Showing 881 - 900 results of 1,102 for search '"forgery"', query time: 0.17s Refine Results
  1. 881

    “Characterization of Blue Ballpoint Pens Using UV-Visible Spectroscopy and Pattern Recognition Techniques” by Bahman, Nur Atiqah Salwa

    Published 2015
    “…Analysis of ink is important particularly in the investigation of forgery cases involving handwriting and signatures. …”
    Get full text
    Monograph
  2. 882

    Rancang Bangun Prototype Ciri Citra Kulit Luar Kayu Tanaman Karet menggunakan Metode Virtual Center Of Gravity by Arief Bramanto Wicaksono Putra, Sholeh Hadi Pramono, Agus Naba

    Published 2014-03-01
    “…Hasil penelitian ini menunjukkan bahwa dari maksimal 18 data pengujian yang terbagi menjadi maksimal 6 data valid image dan 12 data forgery image, dengan variasi pengujian sebanyak 5 kali pada setiap kategori diperoleh tingkat Accuracy terendah sebesar 77.78% dan tertinggi sebesar 85.19%. …”
    Get full text
    Article
  3. 883

    Системно-технічний аналіз технологій виготовлення термозбіжних етикеток by Світлана Федорівна Гавенко, Олена Георгіївна Котмальова, Марта Тарасівна Лабецька

    Published 2021-10-01
    “…Heat-shrinkable film has mechanical strength, elasticity and moisture-proof properties, easily changes linear dimensions under the influence of temperature, which allows it to take the form of packaged products, prevents unauthorized opening and forgery, and attracts buyers through original design solutions. …”
    Get full text
    Article
  4. 884

    Using Macroscopic, Microscopic, and FTIR Spectroscopy combined with Chemometrics to Authenticate Arabica Coffee from Antbush by David Fernando, Djoko Santosa, Abdul Rohman

    Published 2024-04-01
    “…In other countries, including India and Africa, coffee forgery using antbush has been extensively established. …”
    Get full text
    Article
  5. 885

    Interpretations of Volga Bulgaria in contemporary Bulgarian historiography through the works of Gainetdin Akhmarov. by Evlogi G. Stanchev

    Published 2019-01-01
    “…Multiple citations of the historical forgery Djagfar Tarikhy, in the commentaries to the original text are indicative of these manipulations. …”
    Get full text
    Article
  6. 886

    Utility of Comprehensive GC×GC Gas Chromatography in Finding Varietal Markers among Volatile Compounds in Non-Aromatic Red Wines by Igor Lukić, Silvia Carlin, Urska Vrhovsek

    Published 2022-10-01
    “…The presented approach that combines conventional GC-MS and advanced GC×GC-TOF-MS showed a great potential for tracking chemical markers of varietal origin and could be practically applied in managing wine production, quality and typicity, marketing, and protection from forgery.…”
    Get full text
    Article
  7. 887

    Subcutaneous coding via laser directed energy deposition (DED-LB) for unalterable component identification by Aizpea Urresti, Jon Iñaki Arrizubieta, Aitzol Lamikiz, Ibon Holgado, Naiara Ortega

    Published 2024-08-01
    “…As a means of avoiding forgery, the development of non-detectable labels, or digital passports is necessary. …”
    Get full text
    Article
  8. 888

    Modern technologies for technical follow-up of documents by Viktor Sezonov, Olha Sezonova

    Published 2022-09-01
    “…The purpose of this article was to study the latest methods of document forgery and existing technologies for their detection with the aim of assessing the level of development of modern expert research in this field. …”
    Get full text
    Article
  9. 889

    Nahw Wajh Jadīd: al-Muḥāwala fī Tarsīkh Maqāṣid al-Sunna al-Nabawiyya bi Indūnīsiyā [Toward a New Perspective: An Attempt in Strenghtening Maqāṣid al-Sunnah in Indonesia]... by Abdul Mufid

    Published 2021-05-01
    “…Furthermore, added with the dark stories and dark histories in the past such as the phenomenon of hadith forgery, of course, it adds to the tension and the extent of the gap. …”
    Get full text
    Article
  10. 890

    Signature Identification using Digital Image Processing and Machine Learning Methods by I Kadek Nurcahyo Putra, Ni Putu Dita Ariani Sukma Dewi, Diah Ayu Pusparani, Dibi Ngabe Mupu

    Published 2023-06-01
    “…Identification of the signature is required to ensure ownership of a signature and to prevent things like forgery from happening to the owner of the signature. …”
    Get full text
    Article
  11. 891

