-
21
The structure of the forensic characteristics of offences under Article 200 of the Criminal Code of Ukraine
Published 2023-07-01Subjects: Get full text
Article -
22
BMNet: Enhancing Deepfake Detection Through BiLSTM and Multi-Head Self-Attention Mechanism
Published 2025-01-01“…When forgery techniques can generate highly realistic videos, traditional convolutional neural network (CNN)-based detection models often struggle to capture subtle forgery features and temporal dependencies. …”
Get full text
Article -
23
Verification of a static (off-line) signature using a convolutional neural network
Published 2022-06-01“…This article is devoted to the development of a method for detecting forgery of handwritten signatures. The signature still remains one of the most common methods of identification. …”
Get full text
Article -
24
Document Verification System Using Image Processing: A Case Study of Kabale Municipality.
Published 2024“…In this project, we propose a novel approach to document verification using image processing techniques to combat such document forgery which has compromised the revenue collection to the expectation. …”
Get full text
Thesis -
25
Essence and elements of crimes in the sphere of official activity
Published 2023-07-01“…Such crimes may include a variety of actions, such as forgery, abuse of power, bribery, extortion, negligence, etc. …”
Get full text
Article -
26
Kensington ou Tintin au pays des Runologues
Published 2011-09-01“…The following pages present a survey of the century-old, fairly heated debate over the most famous runic forgery of all time known as the Kensington inscription, from the name of the place where it was found at the very end of the nineteenth century by a Swedish farmer in the “Scandinavian” state of Minnesota.Although crushing new evidence speaking against the authenticity of the monument surfaced a few years ago, a group of unwavering believers are still championing the cause of what they see as irrefutable proof of Scandinavian presence in the heart of the New World a century ahead of Columbus. …”
Get full text
Article -
27
CROSSING STROKES EXAMINATION FROM CROMATICITY DIAGRAM
Published 2023-04-01“…This work is very helpful to questioned document examiners to examine forgery in document.…”
Get full text
Article -
28
Forensic Examination of Money and Securities
Published 2020-09-01“…The characteristic features of forgery are given, which should be paid attention to during the inspection. …”
Get full text
Article -
29
Notary independence in the course of notarial acts
Published 2023-07-01“…It has been generalised that ensuring the appropriate level of notary independence in the course of notarial acts is important: firstly, for notaries themselves, since in this case they are able to perform their activities free from any influence, which is an additional guarantee of ensuring the regime of legality in their work; secondly, for users of notaries’ services, since notary independence is a guarantee of observance of the rights and freedoms of individuals and legal entities, and is also a preventive measure against any unlawful acts (fraud, document forgery, etc.).…”
Get full text
Article -
30
The concept of the document in Forensic science
Published 2022-03-01“…The tasks of forensic documentation are: 1) development of forensic classification of documents, which will be based on various criteria; 2) development of methods for detecting the subject of forgery; 3) development of methods for rebuilding the information content of the document or its holder. …”
Get full text
Article -
31
Bejlisova aféra. Antisemitismus a ruský politický život v letech 1911-1913
Published 2006-01-01“…Therefore it risked the trial against Beilis, which ended in October 1913 with a liberation verdict, in spite of manipulation and forgery of evidence. The affair demonstrated how unbalanced the tsarist Jewish-policy was and proved the authorities unprepared for the methods of modern political struggle. …”
Get full text
Article -
32
Research on cloud dynamic public key information security based on elliptic curve and primitive Pythagoras
Published 2025-02-01“…The algorithm in this paper is applied to network transmission, which can effectively prevent data eavesdropping, tampering and forgery, ensure communication security.…”
Get full text
Article -
33
Physician Kitasato Shibasaburō: Achievements and posthumous veneration in Shintō
Published 2024-10-01“…Although the former had done so a few days earlier, as a result of misunderstanding and forgery, the honor of the discovery was given to A. …”
Get full text
Article -
34
The genesis of forensic research of documents as the branch of forensic technology
Published 2020-06-01“…The history of the falsification of various documents for illegal purposes accompanies the entire history of human civilization, so the study of the evolution of methods of documenting information and related methods of forgery is one of the methods of improving forensic knowledge. …”
Get full text
Article -
35
Toward efficient authentication for space-air-ground integrated Internet of things
Published 2019-07-01“…While space-air-ground integrated Internet of things is promising to be very useful in many aspects, its deployment and application should overcome severe security threats, for example, interceptions, identity forgery, data tampering, and so on. Authentication is an essential step to protect the Internet of things security, and mutual authentication (i.e. two-way authentication) is especially important to ensure the security of both communication parties simultaneously. …”
Get full text
Article -
36
Problematic issues related to forensic examination of written language and handwriting in pre-trial investigation
Published 2023-12-01“…The article investigates the peculiarities of forensic methods of examination of written language and handwriting objects to be taken into account by officials who, in particular, conduct pre-trial investigation of criminal offences committed with the use of ordinary or forged written documents, handwriting forgery, and other criminal methods of their use with a view to qualitative preparation and conduct of relevant handwriting and authenticity examinations. …”
Get full text
Article -
37
Application of expert opinion in investigation and proof of criminal offences against justice
Published 2024-12-01“…Another typical method used in the investigation of criminal offences against justice is the technical examination of a document, which is aimed at confirming/refuting the fact of its forgery. The author believes that further research on the issues raised should be aimed at identifying typical mistakes made by the inquiry and investigation authorities which affect the ability to solve expert tasks in this category of criminal offences.…”
Get full text
Article -
38
The Fake Diary of a Historical Figure: Klementyna Tańska-Hoffmanowa’s Journal of Countess Françoise Krasińska (1825)
Published 2016-03-01“…In my paper, I wish to discuss the Journal’s precarious balance between historical fact and fiction as well as examining the ways in which this autobiographical forgery is enacted. …”
Get full text
Article -
39
Rancang Bangun Website Akademik dengan Penyimpanan Sertifikat Digital Menggunakan Teknologi Blockchain
Published 2022-02-01“…Certificates must be created and stored with good methods and security to prevent changes in content or even forgery. Blockchain technology is technology that allows secure storage processes at a low cost. …”
Get full text
Article -
40
Blockchain-Based Value-Added Tax System: A Systematic Review
Published 2024-06-01“…By identifying existing challenges in electronic invoices, such as transaction forgery, the long process of issuing electronic invoices, and hacking of the central database, blockchain technology, with its features like decentralization, tamper-proofness, transparency, and automation, emerges as a suitable solution. …”
Get full text
Article