Mostrando 721 - 740 Resultados de 1,278 Para Buscar '"fraud"', tiempo de consulta: 0.22s Limitar resultados
  1. 721
    “…Liking or sharing messages opposed to conspiracy theories was associated with higher turnout than expected in the runoff election, and those who liked or shared tweets promoting fraud-related conspiracy theories were slightly less likely to vote.…”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  2. 722
    “…The identification of a product, with its geographical origin, is a guaranty of the value of the foodstuff and protection from potential fraud. Extra virgin olive oil is produced or marketed as a single variety or a blend of two or more cultivars, often of different geographic origins. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  3. 723
    “…The development of electronic gadgets has become of great relevance for the detection of fraud in beverages such as wine, due to the addition of adulterants that bring risks to human health as well as economic impacts. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  4. 724
    “…In order to support the prevention of food fraud and mislabelling, a next-generation sequencing methodology based on mitochondrial cytochrome b and control region markers has been tested. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  5. 725
    “…In order to quickly and effectively identify the source of food safety problems and to label fraud regarding this animal, it is necessary to identify the geographical traceability of the Tibetan chicken. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  6. 726
    por Krebs, Brian
    Publicado 2014
    “…Not only are hundreds of thousands of Americans exposing themselves to fraud and dangerously toxic products from rogue online pharmacies, but even those who never open junk messages are at risk. …”
    Enlace del recurso
  7. 727
    “…Networks and graphs appear in many diverse settings, for example in social networks, computer-communication networks (intrusion detection, traffic management), protein-protein interaction networks in biology, document-text bipartite graphs in text retrieval, person-account graphs in financial fraud detection, and others. In this work, first we list several surprising patterns that real graphs tend to follow. …”
    Enlace del recurso
  8. 728
    “…The popularity of plant food supplements has seen explosive growth all over the world, making them susceptible to adulteration and fraud. This necessitates a screening approach for the detection of regulated plants in plant food supplements, which are usually composed of complex plant mixtures, thus making the approach not so straightforward. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  9. 729
    “…With the increased incidence of wine fraud, a fast and reliable method for wine certification has become a necessary prerequisite for the vigorous development of the global wine industry. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  10. 730
    “…As a highly valued food product worldwide, assurance of the authenticity of honey is required to prevent potential fraud. In this work, the characterisation of Spanish honeys from 11 different botanical origins was carried out by headspace gas chromatography coupled with mass spectrometry (HS-GC-MS). …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  11. 731
    “…Current trends and major research achievements in the field were discussed and commented on in detail, pointing out advantages and drawbacks typically associated with this analytical approach and arguing future improvements and changes that need to be made to recognize it as a standard and validated method for fraud mitigation and safety control in the sector of food of animal origin.…”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  12. 732
    “…There has been a variety of surveys of anomaly detection, such as of network anomaly detection, financial fraud detection, human behavioral analysis, and many more. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  13. 733
    “…As the demand for seafood increases, so does the incidence of seafood fraud. Confirming provenance of seafood is important to combat fraudulent labelling but requires a database that contains the isotopic and elemental “fingerprints” of authentic seafood samples. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  14. 734
    “…It encompasses a broad spectrum of offenses committed online, including hacking; sensitive information theft; phishing; online fraud; modern malware distribution; cyberbullying; cyber espionage; and notably, cyberattacks orchestrated by botnets. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  15. 735
    “…The lack of trust between the landlord and the tenant due to fraud or squatters makes it necessary to involve third parties to minimize risk. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  16. 736
    por Zhu, Lusha, Walsh, Daniel, Hsu, Ming
    Publicado 2012
    “…The impact of such deficits can be dramatic, as in cases of financial fraud, which disproportionately affect the elderly. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  17. 737
    “…BACKGROUND: To investigate fraud and errors, scientists have studied cohorts of retraction notices. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  18. 738
    por Shamim, Thorakkal
    Publicado 2015
    “…Among the articles published in Journal of Forensic Odonto-Stomatology, mass disasters (10) and bite mark analysis (10), followed by sexual dimorphism (8) and dental fraud and malpractice (8), followed by craniofacial superimposition (6) and identification (6) form the major attraction of the contributors. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  19. 739
    “…The law is particularly remarkable because many types of data are considered to be consistent with Benford’s Law and scientists and investigators have applied it in diverse areas, for example, diagnostic tests for mathematical models in Biology, Genomics, Neuroscience, image analysis and fraud detection. In this article we present and compare statistically sound methods for assessing conformance of data with Benford’s Law, including discrete versions of Cramér-von Mises (CvM) statistical tests and simultaneous confidence intervals. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  20. 740
    por Goldstein, Markus, Uchida, Seiichi
    Publicado 2016
    “…This challenge is known as unsupervised anomaly detection and is addressed in many practical applications, for example in network intrusion detection, fraud detection as well as in the life science and medical domain. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
Herramientas de búsqueda: RSS