Showing 961 - 980 results of 1,172 for search '"forgery"', query time: 0.34s Refine Results
  1. 961

    Classroom Attendance Monitoring System Using Radio Frequency Identification with Web Application by John Dominic Aniñon, Kenneth Kent Flores, Cliff Sean Kyle Otadoy, John Paul Rodas, Julia Fe Tabaco, Jan Dave Campañera, Alvin Joseph Macapagal

    Published 2021-12-01
    “…Individuals also tend to take advantage of the flaws of the manual method that leads them to commit hoax and forgery. Despite the innovation of different automated systems, biometric recognition systems, RFID technology, and barcodes also have disadvantages. …”
    Get full text
    Article
  2. 962

    Impacts of California Proposition 47 on crime in Santa Monica, California. by Jennifer Crodelle, Celeste Vallejo, Markus Schmidtchen, Chad M Topaz, Maria R D'Orsogna

    Published 2021-01-01
    “…Our statistical analyses of reclassified crimes-larceny, fraud, possession of narcotics, forgery, receiving/possessing stolen property-and non-reclassified ones are based on publicly available reported crime data from 2006 to 2019. …”
    Get full text
    Article
  3. 963

    Data Anonymization Using Pseudonym System to Preserve Data Privacy by Shukor Abd Razak, Nur Hafizah Mohd Nazari, Arafat Al-Dhaqm

    Published 2020-01-01
    “…In addition, attacks may take place against services; for instance spoofing attacks, forgery attacks, etc. in the course of information transaction. …”
    Get full text
    Article
  4. 964

    Medical Data Sharing Scheme Based on Attribute Cryptosystem and Blockchain Technology by Xiaodong Yang, Ting Li, Xizhen Pei, Long Wen, Caifen Wang

    Published 2020-01-01
    “…However, most existing medical data sharing schemes have security risks, such as being prone to data tampering and forgery, and do not support the ability to verify the authenticity of the data source. …”
    Get full text
    Article
  5. 965

    Design of a CANFD to SOME/IP Gateway Considering Security for In-Vehicle Networks by Zheng Zuo, Shichun Yang, Bin Ma, Bosong Zou, Yaoguang Cao, Qiangwei Li, Sida Zhou, Jichong Li

    Published 2021-11-01
    “…The results show that the designed gateway can ensure a CAN/CANFD to SOME/IP protocol conversion with a low system resource overhead and a low latency while effectively resisting hacker attacks such as frame forgery, tampering, and sniffing.…”
    Get full text
    Article
  6. 966

    The Design and Analysis of a Secure Personal Healthcare System Based on Certificates by Jungho Kang, Hague Chung, Jeongkyu Lee, Jong Hyuk Park

    Published 2016-11-01
    “…However, e-Healthcare has been exposed to eavesdropping, manipulation, and the forgery of information that is personal, biological, medical, etc., and is a security threat from malicious attackers. …”
    Get full text
    Article
  7. 967

    Application of Fuzzy Logic in a Secure Beacon–Based Guidance System for Public Transportation by Molina-Gil Jezabel, Caballero-Gil Pino, Quesada-Arencibia Alexis, de Blasio Gabriele Salvatore

    Published 2022-09-01
    “…To defend the scheme against possible attacks based on beacon forgery or user tracking, the proposal includes different forms of authentication for data sent from beacons and data sent from the mobile application. …”
    Get full text
    Article
  8. 968

    A Traceable and Authenticated IoTs Trigger Event of Private Security Record Based on Blockchain by Chin-Ling Chen, Zi-Yi Lim, Hsien-Chou Liao, Yong-Yuan Deng

    Published 2021-03-01
    “…The known attacks (e.g., man-in-the-middle attack, replay attack, forgery attack) are avoided by message encryption and a signing mechanism. …”
    Get full text
    Article
  9. 969

    PENUNDAAN KEWAJIBAN PEMBAYARAN UTANG DALAM KEPAILITAN (ANALISIS TERHADAP PUTUSAN PENGADILAN NIAGA NOMOR: 20/PAILIT/2011/PN.NIAGA.SBY) by I Wayan Wesna Astara

    Published 2015-07-01
    “…The results of the research showed that the debtor (PT Dwimas Andalan Bali) as the Respondent of Insolvency has filed rebuttal that the Applicant of Insolvency has committed defaults by applying the doctrine of excptio non adimpleti cordractus and the Applicant of Insolvency (PT Industama Karsa Mandiri) was alleged of committing frauds and forgery. Therefore the insolvent debtor who should filed for insolvency to DDPO did not execute it, instead he executed reconciliation with the other creditors unless the Applicant of Insolvency. …”
    Get full text
    Article
  10. 970

