Showing 181 - 200 results of 296 for search '"Forgery"', query time: 0.07s Refine Results
  1. 181

    Methodology of Conventional Perceptions by reza Mollai

    Published 2016-06-01
    “…The relations between conventional perceptions, or conventional perceptions and real perceptions, are subordinate to their forgery and convention. Hence, the stages of thought for obtaining conventional perceptions are different from the stages of thought for obtaining real perceptions and the method of deduction in conventional perceptions from the method of deduction in real perceptions. …”
    Get full text
    Article
  2. 182

    A Study of the Alfredian verse prefaces and epilogues by CLAUDIO CATALDI

    Published 2024-05-01
    “…The same applies to the briefMetrical Prefaceto the Old EnglishBoethius.On the other hand, theMetrical Prefaceto Wærferth’s translation of Gregory’s Dialogues displays features (such as lack of enjambement and anaphora) that are typical of late Old English poetry.These and other features suggest that this prefacemight bea late forgery,which was possibly inspired by similarAlfredianexamples. …”
    Get full text
    Article
  3. 183

    Privacy-preserving authentication scheme for electricity trading in V2G network using anonymous credential and blockchain by LI Yuancheng, HU Baiji, HUANG Rong

    Published 2025-05-01
    “…To address privacy leakage issues in traditional V2G power transaction authentication, including identity forgery, transaction behavior analysis, and location tracking, a blockchain-based privacy-preserving authentication scheme for V2G networks was proposed. …”
    Get full text
    Article
  4. 184

    Optimization of Cross-Border e-Commerce Logistics Supervision System Based on Internet of Things Technology by Pingping Sun, Lingang Gu

    Published 2021-01-01
    “…Finally, in a real crowd sourcing logistics enterprise platform to run on the software component, the actual measurement, the measured results show that the proposed cross-border supervision system is safe and controllable, and electronic business logistics protects users and data privacy, prevents forgery and fraud, and realizes the user behavior and user data in addition to auditability and traceability.…”
    Get full text
    Article
  5. 185

    Identification of Computer Editing in Electronic Images of Documents as a Task of Forensic Examination by A. F. Kupin, A. S. Kovalenko

    Published 2025-04-01
    “…The article considers a number of theoretical and applied issues related to forensic examination of electronic images of documents and in particular:- comparative analysis of normative legal acts carried out with regard to regulation of certain aspects of the activities in terms of electronic images of documents’ application;- indication of differences between electronic documents and electronic images of documents;- formulation of definition of the electronic image of the document computer editing;- description of factors affecting the possibility for identification of computer editing of document electronic images as a means of document forgery;- description of the most typical file formats used for storing, processing and transferring electronic images of documents; examination efficiency demonstration of certain methods and tools by means of the file formate examples in terms of identifying the features that indicate the actions performed on electronic images of documents;- characteristic of the operation principle and functional specifics of Grayscale, RGB and Lab color models used when working with electronic images of documents; capabilities demonstration of each one of them with specific reference;- determination of sequencing and limitations of solving the expert task targeted at fact finding of computer editing of document electronic images and its specific…”
    Get full text
    Article
  6. 186

    Information Security Protection of Internet of Energy Using Ensemble Public Key Algorithm under Big Data by Baode Lin, Zhenwei Geng, Fengrong Yu

    Published 2023-01-01
    “…PIoT is vulnerable to monitoring, tampering, forgery, and other attacks during frequent data interaction under the background of big data, leading to a severe threat to the power grid’s Information Security (ISEC). …”
    Get full text
    Article
  7. 187

    BF-ACS—Intelligent and Immutable Face Recognition Access Control System by Wen-Bin Hsieh

    Published 2025-01-01
    “…Therefore, we propose a face recognition ACS that is resistant to data forgery. In this paper, a deep convolutional network is utilized to learn Euclidean embedding (based on FaceNet) of each image and achieve face recognition and verification. …”
    Get full text
    Article
  8. 188

    Legal Normativity in Novel Technology of Virtual Reality in Universal Gravatar by Sima Hatami, Fathollah Rahimi, Ehsan Aghamohammad aghaee

    Published 2024-09-01
    “…In addition, the integration techniques for giving legal personality to avatars in the metaverse and some damages Such as committing crimes of theft, forgery and abuse of rights in the meantime are criticized. …”
    Get full text
    Article
  9. 189

    Copy/Past: A Hauntological Approach to the Digital Replication of Destroyed Monuments by Giovanni Lovisetto

    Published 2025-06-01
    “…Drawing on Jacques Derrida’s formulation of <i>hauntology</i> and Umberto Eco’s theory of forgery, this study examines the ontological, ethical, and ideological stakes of digitally mediated replication. …”
    Get full text
    Article
  10. 190

