Mostrando 1,081 - 1,100 Resultados de 1,278 Para Buscar '"fraud"', tiempo de consulta: 0.19s Limitar resultados
  1. 1081
    “…As a demonstration of the versatility of chronoprints, we use them in three different applications: distinguishing authentic olive oil from adulterated oil (an example of the over $10 billion global problem of food fraud), identifying adulterated or counterfeit medication (which represents around 10% of all medication in low- and middle-income countries), and distinguishing the occasionally confused pharmaceutical ingredients glycerol and diethylene glycol (whose accidental or intentional substitution has led to hundreds of deaths). …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  2. 1082
    “…Horsegate raised the profile of food fraud and crime in supply chains and despite improvements to date, further collaboration between industry and government is required in order to align fully with the recommendations.…”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  3. 1083
    “…More recent waves of regulation have expanded or restricted services CICO agents provide, and also imposed reporting requirements on service providers in an effort to prevent fraud or enhance financial inclusion. Our search for evidence of impacts of CICO regulations resulted in a sample of 90 documents published since 2005, of which only 31 provided evidence on CICO regulation impacts, with most limited in scope—suggesting rigorous policy analysis remains lacking in this quickly expanding sector. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  4. 1084
    por Caulfield, Timothy, Murdoch, Blake
    Publicado 2019
    “…Litigation may be another tool, including the use of fraud, misrepresentation and/or negligence claims for failing to meet the required standard of care. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  5. 1085
    “…Since different varieties of crops have specific applications, it is therefore important to properly identify each cultivar, in order to avoid fake varieties being sold as genuine, i.e., fraud. Despite that properly trained human experts might accurately identify and classify crop varieties, computer vision systems are needed since conditions such as fatigue, reproducibility, and so on, can influence the expert’s judgment and assessment. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  6. 1086
    “…This is the case for bovine milk where addition of non-dairy milks such as vegetables (e.g., soya or coconut) has become a common source of adulteration and fraud. Conventionally, gas chromatography techniques are used to detect key lipids (e.g., triacylglycerols) has an effective read-out of assessing milks origins and to detect foreign milks in bovine milks. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  7. 1087
    por Yu, Kangqing, Shi, Wei, Santoro, Nicola
    Publicado 2020
    “…To design an algorithm for detecting outliers over streaming data has become an important task in many common applications, arising in areas such as fraud detections, network analysis, environment monitoring and so forth. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  8. 1088
    “…Several previous studies on targeted food items using carbon and nitrogen stable isotope ratios in Brazil have revealed that many of the items investigated are adulterated; mislabeled or even fraud. Here, we present the first Brazilian isotopic baseline assessment that can be used not only in future forensic cases involving food authenticity, but also in human forensic anthropology studies. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  9. 1089
    “…The SMEs considered the risk of large-scale cyber-attacks and massive incident of data fraud/theft to be relatively higher than other global technological risks. …”
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  10. 1090
    “…Online romance scams are a modern form of fraud that has spread in Western societies along with the development of social media and dating apps. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  11. 1091
    “…Our findings suggest that whilst most of the tweets from our sample concerned issues that were not specifically about crime, especially during the first stages of the pandemic, there was a significant increase in tweets about fraud, cybercrime and domestic abuse. There was also an increase in retweeting activity as opposed to the creation of original messages. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  12. 1092
    “…Product mislabeling and/or species fraud in Traditional Chinese Medicine (TCM) not only decrease TCM quality, but also pose a potential health issue to the end user. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  13. 1093
    por Rangone, Adalberto, Busolli, Luca
    Publicado 2021
    “…More specifically, through the Charity Wall case study it is possible to demonstrate which aspects of Blockchain technology can be used to strengthen the philanthropic system by avoiding cases of fraud to the detriment of beneficiaries, receivers and donors as well as to create a closer network between the various philanthropic players to support charitable initiatives against the Covid-19.…”
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  14. 1094
    “…We classified the data monitoring process into two groups, such as the Supervised analysis process, to follow each patient remotely by creating a dashboard and an Unsupervised analysis process to identify data discrepancy, data error, or data fraud. We conducted several risk-based statistical analysis techniques to avoid on-site source data verification to reduce time and cost, followed up with each patient remotely to maintain social distancing, and created a centralized data monitoring dashboard to ensure patient safety and maintain the data quality. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  15. 1095
    “…Our statistical analyses of reclassified crimes—larceny, fraud, possession of narcotics, forgery, receiving/possessing stolen property—and non-reclassified ones are based on publicly available reported crime data from 2006 to 2019. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  16. 1096
  17. 1097
    Publicado 2020
    “…Unsupervised anomaly detection for spatio-temporal data has extensive use in a wide variety of applications such as earth science, traffic monitoring, fraud and disease outbreak detection. Most real-world time series data have a spatial dimension as an additional context which is often expressed in terms of coordinates of the region of interest (such as latitude - longitude information). …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  18. 1098
    por Wang, Lina, Song, Hui
    Publicado 2022
    “…From the test results, the improved credit scoring system is the result of facing speculative and circular credit fraud and implies that the traders of risk commentators are in a leading position in each electronic device. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  19. 1099
    “…BACKGROUND: Medical billing errors and fraud have been described as one of the last “great unreduced healthcare costs,” with some commentators suggesting measurable average losses from this phenomenon are 7% of total health expenditure. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  20. 1100
    por Masic, Izet
    Publicado 2021
    “…In order to prevent this severest form of academic fraud, authors must give credit to someone whose work has helped him/her by citing references correctly. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
Herramientas de búsqueda: RSS