Search results for "Crypt"
showing 10 items of 1111 documents
Exploitation of cryptocurrencies as a tool for tax evasion: technological and regulatory issues
2020
Tax evasion is a crime that harms the national economies, society and indirectly affects all the residents of each state. Now that after a long time of international efforts the traditional tax evasion tools have eventually been put under a reasonable control, a new technology has emerged able to facilitate efficient tax evasion. The main objectives of this research are to identify the regulatory challenges of the non-precedent technology, to analyse the applicability of the current EU legislation aimed at tax evasion prevention to the exploitation of cryptocurrencies, and to assess the recommendations of academics and international organizations for a possible future regulation. This resea…
The principal as a key actor in promoting teachers’ innovativeness – analyzing the innovativeness of teaching staff with variance-based partial least…
2018
The study examines the correlation between collective innovativeness of the teaching staff and the principal’s leadership style as well as additional school structure characteristics. The construct...
Mainz Rolling Brains
2000
Our agent team is the result of a development which had to take place under tight time limitations. The total development time available was slightly less than three months where over most of the time the team developers could invest no more than a few hours per week. The code was developed from scratch to improve over the design and quality of last year’s code. Thus one of the challenges was to keep a smooth development line and to avoid dead ends in the development, as well as to maintain a development environment in which a larger number of developers could work productively.
Modelling the Interaction between Air Pollutant Emissions and Their Key Sources in Poland
2021
The main purpose of this study is to investigate the relationships between key sources of air pollutant emissions (sources of energy production, factories which are particularly harmful to the environment, the fleets of cars, environmental protection expenditure) and the main environmental air pollution (SO2, NOx, CO and PM) in Poland. Models based on MLP neural networks were used as predictive models. Global sensitivity analysis was used to demonstrate the significant impact of individual network input variables on the output variable. To verify the effectiveness of the models created, the actual data were compared with the data obtained through modelling. Projected courses of changes in t…
Shedding Light on Graphene Quantum Dots: Key Synthetic Strategies, Characterization Tools, and Cutting-Edge Applications
2021
During the last 20 years, the scientific community has shown growing interest towards carbonaceous nanomaterials due to their appealing mechanical, thermal, and optical features, depending on the specific nanoforms. Among these, graphene quantum dots (GQDs) recently emerged as one of the most promising nanomaterials due to their outstanding electrical properties, chemical stability, and intense and tunable photoluminescence, as it is witnessed by a booming number of reported applications, ranging from the biological field to the photovoltaic market. To date, a plethora of synthetic protocols have been investigated to modulate the portfolio of features that GQDs possess and to facilitate the…
In vivo evaluation of three-dimensional of volumetric changes using a CAD/CAM chair-side system : technical procedure
2017
An intraoral digital scanner in combination with specialized three-dimensional surface analysis software monitors volumetric changes to soft tissues or dental restorations. This technology can evaluate the success of a specific technique or medium- or long-term clinical outcomes in both clinical and research situations. This article describes how this technology was used to provide immediate chair-side data analysis without the help of specialized laboratory support. Key words:Intraoral scanner, CAD-CAM, best fit-method, surface tessellation language.
Il ruolo del white paper sulle offerte al pubblico di cripto-attività alla luce della proposta MiCA
2022
La proposta MiCA, nel regolare il white paper sulle offerte di crypto-assets, sembra tenere in considerazione i benefici e i limiti dei sistemi di voluntary e di mandatory disclosure, non optando integralmente né per il primo, né per il secondo. In quest’ottica, se può condividersi l’approccio regolamentare diretto a graduare, a seconda della tipologia di token offerto, sia il contenuto che l’assoggettamento del documento a mera notifica o ad approvazione ex ante da parte dell’Autorità competente, dubbi sorgono in ordine all’indistinta allocazione dell’onere della prova in capo all’oblato, nei casi di violazione della disciplina del relativo white paper.
Análisis criptopaleontológico del lapidario de Teofrasto (s. III a.C.)
2013
The work “Perì líthon” or Teofrasto’s “Treatise of stones” has been considered the oldest text still available about minerals and rocks, even though it has remained incomplete. In this paper, the study of its contents shows that eleven of the stones called by geographic or cryptic names are either fossils from plants or vertebrates or chemical fossils. Therefore, the “Perì líthon” should also be considered as the oldest known treatise about palaeontology, because in addition to the fossils mentioned, it refers specifically to the fossilisation process.La obra “Perì líthon” o “Tratado de Piedras” de Teofrasto, es considerado el texto más antiguo conservado sobre minerales y rocas, aunque hay…
On the Cryptanalysis of Two Cryptographic Algorithms That Utilize Chaotic Neural Networks
2015
This paper deals with the security and efficiency issues of two cipher algorithms which utilize the principles of Chaotic Neural Networks (CNNs). The two algorithms that we consider are (1) the CNN-Hash, which is a one-way hash function based on the Piece-Wise Linear Chaotic Map (PWLCM) and the One-Way Coupled Map Lattice (OCML), and (2) the Delayed CNN-Based Encryption (DCBE), which is an encryption algorithm based on the delayed CNN. Although both of these cipher algorithms have their own salient characteristics, our analysis shows that, unfortunately, the CNN-Hash is not secure because it is neither Second-Preimage resistant nor collision resistant. Indeed, one can find a collision with …
Parallel Calculation of CCSDT and Mk-MRCCSDT Energies.
2010
A scheme for the parallel calculation of energies at the coupled-cluster singles, doubles, and triples (CCSDT) level of theory, several approximate iterative CCSDT schemes (CCSDT-1a, CCSDT-1b, CCSDT-2, CCSDT-3, and CC3), and for the state-specific multireference coupled-cluster ansatz suggested by Mukherjee with a full treatment of triple excitations (Mk-MRCCSDT) is presented. The proposed scheme is based on the adaptation of a highly efficient serial coupled-cluster code leading to a communication-minimized implementation by parallelizing the time-determining steps. The parallel algorithm is tailored for affordable cluster architectures connected by standard communication networks such as …