Literatura académica sobre el tema "Counterfeit Coin"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Counterfeit Coin".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Counterfeit Coin"
Bignon, Vincent y Richard Dutu. "COIN ASSAYING AND COMMODITY MONEY". Macroeconomic Dynamics 21, n.º 6 (10 de junio de 2016): 1305–35. http://dx.doi.org/10.1017/s1365100515000875.
Texto completoBoiko-Gagarin, Andrii. "Features of Linguistic Terminology Regarding Counterfeiters in the Russian and Austro-Hungarian Empires in the XIX – early XX centuries". Ethnic History of European Nations, n.º 60 (2020): 55–63. http://dx.doi.org/10.17721/2518-1270.2020.60.06.
Texto completoIwama, Kazuo, Harumichi Nishimura, Rudy Raymond y Junichi Teruyama. "Quantum counterfeit coin problems". Theoretical Computer Science 456 (octubre de 2012): 51–64. http://dx.doi.org/10.1016/j.tcs.2012.05.039.
Texto completoHalbeisen, Lorenz y Norbert Hungerbühler. "The general counterfeit coin problem". Discrete Mathematics 147, n.º 1-3 (diciembre de 1995): 139–50. http://dx.doi.org/10.1016/0012-365x(94)00232-8.
Texto completoSniedovich, Moshe. "OR/MS Games: 3. Counterfeit Coin Problem". INFORMS Transactions on Education 3, n.º 2 (enero de 2003): 32–41. http://dx.doi.org/10.1287/ited.3.2.32.
Texto completoDaubney, Adam. "A Gold Roman Coin-Ring from Benniworth, Lincolnshire". Antiquaries Journal 89 (7 de agosto de 2009): 69–71. http://dx.doi.org/10.1017/s0003581509990035.
Texto completoWang, Ting y Hao Wang. "Research on Electronic Coin Recognition System Based on STC89C52". Applied Mechanics and Materials 713-715 (enero de 2015): 432–36. http://dx.doi.org/10.4028/www.scientific.net/amm.713-715.432.
Texto completoChen, Zi Wei, Jin Tian Yun y Jun Bao Gu. "The Algorithm Research of Coin Detection Based on DSP". Applied Mechanics and Materials 29-32 (agosto de 2010): 1229–34. http://dx.doi.org/10.4028/www.scientific.net/amm.29-32.1229.
Texto completoSarkar, Jyotirmoy y Bikas K. Sinha. "Weighing designs to detect a single counterfeit coin". Resonance 21, n.º 2 (febrero de 2016): 125–50. http://dx.doi.org/10.1007/s12045-016-0306-8.
Texto completoLiu, Wen An, Huan Huan Cui y Bing Qing Ma. "Searching for a counterfeit coin with b-balance". Discrete Applied Mathematics 154, n.º 14 (septiembre de 2006): 2010–23. http://dx.doi.org/10.1016/j.dam.2006.03.010.
Texto completoTesis sobre el tema "Counterfeit Coin"
Aydin, Mahmut. "Authenticity Of Roman Imperial Age Silver Coins Using Non-destructive Archaeometric Techniques". Phd thesis, METU, 2013. http://etd.lib.metu.edu.tr/upload/12615717/index.pdf.
