Search results for "Crypt"

showing 10 items of 1111 documents

First-Order Calculus on Metric Measure Spaces

2020

In this chapter we develop a first-order differential structure on general metric measure spaces. First of all, the key notion of cotangent module is obtained by combining the Sobolev calculus (discussed in Chap. 2) with the theory of normed modules (described in Chap. 3). The elements of the cotangent module L2(T∗X), which are defined and studied in Sect. 4.1, provide a convenient abstraction of the concept of ‘1-form on a Riemannian manifold’.

Sobolev spaceMetric (mathematics)CalculusKey (cryptography)Trigonometric functionsDifferential structureRiemannian manifoldMathematics::Symplectic GeometryMeasure (mathematics)MathematicsAbstraction (mathematics)
researchProduct

Multilayer Network Analysis: The Identification of Key Actors in a Sicilian Mafia Operation

2021

Recently, Social Network Analysis studies have led to an improvement and to a generalization of existing tools to networks with multiple subsystems and layers of connectivity. These kind of networks are usually called multilayer networks. Multilayer networks in which each layer shares at least one node with some other layer in the network are called multiplex networks. Being a multiplex network does not require all nodes to exist on every layer. In this paper, we built a criminal multiplex network which concerns an anti-mafia operation called “Montagna” and it is based on the examination of a pre-trial detention order issued on March 14, 2007 by the judge for preliminary investigations of t…

Social and Information Networks (cs.SI)FOS: Computer and information sciencesPhysics - Physics and SocietyFocus (computing)Settore INF/01 - InformaticaMultilayer networksComputer sciencebusiness.industryNode (networking)Criminal networks; Multilayer networks; Social network analysisSocial network analysis (criminology)FOS: Physical sciencesComputer Science - Social and Information NetworksPhysics and Society (physics.soc-ph)Criminal networksSocial network analysisIdentification (information)PhoneKey (cryptography)Layer (object-oriented design)businessNetwork analysisComputer network
researchProduct

Secrets to design an effective message on Facebook: an application to a touristic destination based on big data analysis

2018

The objective of this research is to identify which are the key variables for designing a message in a social network that can be used by an advertiser to generate Positive/Negative Engagement. The...

Social networkComputer sciencebusiness.industry05 social sciencesGeography Planning and DevelopmentBig dataWorld Wide WebTourism Leisure and Hospitality Management0502 economics and businessKey (cryptography)050211 marketingSocial mediabusiness050212 sport leisure & tourismCurrent Issues in Tourism
researchProduct

Does the platform matter? Social media and COVID-19 conspiracy theory beliefs in 17 countries

2021

While the role of social media in the spread of conspiracy theories has received much attention, a key deficit in previous research is the lack of distinction between different types of platforms. This study places the role of social media affordances in facilitating the spread of conspiracy beliefs at the center of its enquiry. We examine the relationship between platform use and conspiracy theory beliefs related to the COVID-19 pandemic. Relying on the concept of technological affordances, we theorize that variation across key features make some platforms more fertile places for conspiracy beliefs than others. Using data from a crossnational dataset based on a two-wave online survey cond…

Sociology and Political ScienceCoronavirus disease 2019 (COVID-19)teorías conspirativasConspiracy theorysocial mediaaffordancesPandemia de COVID-19 2020-oferimentsCOVID-19 Pandemic 2020-10240 Department of Communication and Media Researchconspiracy theories3312 Sociology and Political SciencePandèmia de COVID-19 2020-Social mediateories conspirativesSociologypercepción erróneaAffordance070 News media journalism & publishingCOVIDCommunicationCOVID-19misperceptionsofrecimientosEpistemologyddc:19Mass communicationsKey (cryptography)percepció erròniaAffordances3315 Communication
researchProduct

Definition and Holders of Key Functions

2015

This chapter takes up the four key functions established in the Solvency II Directive. In this vein, the significance of the key functions is highlighted first. Then follows the analysis of the terms “key function” and “key function holders”, terms undefined in the Solvency II Directive. The next step points out the distinctions among key function holders and their subordinate staff members. A part of this breakdown is to examine in practice who exercises which function in an insurance undertaking. The chapter wraps up by looking at whether key functions are performed in a centralized or decentralized organization.

SolvencyProcess managementInternal auditSupervisory boardmedia_common.quotation_subjectKey (cryptography)BusinessFunction (engineering)DirectiveDecentralizationmedia_common
researchProduct

Development of the BCI Device Controlling C++ Software, Based on Existing Open Source Projects

2021

The possibility of using the BCI open source code for building BCI controlled device, based on small AVR or ARM microcontrollers was considered. Some techniques to extract code snippets from other BCI projects were presented in the case of OpenViBE as the code donor. Problem with obtaining driver source codes for factory BCI devices has been pointed out.

