Mostrando 581 - 600 Resultados de 1,278 Para Buscar '"fraude"', tiempo de consulta: 0.19s Limitar resultados
  1. 581
    “…Preserved FDM abilities include the capacity to recognize fraud attempts, and they are fundamental for a person’s independence. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  2. 582
    “…Intentional non‐compliance can be assessed using food fraud vulnerability tools. These tools incorporate factors influencing the likelihood of food fraud at the company, that is, opportunity, motivation, and (lack of) control measures. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  3. 583
    “…The techniques employed can be used to prevent fraud and have the potential to evaluate further medicinal mushroom species and build solid and trustful connections between these novel food products and potential consumers.…”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  4. 584
    “…Potential applications to the official anti-fraud control are supported by dozens of research articles with a “proof-of-concept” study approach through different chemometric workflows for comprehensive spectral analysis. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  5. 585
  6. 586
    por Saddington, Tricia
    Publicado 1988
    “…The text also talks about the protection of data, and then deals with the defenses against fraud. Survival planning and risk assessment are also encompassed. …”
    Enlace del recurso
  7. 587
    “…A review of the United States Office of Research Integrity annual reports identified 228 individuals who have committed misconduct, of which 94% involved fraud. Analysis of the data by career stage and gender revealed that misconduct occurred across the entire career spectrum from trainee to senior scientist and that two-thirds of the individuals found to have committed misconduct were male. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  8. 588
    por Devasya, Ashwin, Sarpangala, Mythri
    Publicado 2017
    “…While transposition of tooth germ is the rarest condition, this helps in identification of a person in mass casualties due to any disaster, or crimes, fraud. The present case is an incidence of incomplete transposition of right mandibular permanent second molar tooth germ, causing resorption of the roots of permanent first molar with possible loss of that tooth, which is a unique presentation.…”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  9. 589
  10. 590
    por Kisswani, Nazzal, Farah, Ahmad
    Publicado 2022
    “…The UAE lawmaker recognized this in the Commercial Companies Law No. 32 of 2021, when it identified cases in which the partners’ liability for debts and obligations becomes personal and joint in the event of violation of the law or fraud by the partners or managers of the company. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  11. 591
    “…The protein pattern of saffron was quite distinct from those of two common adulterants, such as the dried petals of Carthamus tinctorius and the dried fruits of Gardenia jasminoides indicating that proteomic analyses could be exploited for detecting possible frauds.…”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  12. 592
    “…The premium price, however, also attracts fraudsters that unscrupulously see an economic advantage by selling mis-labelled products to obtain an unjustified additional economic gain. These frauds undermine the whole strategy designed to support a sustainable conservation of autochthonous genetic resources. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  13. 593
    por Androulidakis, Iosif I
    Publicado 2012
    “…Security and secrets of mobile phones are discussed including software and hardware interception, fraud and other malicious techniques used “against” users. …”
    Enlace del recurso
    Enlace del recurso
  14. 594
    “…Putting aside deliberate fraud, there is evidence that a major contributor to lack of reproducibility is insufficient quality assurance of reagents used in preclinical research. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  15. 595
    por Wang, Yang, Li, Anqi, Liu, Jiahuan
    Publicado 2022
    “…Today, earnings mismanagement in China's enterprises has become a serious problem as managers conduct financial fraud by means of earnings management, hindering China's overall economic development. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  16. 596
    por Randi, J
    Publicado 1991
    “…The citation said: "for his unique defense of Science and the scientific method in many disciplines, including physics, against pseudoscience, frauds and charlatans. His use of scientific techniques has contributed to refuting suspicious and fraudulent claims of paranormal results. …”
    Enlace del recurso
  17. 597
    por Alabrah, Amerah
    Publicado 2023
    “…This has increased the risk of credit card fraud (CCF) and made payment networks more vulnerable. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  18. 598
    “…Therefore, the study recommends that for better statistical data analysis on election anomaly detection, Benford's test of conformity and Hartigans' dip test of unimodality should serve as baseline tests (initial screening tools), highlighting areas that may require further investigation or more rigorous analysis and progressively dig deeper into the application of finite mixture fraud models and machine learning techniques. In spite of the promising results Benford's Law, dip test, machine learning algorithms, and network analysis have produced in detecting irregularities in election data, real-world applications remain challenging, particularly when dealing with complex and evolving forms of fraud. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  19. 599
    “…Election forensics tools are used to identify statistical traces of certain types of electoral fraud, providing important information about the integrity and validity of democratic elections. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  20. 600
    “…OBJECTIVES: Despite the fact that research fraud and misconduct are under scrutiny in the field of orthopaedic research, little systematic work has been done to uncover and characterise the underlying reasons for academic retractions in this field. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
Herramientas de búsqueda: RSS