Li Wang, Yan-Li Wang, Yan-Li Wang, Jing Yao, Jing Yao, Jing Yao, Jing Yao, Jun-Han Shi, Jun-Han Shi, Jun-Han Shi, Jun-Han Shi, Lu Zhang, Lu Zhang, Lu Zhang, Lu Zhang, Xue-Lin Li, Xue-Lin Li, Xue-Lin Li, Xue-Lin Li, Rui-Xin Liu, Rui-Xin Liu, Rui-Xin Liu, Rui-Xin Liu, Rui-Xin Liu

    Published 2023-04-01
    “…This paper focuses on determining the authenticity and identifying the species of Fritillariae cirrhosae using electronic nose, electronic tongue, and electronic eye sensors, near infrared and mid-level data fusion. 80 batches of Fritillariae cirrhosae and its counterfeits (including several batches of Fritillaria unibracteata Hsiao et K.C. …”
    Get full text
    Article
  12. 1192

    ATHENIAN MERCANTILISM: A NEW APPROACH TO THE ATHENIAN COINAGE DECREE AND THE LAW OF NICOPHON by Corey J. Ellithorpe

    Published 2019-10-01
    “…Namely, do coin finds signify the regularization of anti-counterfeiting measures?  (4) Is there any perceivable quantitative reduction of non-Athenian silver coinage following the Decree or Law? …”
    Get full text
    Article
  13. 1193

    Three-dimensional surface-enhanced Raman scattering platforms : large-scale plasmonic hotspots for new applications in sensing, microreaction, and data storage by Phan-Quang, Gia Chuong, Han, Xuemei, Koh, Charlynn Sher Lin, Sim, Howard Yi Fan, Lay, Chee Leng, Leong, Shi Xuan, Lee, Yih Hong, Pazos-Perez, Nicolas, Alvarez-Puebla, Ramon A., Ling, Xing Yi

    Published 2020
    “…We highlight the emergence of 3D SERS-based data storage platforms with 10-100-fold higher storage density than 2D platforms, featuring a new approach in the development of level 3 security (L3S) anti-counterfeiting labels. Ultimately, we recognize that 3D SERS research can only be developed further when its sensing capabilities are concurrently strengthened. …”
    Get full text
    Journal Article
  14. 1194

    Universal Jurisdiction between Unity and Fragmentation of International Criminal Law by Pasculli Maria Antonella

    Published 2011-04-01
    “…It might also be interesting to see whether States have different conditions for UJ over core crimes than over other international or transnational crimes, which would be a sign of real fragmentation between modern ICL (the core crimes) and transnational ICL (crimes such as terrorism, piracy, money counterfeiting, etc.).In section 2, on the basis of a few selected case studies, I will ask whether the exercise of UJ has the tendency to lead to fragmented jurisprudence on substantive ICL. …”
    Get full text
    Article
  15. 1195
  16. 1196

    Criminals and the law in the reign of Richard II by Post, J

    Published 1976
    “…The law of treason, for example, rested very largely on political expediency, with a fairly generous attitude towards petty counterfeiters. The law of homicide showed unexpected simplicity; on the other hand, the historian cannot wholly disentangle the contortions into which the law of rape threw the practice of prosecuting it.…”
    Thesis
  17. 1197

    Grupuskulaarne identiteediloome paremäärmuslaste võrgusuhtluses / The Formation of Groupuscular Identity in the Web Communication of the Estonian Extreme Right by Mari-Liis Madisson, Andreas Ventsel

    Published 2015-06-01
    “…For example, in the case of the topic of ratification of ACTA (The Anti-Counterfeiting Trade Agreement), a reference to extensive corruption among various administrative units of the European Union percolates through the Estonian groupuscules (on a broader level, a reference to the decadence of liberalism and the new world order).  …”
    Get full text
    Article