Source codeOpenVibeInformationSystems_INFORMATIONINTERFACESANDPRESENTATION(e.g.HCI)Computer sciencebusiness.industrymedia_common.quotation_subjectBCI driversMicrocontrollerInformationSystems_MODELSANDPRINCIPLESSoftwareDevelopment (topology)BCI softwareEmbedded systemCode (cryptography)Factory (object-oriented programming)BCIbusinessBrain–computer interfacemedia_common
researchProduct

CCDC 1428618: Experimental Crystal Structure Determination

2015

Related Article: Angélique Lascaux, Gaël De Leener, Luca Fusaro, Filip Topić, Kari Rissanen, Michel Luhmer, Ivan Jabin|2016|Org.Biomol.Chem.|14|738|doi:10.1039/C5OB02067K

Space GroupCrystallographyCrystal SystemCrystal Structure3915354156-hexa-t-butyl-526061-trimethoxy-193146-trioxa-22252849-tetraazanonacyclo[23.19.7.71733.1711.13943.15458.0545.01318.03237]henhexaconta-1(45)247(60)81013151732343639(52)404254(61)5557-octadecaene-232750-trione calix[6]cryptamide imidazolidin-2-one chloroform pentane solvateCell ParametersExperimental 3D Coordinates
researchProduct

CCDC 1428619: Experimental Crystal Structure Determination

2015

Related Article: Angélique Lascaux, Gaël De Leener, Luca Fusaro, Filip Topić, Kari Rissanen, Michel Luhmer, Ivan Jabin|2016|Org.Biomol.Chem.|14|738|doi:10.1039/C5OB02067K

Space GroupCrystallographyCrystal SystemCrystal StructureCell ParametersExperimental 3D Coordinates3915354156-hexa-t-butyl-526061-trimethoxy-193146-trioxa-22252849-tetraazanonacyclo[23.19.7.71733.1711.13943.15458.0545.01318.03237]henhexaconta-1(45)247(60)81013151732343639(52)404254(61)5557-octadecaene-232750-trione calix[6]cryptamide imidazolidin-2-one chloroform diisopropyl ether solvate
researchProduct

Single-channel polychromatic pattern recognition by the use of a joint-transform correlator.

2010

We present a single-channel system for color image recognition that is based on a joint-transform correlator setup. The color images are encoded as phase and amplitude functions, inspired from the Munsell color representation. A real-time implementation of the new codification method can be achieved by the use of a spatial light modulator operating in phase-only modulation mode. We determine the optimal codification for a linear color-phase code. Its performance is compared with a conventional multichannel correlator by means of computer simulations. Experimental results are also presented.

Spatial light modulatorChannel (digital image)Color imageComputer sciencebusiness.industryMaterials Science (miscellaneous)ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONPhase (waves)Industrial and Manufacturing EngineeringOpticsModulationPattern recognition (psychology)Code (cryptography)Business and International ManagementJoint (audio engineering)businessApplied optics
researchProduct

Phylogeny and morphology of Anthracoidea pamiroalaica sp. nov. infecting the endemic sedge Carex koshewnikowii in the Pamir Alai Mts (Tajikistan)

2015

A novel Anthracoidea species, A. pamiroalaica on the endemic sedge Carex koshewnikowii, is described and illustrated from the Pamir Alai Mts in Tajikistan (Central Asia). The new species is phenotypically nearly identical with Anthracoidea sempervirentis, but clearly divergent genetically. Phylogenetic analyses based on LSU sequences showed affinity of Anthracoidea pamiroalaica to A. baldensis, A. rupestris, A. capillaris, and A. vankyi infecting host sedges in different Carex sections (Baldenses, Rupestres, Chlorostachyae, and Phaestoglochin, respectively), but not to A. misandrae, and A. sempervirentis, two sequenced species parasitic on host species from the section Aulocystis. This phyl…

Species complexCarexPhylogenetic treeUstilaginalesPlant ScienceBiologybiology.organism_classificationAgricultural and Biological Sciences (miscellaneous)CarexCentral AsiaPhylogeneticsCryptic speciesBotanyPlant pathogensSmut fungiTaxonomy (biology)AnthracoideaUstilaginalesEndemismEcology Evolution Behavior and SystematicsAnthracoideaMycological Progress
researchProduct