Mostrando 921 - 940 Resultados de 1,278 Para Buscar '"fraud"', tiempo de consulta: 0.17s Limitar resultados
  1. 921
    por Chen, Yi, Wu, Caixia, Zhang, Qinghui, Wu, Di
    Publicado 2023
    “…Then, data analysis methods for four types of analysis tasks: association analysis, risk assessment, risk prediction, and fraud identification, are reviewed. After that, the visualization and interaction techniques are reviewed for four types of characteristic data: multidimensional, hierarchical, associative, and spatial-temporal data. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  2. 922
    “…The identification of capsaicinoids can help reveal food-related fraud, thereby safeguarding consumers’ health. Here, a novel and ultrasensitive method was established with a signal amplification strategy for the detection of capsaicinoids. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  3. 923
  4. 924
    por Schneck, Andreas
    Publicado 2023
    “…The validity of scientific findings may be challenged by the replicability crisis (or cases of fraud), which may result not only in a loss of trust within society but may also lead to wrong or even harmful policy or medical decisions. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  5. 925
    “…It is worth mentioning that datasets of this kind are often used for detecting fraud on the Internet, making an algorithm capable of considering all neighbors a useful tool for such research.…”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  6. 926
    por Ullah, Ikram, Havinga, Paul J. M.
    Publicado 2023
    “…In the absence of proper regulations and due to the inherently cryptic nature of blockchain technology, it can be exploited for nefarious purposes, such as ransomware, money laundering, fraud, and more. Furthermore, both blockchain and the IoT are relatively new technologies, and the absence of well-defined governance structures can erode confidence in their use. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  7. 927
    por Vickers, Andrew J
    Publicado 2006
    “…DISCUSSION: Data sharing benefits numerous research-related activities: reproducing analyses; testing secondary hypotheses; developing and evaluating novel statistical methods; teaching; aiding design of future trials; meta-analysis; and, possibly, preventing error, fraud and selective reporting. Clinical trialists, however, sometimes appear overly concerned with being scooped and with misrepresentation of their work. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Texto
  8. 928
    “…Anomaly detection has recently attracted the attention of the research community, because of its relevance in real-world applications, like intrusion detection, fraud detection, fault detection and system health monitoring, among many others. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  9. 929
    “…“Classical peer review” has been subject to intense criticism for slowing down the publication process, bias against specific categories of paper and author, unreliability, inability to detect errors and fraud, unethical practices, and the lack of recognition for unpaid reviewers. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  10. 930
    “…It refers to the network of computers, laptops, mobile devices or tablets which is remotely controlled by the cybercriminals to initiate various distributed coordinated attacks including spam emails, ad-click fraud, Bitcoin mining, Distributed Denial of Service (DDoS), disseminating other malwares and much more. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  11. 931
    “…The moisture, protein, lipid and ash values were between 83.83–85.59, 12.51–14.52, 1.09–1.65, and 0.76–2.38 g 100 g(−1), respectively. Fraud by excessive polyphosphate addition was detected in 30% of the samples whereas Hg above the recommended limit was observed in 50% of the samples. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  12. 932
    “…Fish authentication is a major concern not only for the prevention of commercial fraud, but also for the assessment of safety risks deriving from the undeclared introduction of potentially dangerous toxic or allergenic substances or environmentally damaging fish where endangered species are involved. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  13. 933
    “…Korean native honey (KNH) is much more expensive than European honey (EH) in Korea, because KNH is a favored honey which is produced less than EH. Food fraud of KNH has drawn attention of the government office concerned, which is in need of a method to differentiate between KNH and EH which are produced by the Asiatic honeybee, Apis cerana and the European honeybee, Apis mellifera, respectively. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  14. 934
    “…Older adults are disproportionately targeted by fraud schemes that advertise unlikely but large returns (positively skewed risks). …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  15. 935
    por Wicherts, Jelte M.
    Publicado 2017
    “…SIMPLE SUMMARY: Several fraud cases, widespread failure to replicate or reproduce seminal findings, and pervasive error in the scientific literature have led to a crisis of confidence in the biomedical, behavioral, and social sciences. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  16. 936
    “…Lack of transparency and lawfulness of the processing of personal data could lead to physical, tangible, or intangible damages where processing could lead to discrimination, identity theft, or identity fraud as a result of which may be significant adverse economic or social consequences. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  17. 937
    “…These malicious codes pave the way to execute many fraudulent activities including spam mail, distributed denial-of-service attacks and click fraud. While many Botnets are set up using centralized communication architecture, the peer-to-peer (P2P) Botnets can adopt a decentralized architecture using an overlay network for exchanging command and control data making their detection even more difficult. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  18. 938
    “…Allowing PMI to promote IQOS as reduced exposure would amount to a legally sanctioned repeat of the ‘light’ and ‘mild’ fraud which, for conventional cigarettes, is prohibited by the US law and the WHO Framework Convention on Tobacco Control.…”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  19. 939
    por Montowska, Magdalena, Spychaj, Anita
    Publicado 2018
    “…The method may be useful in the preliminary screening of protein-rich food samples, aimed at fraud detection and estimation of the overall level of adulteration.…”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  20. 940
    “…The protein pattern of saffron was quite distinct from those of two common adulterants, such as the dried petals of Carthamus tinctorius and the dried fruits of Gardenia jasminoides indicating that proteomic analyses could be exploited for detecting possible frauds.…”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
Herramientas de búsqueda: RSS