Texto completoit is particularly important in Turkey for historical metal objects. Traditionally used visual inspection methods alone are not sufficient for the solution of contemporary problems. In this study, chemical characterization has been used to determine the differences between the authentic and fake objects. The non-destructive analyses were carried out by Portable X-ray Fluorescence Spectrometry (P-XRF). Silver Roman Coins (27 B.C. to 244 A.D.) were the objects handled in this research. In particular the concentrations of Zr, Pt, Pb and Bi were used for differentiation
it has been observed that the concentrations have different trends in the authentic and fake silver coins. In authentic coins the average Pb concentration was found to be 0.77%, while this value was 0.055% for the fake ones. Bi could be determined in 86% of the authentic coins while it could not be detected in any fake coin. It has been generally observed that the silver and copper concentrations could not be utilized in authenticity tests. Another approach was the use of Line Scanning Electron Microscopy-Energy Dispersive X-Ray Fluorescence Spectrometry (LSEM-EDX). Using LSEM-EDX technique, it was observed that the concentration changes near the interface between the matrix and the copper-rich locations exhibits difference behaviors for the authentic and fake objects. This difference is originated by the fact that a newly formed copper amalgam contains copper-rich phases while with extended time concentration changes at interfaces become more gradual or not detectable. Pearson correlation was used in order to elucidate the relations between the element concentrations determined by P-XRF. In order to see whether the authentic and silver fake coins can form separate groups, dendograms have been constructed utilizing SPSS 16.0 software and Euclidian Square Distance method. It has been observed that the authentic and fake coins can be successfully grouped when the proper statistical choices are used. It has been observed that these groups have significant differences using t-test. The selected and used technology is proposed for use by museums and entities keeping archaeological collections in order to prevent forgeries.
Tansel, Icten. "Differentiation And Classification Of Counterfeit And Real Coins By Applying Statistical Methods". Master's thesis, METU, 2012. http://etd.lib.metu.edu.tr/upload/12614417/index.pdf.
Texto completoten M.Sc, Archaeometry Graduate Program Supervisor : Assist. Prof. Dr. Zeynep Isil Kalaylioglu Co-Supervisor : Prof. Dr. Sahinde Demirci June 2012, 105 pages In this study, forty coins which were obtained from Museum of Anatolian Civilizations (MAC) in Ankara were investigated. Some of those coins were real (twenty two coins) and the remaining ones (eighteen coins) were fake coins. Forty coins were Greek coins which were dated back to middle of the fifth century BCE and reign of Alexander the Great (323 &ndash
336 BCE). The major aims of this study can be summarized as follow
Tresánchez, Ribes Marcel. "Aplicación de sensores de flujo óptico para el desarrollo de nuevos sistemas de medida de bajo coste". Doctoral thesis, Universitat de Lleida, 2011. http://hdl.handle.net/10803/53078.
Texto completoEn esta memoria se presentan diversos trabajos de investigación relacionados con la utilización de sensores de flujo óptico de bajo coste para el desarrollo de nuevos sistemas de medida compactos y de muy bajo coste. Las aplicaciones planteadas permiten aprovechar todo el potencial industrial de este tipo de sensores. Los sensores de flujo óptico tienen la particularidad de incorporar dentro de un único encapsulado un sistema de adquisición de imágenes y un procesador digital preprogramado para realizar el cómputo de flujo óptico (optical flow) de la imagen. De esta manera, este tipo de sensores no requieren ningún sistema procesador adicional y, en algunos casos, pueden funcionar sin ningún otro elemento adicional de control. Actualmente, el éxito comercial de los sensores de flujo óptico ha facilitado su producción industrial masiva con costes de fabricación muy bajos lo que ha incentivado el desarrollo de nuevas aplicaciones en campos tan diversos como la robótica donde el coste es un elemento fundamental en las aplicaciones destinadas a un mercado de consumo. En esta memoria se presenta, por un lado, el análisis del estado del arte de los sensores de flujo óptico y sus aplicaciones, y por el otro, el trabajo de investigación realizado sobre la utilización del sensor para el desarrollo de un codificador rotativo incremental, un codificador absoluto, un sistema de detección de monedas falsas de 2 euros y para realizar el seguimiento de la pupila del ojo de una persona con el fin de desarrollar un dispositivo apuntador que pueda ser de utilidad para una persona con discapacidad. Los resultados obtenidos en las pruebas experimentales realizadas con los diferentes sensores de flujo óptico utilizados en los dispositivos propuestos han permitido validar las propuestas realizadas y la versatilidad del diseño del sensor.
