Search results for "Crypt"
showing 10 items of 1111 documents
>3 + 1 = 6 + 2> In Cu(ii) coordination chemistry of 1H-pyrazole aza cryptands
2015
A polyazamacrocycle formed from two tris(2-aminoethyl)amine units connected by 1H-pyrazole units shows unique hexanuclear Cu(ii) complexes by combination of two binuclear Cu(ii) cryptand complexes through pyrazolate moieties belonging to both cryptands. The formation of these dimeric entities has been proven both in solution by potentiometric studies and mass spectroscopy and in the solid state by X-ray diffraction of crystals of three different batches of formulae [Cu6(H-3L)2(H2O)2](TsO)6·22H2O (2), [Cu6(H-3L)2(NO3)2](NO3)4·2H2O (3) and [Cu6(H-3L)2Cl2]Cl4·(C4H5N3O2)2·14.35H2O (4). The hexanuclear unit in 2 and 4 can be viewed like three magnetically independent binuclear complexes with J =…
Antecedents of the Barriers Toward the Adoption of Unified Payment Interface
2020
This study examines the influence of factors related to consumer resistance on the intention to continue using the Unified Payment Interface (UPI) for electronic payments. UPI facilitates advanced, peer-to-peer, immediate payment with seamless interoperability among banks in India. The study extends the innovation resistance theory by including two behavioral measures - privacy concerns and visibility - and two moderators - security concerns and word of mouth (WOM). It used cross-sectional data collected from 714 UPI users aged between 16 and 55 years to test the proposed research model. The findings suggest that privacy concerns and usage barrier are the two crucial factors to be addressed…
Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs
2013
Unattended Wireless Sensor Networks (UWSNs), characterized by the absence of real-time communication between sensors and sinks, impose sensors to retain data till the next visit of a mobile sink to off-load their data. In such networks, if a sensor is compromised, data accumulated in the sensor are exposed to attackers. In addition, by holding the secret key of the compromised sensor, attackers can also learn post-compromise data accumulated by the sensor. Furthermore, once sensors stop working due to, for instance, node crash or battery depletion, all the accumulated data will be lost. In this paper, we propose a secure and reliable data distribution scheme that addresses these challenges.…
Detection and visualization of physical knots in macromolecules
2010
Abstract This manuscript provides a pedagogical introduction on how to determine and visualize simple physical knots occurring in polymers, proteins and DNA. We explain how the Alexander polynomial is computed and implemented in a simulation code, and how the structure can be simplified beforehand to save computer time. The concept of knottedness can also be extended in a statistical framework to chains which are not closed. The latter is exemplified by comparing statistics of knots in open random walks and closed random loops.
A knowledge-based exploratory framework to study quality of Italian mobile telecommunication services
2017
A novel two-step knowledge-based exploratory framework is proposed in this paper for studying quality of Italian Mobile Telecommunication Services (MTSs). Particularly, the Delphi technique is initially considered to finalize an overall quality structure of MTSs features, indicators and drivers, herein described on the basis of a comprehensive review of the fundamental references for the field, and also to select the key elements with reference to the Italian context. At the second step, selected key elements are prioritized via the Analytic Hierarchical Process (AHP) method according to viewpoints of the fundamental stakeholders for the sector. Furthermore, possible uncertainty and ambigui…
Access Control Model for Cooperative Healthcare Environments: Modeling and Verification
2016
Integrated use of electronic health records (EHRs) seem both promising and necessary in improving the quality and delivery of health services. This allows healthcare providers access to information they require to provide rapid patient care. Of course, when sensitive information is shared among a group of people within or across organizations, enforceable security and privacy control over the information flow is a key aspect. In this study, an access control model for cooperative healthcare environments is presented. A work-based access control (WBAC) model is proposed by introducing the concept of team role and modifying the user-role assignment model from previous work. Verification indic…
APPROACHES TO IMPROVED INSTITUTIONAL MECHANISMS IN TRAINING LABOUR FORCE TO PROMOTE INNOVATION
2012
The paper deals with the approaches for satisfying the need for the training of modern labour force capable of implementing innovation. The focus of the research is the existing and potentially new institutional mechanisms for enhanced co-operation among the various key stakeholders. The authors’ assumption is that more co-operation between the higher education and research system on the one hand, and the vocational education system on the other hand, would have a beneficial influence on the overall labour force training at all levels to promote innovation. Therefore, the target group for the empirical study of the present research have been medium and high level public administrators in bo…
Introducing SD modelling into planning and control systems to manage SMEs' growth: a learning-oriented perspective
2002
This article emphasises the need for a learning-oriented approach to planning and control as a prerequisite for SMEs’ survival and growth. Such a perspective can be effectively pursued through the development of interactive learning environments linking system dynamics (SD) and accounting models, which provide two complementary views of business phenomena. In order to properly support the drawing up of business plans and the evaluation of results associated with their implementation, the use of financial SD models embodying the accounting perspective is recommended. This is likely to enhance a shift in SME key actors’ minds, as they will be able to analyse under the feedback view financial …
Tension in the data environment: How organisations can meet the challenge
2022
Big Data is becoming ubiquitous - widely applied across organisations, industry sectors and society. However, the opportunities and risks it presents are not yet fully understood. In this paper we identify and explore the tensions that Big Data can create at multiple levels, focusing on the need for organisations to meet the challenges that can arise. We draw on insights from twelve papers published in the Special Issue of Technological Forecasting & Social Change entitled “Tension in the Data Environment: Can Organisations Meet the Challenge?” in order to build a ‘Multi-Layer Tensions Model’ that highlights key pressures and challenges in the BD environment. We find evidence of tensions of…
A triplet under focus:Innovation, design and the city
2018
Three key concept domains are considered and explored in a unitary framework. They are: innovation, the only possible response to global crises, aiming at transforming behaviours and practices towards systemic changes and transition; design, a way of creatively conceiving, developing and driving forward new practices for undertaking large scale transitions; and cities, seen as the environments where problems present themselves in the most socially relevant way and at the same time as key opportunities for testing and adopting forms of innovation which target global challenges. The chapter positions the three key concepts in relation to the most relevant academic references and to the curren…