    Hybridized Hierarchical Watermarking and Selective Encryption for Social Image Security by Conghuan Ye, Shenglong Tan, Zheng Wang, Binghua Shi, Li Shi

    Published 2023-07-01
    “…The growth of social image sharing underscores potential security risks for illegal use, such as image forgery, malicious copying, piracy exposure, plagiarism, and misappropriation. …”
    Get full text
    Article
  12. 892

    Electrical Impedance of Upper Limb Enables Robust Wearable Identity Recognition against Variation in Finger Placement and Environmental Factors by Hyung Wook Noh, Joo Yong Sim, Chang-Geun Ahn, Yunseo Ku

    Published 2021-10-01
    “…However, bio-recognition techniques using these existing physical features are always at risk of template forgery threats, such as fake fingerprints. Due to the risk of theft and duplication, studies have recently been attempted using the internal structure and biological characteristics of the human body, including our previous works on the ratiometric biological impedance feature. …”
    Get full text
    Article
  13. 893

    Literary history as bestseller: the life and opinions of a fraudulent philologue by Roxana Patraș, Antonio Patraș

    Published 2024-05-01
    “… In this article we reveal the publishing ventures of Octav Minar (1886-1967), one of the Romanian authors that was disesteemed by fellow literary historians on account of his counterfeiting acts such as forgery, plagiarism, plastography or trick photography. …”
    Get full text
    Article
  14. 894

    Deepfake Detection Algorithm Based on Dual-Branch Data Augmentation and Modified Attention Mechanism by Da Wan, Manchun Cai, Shufan Peng, Wenkai Qin, Lanting Li

    Published 2023-07-01
    “…Mainstream deepfake detection algorithms generally fail to fully extract forgery traces and have low accuracy when detecting forged images with natural corruptions or human damage. …”
    Get full text
    Article
  15. 895

    The genesis of forensic research of documents as the branch of forensic technology by V. S. Sezonov

    Published 2020-06-01
    “…The history of the falsification of various documents for illegal purposes accompanies the entire history of human civilization, so the study of the evolution of methods of documenting information and related methods of forgery is one of the methods of improving forensic knowledge. …”
    Get full text
    Article
  16. 896

    Analyzing temporal coherence for deepfake video detection by Muhammad Ahmad Amin, Yongjian Hu, Jiankun Hu

    Published 2024-03-01
    “…At the first level, to fully capture temporal coherence over the entire video, we devise an efficient temporal facial pattern (TFP) mechanism that explores the color variations of forgery-sensitive facial areas by providing global and local-successive temporal views. …”
    Get full text
    Article
  17. 897

    Security Enhanced CLS and CL-AS Scheme Without Pairings for VANETs by Anjali Bansal, Saru Kumari, Nishant Doshi, Mohammed Amoon, Marko Holbl

    Published 2025-01-01
    “…We also illustrate the security & performance evaluation of our presented technique, and based upon the hardness assumption of the elliptic curve discrete logarithm problem, we have shown that the technique is safe against existential forgery on adaptive chosen message attack in the random oracle model. …”
    Get full text
    Article
  18. 898

    Toward efficient authentication for space-air-ground integrated Internet of things by Baokang Zhao, Puguang Liu, Xiaofeng Wang, Ilsun You

    Published 2019-07-01
    “…While space-air-ground integrated Internet of things is promising to be very useful in many aspects, its deployment and application should overcome severe security threats, for example, interceptions, identity forgery, data tampering, and so on. Authentication is an essential step to protect the Internet of things security, and mutual authentication (i.e. two-way authentication) is especially important to ensure the security of both communication parties simultaneously. …”
    Get full text
    Article
  19. 899

    A Novel Digital Signature Scheme for Advanced Asymmetric Encryption Techniques by Farid Lalem, Abdelkader Laouid, Mostefa Kara, Mohammed Al-Khalidi, Amna Eleyan

    Published 2023-04-01
    “…The analysis showed its robustness against private key recovery and forgery attacks. The implementation results of the proposed scheme showed promising performance in terms of complexity and robustness. …”
    Get full text
    Article
  20. 900

    Exploring opportunities and challenges of Blockchain-Based Electronic Medical records by Peyman Akhavan, Ebrahim Mahmoudzadeh, Maedeh Rahimi, Lila Rajabion

    Published 2022-06-01
    “…The results obtained reveal that the components of immutability and the impossibility of data forgery of patient records (based on data integration in Blockchain) have the most impact on the system. …”
    Get full text
    Article