This work presents the research performed with optical flow sensors and the proposal of several new compact and low cost applications developed to take full advantage of the industrial potential of these sensors. Optical flow sensors include into the same chip an image acquisition system and a digital signal processor programmed to compute the optical flow of the image acquired. These sensors do not require additional post-processing and can operate without any other additional external control or processing device. Currently, the commercial success of the optical flow sensors has fostered its massive industrial production and has reduced its final cost. This characteristic, combined with the versatility of the design of the sensor, has also fostered the development of a huge range of new applications in different areas, such as robotics, where the cost is a fundamental factor that prone the development and commercialization of new consumer applications. This works presents, in one hand, a review of the state of the art of the research and development related with optical flow sensors and, in the other hand, a set of new applications proposed to take full advantage of the characteristics of the sensor. The new applications proposed are: a relative encoder, an absolute encoder, a counterfeit system for the 2€ case, and an accessibility device that tracks the pupil of the user to control pointer displacement in a computer screen. This device has been designed specifically to help people with mobility impairments in the upper extremities that cannot use the computer mouse. In all cases, the experimental results achieved with the different optical flow sensors used in the new applications proposed have validated the utility and versatility of each proposal and the utility and versatility of the design of this optical sensor.
Kampf, Raymond William. "Fauxtopia". VCU Scholars Compass, 2004. http://scholarscompass.vcu.edu/etd/749.
Texto completoChen, Chih-Ming y 陳志銘. "Counterfeit Coin Detection System Based on Audio and Image Analysis". Thesis, 2013. http://ndltd.ncl.edu.tw/handle/09743824432183208460.
Texto completo國立高雄應用科技大學
電機工程系博碩士班
101
Abstract The purpose of this research is to combine mechanical, electronic and image analysis systems in order to achieve a better ratio of coin recognition. The experimental materials being used are NT dollars, counterfeit coins and tokens which are verified by some kind of coin validator(CVR) with true coin results. Using a microphone and webcam, the experimental materials were recorded, capturing their tap iron sounds and both sides of images. The main system framework recognized the coins by writing programs to get feature values of sounds, images and uses a propagation neural network. CVR was used in the experiment which was combined with the mechanical and electronic systems. This system was widely used in vending machine devices around the world since the year 2000. It used a condenser microphone to test the waveform, infrared light to test the diameter of the coin; and coils to measure the coin materials for frequencies and permeability. The microprocessor compares the data extracted from the measurements with data previously programmed into its memory during the manufacturing process. This allows it to verify the validity or nullity of the inserted coin. Therefore, CVR can eliminate efficiently the counterfeit coins and tokens. Since the skills and technology of making counterfeit coins are getting better and better, the coin validator, system combining with the mechanic and electronic, might not be able to recognize the coins completely. In our system, we use MATLAB -R2010b to develop our program. As for the image, the front and the back images of the New Taiwan dollar is captured by WEBCAM, followed by doing image processing: first, use circle detect of Gaussian function to get the image’s position and size; second, zoom in or out to adjust the image size to 100 x100; third, do the erosion and expansion; fourth, rotate the coin’s image every five degrees to increase the samples; and finally, every image is divided into 25 image’s blocks(20 x20), then the average values of the image’s blocks are vectorized as a 1 x400 feature vector. As for the audio, the microphone records the sound of the coin hitting the iron, then followed by system processing: first, detect start and end point; second, measure audio frames; third, enhance high-frequencies; fourth, execute Hamming window; and finally, use Mel-Frequency Coefficients to extract 13-dimensional features. After the processing, using the obtained features of sound and image feature vector as the input value of the back-propagation neural network, they can then be conducted into the Artificial Neural Network for training and classification. Through the experimental evidence of this study, it can indeed effectively enhance the identification of authentic coins. Keywords: coin recognition、Ann.、images、audio、feature vector(value).
Lee, Li-Chung y 李立中. "The Design and Analysis of Algorithm for the Counterfeit Coins Problem". Thesis, 2002. http://ndltd.ncl.edu.tw/handle/43191910786827854125.