    Palabras y conceptos de Velázquez: el problema de la Memoria de las pinturas… del Escorial by Fernando Marías

    Published 2025-05-01
    “…Whatever the case, whether it is a forgery from the nineteenth or eighteenth century, it is clear that it was based on a manuscript text. …”
    Get full text
    Article
  11. 191

    A secure routing scheme for underwater acoustic networks by Xiujuan Du, Chunyan Peng, Keqin Li

    Published 2017-06-01
    “…Analysis shows that the proposed signature scheme can resist forgery attacks effectively and improve communication security and signature efficiency. …”
    Get full text
    Article
  12. 192

    The History of a Genuine Fake Philosophical Treatise (Ḥatatā Zar’a Yā‘eqob and Ḥatatā Walda Ḥeywat). Episode 2: The Time of Debunking, The Time in the Wilderness (from 1916 to the... by Anaïs Wion

    Published 2021-10-01
    “…Conti Rossini that turned this “rare jewel of Ethiopian literature” into a literary forgery is very succinct, and is more of a collection of pieces of evidence than an irrefutable proof. …”
    Get full text
    Article
  13. 193

    Development of a Blockchain-Based Food Safety System for Shared Kitchens by Hyejin Jang, Daye Lee, Byungun Yoon

    Published 2024-11-01
    “…Additionally, the blockchain system’s mechanisms for enhancing safety in shared kitchens were substantiated through specific use cases and detailed data structures, addressing issues related to forgery, alteration, and management challenges. This study also offers practical insights that can facilitate more structured safety management in shared-kitchen environments.…”
    Get full text
    Article
  14. 194

    Two-Layer Fragile Watermarking Method Secured with Chaotic Map for Authentication of Digital Holy Quran by Mohammed S. Khalil, Fajri Kurniawan, Muhammad Khurram Khan, Yasser M. Alginahi

    Published 2014-01-01
    “…This paper presents a novel watermarking method to facilitate the authentication and detection of the image forgery on the Quran images. Two layers of embedding scheme on wavelet and spatial domain are introduced to enhance the sensitivity of fragile watermarking and defend the attacks. …”
    Get full text
    Article
  15. 195

    Highly informative integrated method for determining the type of engine oil by A. Mamykin, O. Kukla, L. Matvienko, G. Dorozinska, V. Maslov, G. Dorozinsky

    Published 2019-09-01
    “…The results of the studies can be used to identify the type of motor oil as well as to detect forgery.…”
    Get full text
    Article
  16. 196

    GFADE: generalized feature adaptation and discrimination enhancement for deepfake detection by ZhiYong Tian, Junkai Yi

    Published 2025-05-01
    “…By integrating Cross-Entropy Loss, ArcFace loss, and Focal Loss, our model enhances its discriminative power to better handle complex forgery characteristics and effectively mitigate data imbalance. …”
    Get full text
    Article
  17. 197

    [SPA] LOS HÁBITOS DE LA INQUISICIÓN // SPANISH INQUISITION JEWELLERY by Antonia Herradón Figueroa

    Published 2017-10-01
    “…It also presents the thorny issue of the forgery of jewels, a common practice at the end of XIX Century, when singular artefacts related to the Spain’s history were highly demanded by collectors.   …”
    Get full text
    Article
  18. 198

    Efficient Dynamic Replicated Data Possession Checking in Distributed Cloud Storage Systems by Jinxia Wei, Jianyi Liu, Ru Zhang, Xinxin Niu

    Published 2016-01-01
    “…Finally, security analysis and experimental results show that our scheme can resist forgery, replacement, and replay attack and perform better than some other related scheme published recently.…”
    Get full text
    Article
  19. 199

    A Study on the Variations in Chinese Character Libraries: A Case Study of Song Typeface by Fushi Chen, Xingzhou Han, Xingyu Duan, Yang Yang

    Published 2025-01-01
    “…Despite this, documents are susceptible to alterations, such as forgery or tampering, which can undermine their reliability. …”
    Get full text
    Article
  20. 200

    Pengujian Keamanan Website XYZ Menggunakan Metode Vulnerability Assessment & Penetration Testing by Ian Vemas Silalahi, Kasmawi Kasmawi

    Published 2025-08-01
    “…Metode pengujian yang digunakan dengan teknik Disributed Denial of Service (DDoS), Clickjacking dan Cross Site Request Forgery (CSRF). Hasil penelitian menunjukkan bahwa website tidak aman dari serangan DDoS yang ditemukan pada port 80 berdasarkan hasil scanning port yang terbuka menggunakan nmap, dan dengan teknik CSRF pada elemen login yang tidak menggunakan anti-token CSRF. …”
    Get full text
    Article