Suggested Topics within your search.
Suggested Topics within your search.
-
181
Methodology of Conventional Perceptions
Published 2016-06-01“…The relations between conventional perceptions, or conventional perceptions and real perceptions, are subordinate to their forgery and convention. Hence, the stages of thought for obtaining conventional perceptions are different from the stages of thought for obtaining real perceptions and the method of deduction in conventional perceptions from the method of deduction in real perceptions. …”
Get full text
Article -
182
A Study of the Alfredian verse prefaces and epilogues
Published 2024-05-01“…The same applies to the briefMetrical Prefaceto the Old EnglishBoethius.On the other hand, theMetrical Prefaceto Wærferth’s translation of Gregory’s Dialogues displays features (such as lack of enjambement and anaphora) that are typical of late Old English poetry.These and other features suggest that this prefacemight bea late forgery,which was possibly inspired by similarAlfredianexamples. …”
Get full text
Article -
183
Privacy-preserving authentication scheme for electricity trading in V2G network using anonymous credential and blockchain
Published 2025-05-01“…To address privacy leakage issues in traditional V2G power transaction authentication, including identity forgery, transaction behavior analysis, and location tracking, a blockchain-based privacy-preserving authentication scheme for V2G networks was proposed. …”
Get full text
Article -
184
Optimization of Cross-Border e-Commerce Logistics Supervision System Based on Internet of Things Technology
Published 2021-01-01“…Finally, in a real crowd sourcing logistics enterprise platform to run on the software component, the actual measurement, the measured results show that the proposed cross-border supervision system is safe and controllable, and electronic business logistics protects users and data privacy, prevents forgery and fraud, and realizes the user behavior and user data in addition to auditability and traceability.…”
Get full text
Article -
185
Identification of Computer Editing in Electronic Images of Documents as a Task of Forensic Examination
Published 2025-04-01“…The article considers a number of theoretical and applied issues related to forensic examination of electronic images of documents and in particular:- comparative analysis of normative legal acts carried out with regard to regulation of certain aspects of the activities in terms of electronic images of documents’ application;- indication of differences between electronic documents and electronic images of documents;- formulation of definition of the electronic image of the document computer editing;- description of factors affecting the possibility for identification of computer editing of document electronic images as a means of document forgery;- description of the most typical file formats used for storing, processing and transferring electronic images of documents; examination efficiency demonstration of certain methods and tools by means of the file formate examples in terms of identifying the features that indicate the actions performed on electronic images of documents;- characteristic of the operation principle and functional specifics of Grayscale, RGB and Lab color models used when working with electronic images of documents; capabilities demonstration of each one of them with specific reference;- determination of sequencing and limitations of solving the expert task targeted at fact finding of computer editing of document electronic images and its specific…”
Get full text
Article -
186
Information Security Protection of Internet of Energy Using Ensemble Public Key Algorithm under Big Data
Published 2023-01-01“…PIoT is vulnerable to monitoring, tampering, forgery, and other attacks during frequent data interaction under the background of big data, leading to a severe threat to the power grid’s Information Security (ISEC). …”
Get full text
Article -
187
BF-ACS—Intelligent and Immutable Face Recognition Access Control System
Published 2025-01-01“…Therefore, we propose a face recognition ACS that is resistant to data forgery. In this paper, a deep convolutional network is utilized to learn Euclidean embedding (based on FaceNet) of each image and achieve face recognition and verification. …”
Get full text
Article -
188
Legal Normativity in Novel Technology of Virtual Reality in Universal Gravatar
Published 2024-09-01“…In addition, the integration techniques for giving legal personality to avatars in the metaverse and some damages Such as committing crimes of theft, forgery and abuse of rights in the meantime are criticized. …”
Get full text
Article -
189
Copy/Past: A Hauntological Approach to the Digital Replication of Destroyed Monuments
Published 2025-06-01“…Drawing on Jacques Derrida’s formulation of <i>hauntology</i> and Umberto Eco’s theory of forgery, this study examines the ontological, ethical, and ideological stakes of digitally mediated replication. …”
Get full text
Article -
190
Palabras y conceptos de Velázquez: el problema de la Memoria de las pinturas… del Escorial
Published 2025-05-01“…Whatever the case, whether it is a forgery from the nineteenth or eighteenth century, it is clear that it was based on a manuscript text. …”
Get full text
Article -
191
A secure routing scheme for underwater acoustic networks
Published 2017-06-01“…Analysis shows that the proposed signature scheme can resist forgery attacks effectively and improve communication security and signature efficiency. …”
Get full text
Article -
192
The History of a Genuine Fake Philosophical Treatise (Ḥatatā Zar’a Yā‘eqob and Ḥatatā Walda Ḥeywat). Episode 2: The Time of Debunking, The Time in the Wilderness (from 1916 to the...