Texto completo國立臺灣師範大學
資訊教育研究所
90
The counterfeit coin problem is a well-known problem. There are some people who have tried to make the problem more challenging by adding more constraints on the problem. There are also a lot of people presenting different algorithms for variants of the problem. In this paper, we will propose some algorithms and strategies to solve some sort of the counterfeit coin problems, including the 2-counterfeit coins problem with unknown weight, and the k-counterfeit coins with known weight, where k 3. In addition, we will provide the analysis of the algorithms for these counterfeit coins problems. According to the analysis, we will know the theoretical lower bound of the numbers of the weighting when we are looking for the counterfeit coins in a mass of coins. Thus, we will know which strategy of the problem might be further improved.
Tsai, Liu Yao y 劉耀才. "The Designs and Analyses of Improved Algorithms for the Counterfeit Coins Problem". Thesis, 2005. http://ndltd.ncl.edu.tw/handle/46561885808396749782.
Texto completo國立臺灣師範大學
資訊工程研究所
93
The counterfeit coin problem is a well-known problem. There are some people who have tried to make the problem more challenging by adding some constraints for the problem. There are also a lot of researchers presenting different algorithms for variants of the problem. In this paper, we propose some improved algorithms and strategies to solve some kinds of the counterfeit coin problems, including the 2-cointerfeit coins problem with unknown weight、the 3-cointerfeit coins problem with known weight、the 3-cointerfeit coins problem with unknown weight、the 4-cointerfeit coins problem with known weight、the 4-cointerfeit coins problem with unknown weight. We also tackle the k-counterfeit coins problem with unknown weight by improving the algorithm proposed by Li-Jhong Li, in which he only dealed with the k-counterfeit coins problem with known weight, . In addition, we provide the analyses of the algorithms for these counterfeit coins problems. According to the analyses, we will know the theoretical lower bound of the numbers of weightings to identify the counterfeit coins in a mass of coins. Thus, we will know which strategy of the problem might be further improved.
Libros sobre el tema "Counterfeit Coin"
The criminal classes in India: With appendices regarding some foreign criminals who occasionally visit the presidency, including hints on the detection of counterfeit coin, with illustrations. Delhi: Mittal Publications, 1985.
Buscar texto completoUnited States gold counterfeit detection guide. Atlanta: Whitman Pub., 2005.
Buscar texto completoProkopov, Ili︠a︡. Contemporary coin engravers and coin masters from Bulgaria "Lipanoff" Studio. Sofia: Stoyan Popov-Popeto, 2004.
Buscar texto completoProkopov, Ili︠a︡. Counterfeit studios and their coins: Handbook of the individual collector. Sofia: SP-P, 2005.
Buscar texto completoSayles, Wayne G. Classical deception: Counterfeits, forgeries, and reproductions of ancient coins. Iola, WI: Krause, 2001.
Buscar texto completoProkopov, Ili︠a︡. Modern counterfeits and replicas of ancient Greek and Roman coins from Bulgaria. Sofia: Stoyan Popov, 2003.
Buscar texto completoThe cheat in your change: How to spot fake pound coins. Biggin Hill: Envoy Publicity, 2005.
Buscar texto completoAnton, William T. The forgotten coins of the North American colonies: A modern survey of early English and Irish counterfeit coppers circulating in the Americas. Iola, WI: Krause Publications, 1992.
Buscar texto completoUnited States. Congress. House. Committee on Financial Services. Subcommittee on Domestic and International Monetary Policy, Trade, and Technology. Money matters: Coin and counterfeiting issues : hearing before the Subcommittee on Domestic and International Monetary Policy, Trade and Technology of the Committee on Financial Services, U.S. House of Representatives, One Hundred Eighth Congress, second session, April 28, 2004. Washington: U.S. G.P.O., 2004.
Buscar texto completoProber, Kurt. "Obsidionais": As primeiras moedas do Brasil : falsificadas, autênticas. Paquetá: K. Prober, 1987.