    Securing communications between smart grids and real users; providing a methodology based on user authentication by Tiansheng Chen, Xueli Yin, Guijie Wang

    Published 2021-11-01
    “…However, to maintain security in a communication, smart meter authentication alone is not enough and it must be ensured that the electricity company’s server is not forgery. Therefore, there is a need for two-way authentication between the smart meter on the home side and the electricity company server. …”
    Get full text
    Article
  11. 971

    A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things by Yunfa Li, Yifei Tu, Jiawa Lu, Yunchao Wang

    Published 2020-02-01
    “…However, during the transmission process of IoT data, security issues, such as data theft and forgery, are prone to occur. In addition, most existing data storage solutions are centralized, i.e., data are stored and maintained by a centralized server. …”
    Get full text
    Article
  12. 972

    Watermarking for combating deepfakes by Li, Rui

    Published 2023
    “…Over the recent years, great concerns have been aroused around the topic of Deefake due to its amazing ability in making a forgery image look like a genuine one. Many approaches have been developed to alleviate such risks. …”
    Get full text
    Final Year Project (FYP)
  13. 973

    ANALISIS SEKUEN NUKLEOTIDA FRAGMEN 12S RIBOSOMAL MITOKONDRIAL DEOKSIRIBONUKLEOTIDA (MT-12S RDNA) YANG BERASAL DARI DAGING BABI DAN SAPI by , IRHAMNA PUTRI RAHMAWATI, , Drh. Sidna Artanto, M.Biotech.

    Published 2014
    “…This leads to cases of forgery and pork adulteration which has a similar physical characteristic with beef. …”
    Thesis
  14. 974

    Designing and developing mobile application for college resident / Muhammad Amirul Aizat Mohd Rosdi by Mohd Rosdi, Muhammad Amirul Aizat

    Published 2020
    “…Unfortunately, some problems occurs while residents using the procedures which are coupon forgery and thieving activity and it is time consuming in managing the record. …”
    Get full text
    Thesis
  15. 975

    A new security model to prevent denial-of-service attacks and violation of availability in wireless networks by Malekzadeh, Mina, Abdul Ghani, Abdul Azim, Subramaniam, Shamala

    Published 2012
    “…The models are capable of preventing the attacks by detecting and discarding the forgery control frames belonging to the attackers. …”
    Get full text
    Article
  16. 976

    Security Improvement of Unicast Management Frames In Ieee 802.11 Mac Layer by Malekzadeh, Mina

    Published 2007
    “…The lack of protection on management frames causes an intruder to launch different types of attack on the WLAN such as forgery, session hijacking, denial of service and man-in-the-middle attack, which can lead to expose the whole WLAN. …”
    Get full text
    Thesis
  17. 977

    State-of-the-art in techniques of text digital watermarking: challenges and limitations by Al-Maweri, Nasr Addin Ahmed Salem, Ali, Roslizah, Wan Adnan, Wan Azizun, Ramli, Abd Rahman, Syed Ahmad Abdul Rahman, Sharifah Mumtazah

    Published 2016
    “…During the last decade, digital watermarking technology has also been utilized as an alternative to prevent media forgery and tampering or falsification to ensure both copyright and authentication. …”
    Get full text
    Article
  18. 978

    Forensic discrimination of blue pen inks: emergence of hybrid pen inks by Gannetion, Linthini, Mohamad Noor, Siti Nur Musliha, Lim, Poh Ying, Chang, Kah Haw, Lim Abdullah, Ahmad Fahmi

    Published 2021
    “…Pens are frequently used to make alterations to documents during forgery. Comparing to conventional inks, hybrid pen ink brings a different challenge to forensic document examiners in differentiating ink entries on a questioned document. …”
    Get full text
    Article
  19. 979

    Multi-attention-based approach for deepfake face and expression swap detection and localization by Waseem, Saima, Syed Abu-Bakar, Syed Abdul Rahman, Omar, Zaid, Ahmed, Bilal Ashfaq, Baloch, Saba, Hafeezallah, Adel

    Published 2023
    “…In the field of multimedia forensics, the detection and precise localization of image forgery has become essential tasks. Current deepfake detectors perform well with high-quality faces within specific datasets, but often struggle to maintain their performance when evaluated across different datasets. …”
    Get full text
    Article
  20. 980

    Statistical examination of common characteristics for disguised handwriting amongst Malaysian by Mat Hazir, Nursakinah

    Published 2009
    “…As an individual attempts to disguise their own handwriting with the intent of later disclaiming it, there is a need to perform examination of handwritten documents to determine the authorship of a questioned document or detect evidence of forgery or disguise. This research proposed a microscopic and statistical examination of handwriting characteristics. …”
    Get full text
    Thesis