Published 2021-10-01“…Conti Rossini that turned this “rare jewel of Ethiopian literature” into a literary forgery is very succinct, and is more of a collection of pieces of evidence than an irrefutable proof. …”
Get full text
Article -
193
Development of a Blockchain-Based Food Safety System for Shared Kitchens
Published 2024-11-01“…Additionally, the blockchain system’s mechanisms for enhancing safety in shared kitchens were substantiated through specific use cases and detailed data structures, addressing issues related to forgery, alteration, and management challenges. This study also offers practical insights that can facilitate more structured safety management in shared-kitchen environments.…”
Get full text
Article -
194
Two-Layer Fragile Watermarking Method Secured with Chaotic Map for Authentication of Digital Holy Quran
Published 2014-01-01“…This paper presents a novel watermarking method to facilitate the authentication and detection of the image forgery on the Quran images. Two layers of embedding scheme on wavelet and spatial domain are introduced to enhance the sensitivity of fragile watermarking and defend the attacks. …”
Get full text
Article -
195
Highly informative integrated method for determining the type of engine oil
Published 2019-09-01“…The results of the studies can be used to identify the type of motor oil as well as to detect forgery.…”
Get full text
Article -
196
GFADE: generalized feature adaptation and discrimination enhancement for deepfake detection
Published 2025-05-01“…By integrating Cross-Entropy Loss, ArcFace loss, and Focal Loss, our model enhances its discriminative power to better handle complex forgery characteristics and effectively mitigate data imbalance. …”
Get full text
Article -
197
[SPA] LOS HÁBITOS DE LA INQUISICIÓN // SPANISH INQUISITION JEWELLERY
Published 2017-10-01“…It also presents the thorny issue of the forgery of jewels, a common practice at the end of XIX Century, when singular artefacts related to the Spain’s history were highly demanded by collectors. …”
Get full text
Article -
198
Efficient Dynamic Replicated Data Possession Checking in Distributed Cloud Storage Systems
Published 2016-01-01“…Finally, security analysis and experimental results show that our scheme can resist forgery, replacement, and replay attack and perform better than some other related scheme published recently.…”
Get full text
Article -
199
A Study on the Variations in Chinese Character Libraries: A Case Study of Song Typeface
Published 2025-01-01“…Despite this, documents are susceptible to alterations, such as forgery or tampering, which can undermine their reliability. …”
Get full text
Article -
200
Pengujian Keamanan Website XYZ Menggunakan Metode Vulnerability Assessment & Penetration Testing
Published 2025-08-01“…Metode pengujian yang digunakan dengan teknik Disributed Denial of Service (DDoS), Clickjacking dan Cross Site Request Forgery (CSRF). Hasil penelitian menunjukkan bahwa website tidak aman dari serangan DDoS yang ditemukan pada port 80 berdasarkan hasil scanning port yang terbuka menggunakan nmap, dan dengan teknik CSRF pada elemen login yang tidak menggunakan anti-token CSRF. …”
Get full text
Article