Buscar texto completoCapítulos de libros sobre el tema "Counterfeit Coin"
Iwama, Kazuo, Harumichi Nishimura, Rudy Raymond y Junichi Teruyama. "Quantum Counterfeit Coin Problems". En Algorithms and Computation, 85–96. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17517-6_10.
Texto completoHu, X. D. y F. K. Hwang. "A Competitive Algorithm for the Counterfeit Coin Problem". En Nonconvex Optimization and Its Applications, 241–50. Boston, MA: Springer US, 1995. http://dx.doi.org/10.1007/978-1-4613-3557-3_16.
Texto completoKelley, Dean, Peng-Jun Wan y Qifan Yang. "A 23 log 3-competitive algorithm for the counterfeit coin problem". En Lecture Notes in Computer Science, 436–45. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/bfb0030863.
Texto completoRad, Maryam Sharifi, Saeed Khazaee, Li Liu y Ching Y. Suen. "A Blob Detector Images-Based Method for Counterfeit Coin Detection by Fuzzy Association Rules Mining". En Pattern Recognition and Artificial Intelligence, 669–84. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59830-3_58.
Texto completoXiaoping, Bai y Ke Rui. "A New Integer Programming Model about Counterfeit Coin Problem Based on Information Processing Method and Its General Solution". En Communications in Computer and Information Science, 508–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19853-3_74.
Texto completoLing, Jiang y Shan Juan. "Every Coin has Two Sides: The Negative Effects of Brand Social Power, the Dual Character of Face, and Counterfeit Luxury Consumption: An Abstract". En Marketing Opportunities and Challenges in a Changing Global Marketplace, 589–90. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-39165-2_243.
Texto completoKhazaee, Saeed, Maryam Sharifi Rad y Ching Y. Suen. "Detection of Counterfeit Coins Based on Modeling and Restoration of 3D Images". En Computational Modeling of Objects Presented in Images. Fundamentals, Methods, and Applications, 178–93. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54609-4_13.
Texto completoGarshott, Danielle M., Elizabeth MacDonald, Meghann N. Murray y Mark A. Benvenuto. "Chemical Composition of a Series of Siamese Bullet Coins: A Search for Contemporary Counterfeits". En ACS Symposium Series, 185–96. Washington, DC: American Chemical Society, 2012. http://dx.doi.org/10.1021/bk-2012-1103.ch011.
Texto completoMartell, James. "Baudelaire’s Mother as Counterfeit Coin". En Modernism, Self-Creation, and the Maternal, 25–54. Routledge, 2019. http://dx.doi.org/10.4324/9780429200861-3.
Texto completoSahlins, Marshall. "Counterfeit COIN and the State of Nature Effect". En Reconsidering American Power, 465–87. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780199490585.003.0015.
Texto completoActas de conferencias sobre el tema "Counterfeit Coin"
Gavrijaseva, A. y O. Martens. "Image based counterfeit coin validation". En 2014 14th Biennial Baltic Electronic Conference (BEC). IEEE, 2014. http://dx.doi.org/10.1109/bec.2014.7320579.
Texto completoLeich, Marcus, Stefan Kiltz, Christian Krätzer, Jana Dittmann y Claus Vielhauer. "Preliminary study of statistical pattern recognition-based coin counterfeit detection by means of high resolution 3D scanners". En IS&T/SPIE Electronic Imaging, editado por J. Angelo Beraldin, Geraldine S. Cheok, Michael B. McCarthy, Ulrich Neuschaefer-Rube, Atilla M. Baskurt, Ian E. McDowall y Margaret Dolinsky. SPIE, 2011. http://dx.doi.org/10.1117/12.872360.
Texto completoNegka, Lydia, Georgios Gketsios, Nikolaos A. Anagnostopoulos, Georgios Spathoulas, Athanasios Kakarountas y Stefan Katzenbeisser. "Employing Blockchain and Physical Unclonable Functions for Counterfeit IoT Devices Detection". En COINS '19: INTERNATIONAL CONFERENCE ON OMNI-LAYER INTELLIGENT SYSTEMS. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3312614.3312650.
Texto completo