Search results for "Crypt"

showing 10 items of 1111 documents

Exploitation of cryptocurrencies as a tool for tax evasion: technological and regulatory issues

2020

Tax evasion is a crime that harms the national economies, society and indirectly affects all the residents of each state. Now that after a long time of international efforts the traditional tax evasion tools have eventually been put under a reasonable control, a new technology has emerged able to facilitate efficient tax evasion. The main objectives of this research are to identify the regulatory challenges of the non-precedent technology, to analyse the applicability of the current EU legislation aimed at tax evasion prevention to the exploitation of cryptocurrencies, and to assess the recommendations of academics and international organizations for a possible future regulation. This resea…

TaxationCryptocurrenciesComputingMilieux_LEGALASPECTSOFCOMPUTING:LAW/JURISPRUDENCE::Financial law [Research Subject Categories]
researchProduct

The principal as a key actor in promoting teachers’ innovativeness – analyzing the innovativeness of teaching staff with variance-based partial least…

2018

The study examines the correlation between collective innovativeness of the teaching staff and the principal’s leadership style as well as additional school structure characteristics. The construct...

Teaching staff05 social sciencesPrincipal (computer security)050301 educationRegression analysisVariance (accounting)Structural equation modelingEducation0502 economics and businessMathematics educationKey (cryptography)Leadership styleConstruct (philosophy)Psychology0503 education050203 business & managementSchool Effectiveness and School Improvement
researchProduct

Mainz Rolling Brains

2000

Our agent team is the result of a development which had to take place under tight time limitations. The total development time available was slightly less than three months where over most of the time the team developers could invest no more than a few hours per week. The code was developed from scratch to improve over the design and quality of last year’s code. Thus one of the challenges was to keep a smooth development line and to avoid dead ends in the development, as well as to maintain a development environment in which a larger number of developers could work productively.

TeamworkComputer sciencemedia_common.quotation_subjectSystems architectureCode (cryptography)Quality (business)Operations managementSimulationmedia_common
researchProduct

Modelling the Interaction between Air Pollutant Emissions and Their Key Sources in Poland

2021

The main purpose of this study is to investigate the relationships between key sources of air pollutant emissions (sources of energy production, factories which are particularly harmful to the environment, the fleets of cars, environmental protection expenditure) and the main environmental air pollution (SO2, NOx, CO and PM) in Poland. Models based on MLP neural networks were used as predictive models. Global sensitivity analysis was used to demonstrate the significant impact of individual network input variables on the output variable. To verify the effectiveness of the models created, the actual data were compared with the data obtained through modelling. Projected courses of changes in t…

TechnologyControl and OptimizationPollutant emissionsair pollutionAir pollutionEnergy Engineering and Power TechnologyMLPmedicine.disease_causefuel combustionmodellingEconometricsmedicineProduction (economics)Sensitivity (control systems)Electrical and Electronic EngineeringEngineering (miscellaneous)PollutanttransportationArtificial neural networkRenewable Energy Sustainability and the EnvironmentTemissionsneural networkshard coalVariable (computer science)Key (cryptography)Environmental scienceenergy industryEnergy (miscellaneous)Energies
researchProduct

Shedding Light on Graphene Quantum Dots: Key Synthetic Strategies, Characterization Tools, and Cutting-Edge Applications

2021

During the last 20 years, the scientific community has shown growing interest towards carbonaceous nanomaterials due to their appealing mechanical, thermal, and optical features, depending on the specific nanoforms. Among these, graphene quantum dots (GQDs) recently emerged as one of the most promising nanomaterials due to their outstanding electrical properties, chemical stability, and intense and tunable photoluminescence, as it is witnessed by a booming number of reported applications, ranging from the biological field to the photovoltaic market. To date, a plethora of synthetic protocols have been investigated to modulate the portfolio of features that GQDs possess and to facilitate the…

TechnologysynthesisComputer scienceNanotechnologyReview02 engineering and technology010402 general chemistry01 natural sciencesNanomaterialslaw.inventionlawhybrid materialsGeneral Materials Sciencedye-sensitized solar cellsMicroscopyQC120-168.85graphene quantum dotsGrapheneTunable photoluminescenceenergy storageTQH201-278.5021001 nanoscience & nanotechnologyEngineering (General). Civil engineering (General)0104 chemical sciencesCharacterization (materials science)TK1-9971Descriptive and experimental mechanicsQuantum dotKey (cryptography)Enhanced Data Rates for GSM EvolutionElectrical engineering. Electronics. Nuclear engineeringTA1-20400210 nano-technologyMaterials
researchProduct

In vivo evaluation of three-dimensional of volumetric changes using a CAD/CAM chair-side system : technical procedure

2017

An intraoral digital scanner in combination with specialized three-dimensional surface analysis software monitors volumetric changes to soft tissues or dental restorations. This technology can evaluate the success of a specific technique or medium- or long-term clinical outcomes in both clinical and research situations. This article describes how this technology was used to provide immediate chair-side data analysis without the help of specialized laboratory support. Key words:Intraoral scanner, CAD-CAM, best fit-method, surface tessellation language.

Tessellation (computer graphics)Intraoral scannerScannerProsthetic DentistryComputer sciencebusiness.industryCADCase Report030206 dentistry:CIENCIAS MÉDICAS [UNESCO]030207 dermatology & venereal diseases03 medical and health sciences0302 clinical medicineUNESCO::CIENCIAS MÉDICASKey (cryptography)Analysis softwareComputer visionArtificial intelligencebusinessGeneral DentistryComputingMethodologies_COMPUTERGRAPHICS
researchProduct

Il ruolo del white paper sulle offerte al pubblico di cripto-attività alla luce della proposta MiCA

2022

La proposta MiCA, nel regolare il white paper sulle offerte di crypto-assets, sembra tenere in considerazione i benefici e i limiti dei sistemi di voluntary e di mandatory disclosure, non optando integralmente né per il primo, né per il secondo. In quest’ottica, se può condividersi l’approccio regolamentare diretto a graduare, a seconda della tipologia di token offerto, sia il contenuto che l’assoggettamento del documento a mera notifica o ad approvazione ex ante da parte dell’Autorità competente, dubbi sorgono in ordine all’indistinta allocazione dell’onere della prova in capo all’oblato, nei casi di violazione della disciplina del relativo white paper.

The MiCa proposal in the regular white paper on crypto-assets offerings seems to take into account the benefits and limitations of voluntary and mandatory disclosure systems not opting for either the former or the latter in full. On one hand one can agree with the regulatory approach aimed at adapting the content of the white paper to the type of token offered and at making the white paper either subject to mere notification or to the approval by the competent Authority depending on the asset offered. On the other hand doubts arise on the indistinct allocation of the burden of proof to the user in case of infringement of the relevant white paper framework.Settore IUS/04 - Diritto Commerciale
researchProduct

Análisis criptopaleontológico del lapidario de Teofrasto (s. III a.C.)

2013

The work “Perì líthon” or Teofrasto’s “Treatise of stones” has been considered the oldest text still available about minerals and rocks, even though it has remained incomplete. In this paper, the study of its contents shows that eleven of the stones called by geographic or cryptic names are either fossils from plants or vertebrates or chemical fossils. Therefore, the “Perì líthon” should also be considered as the oldest known treatise about palaeontology, because in addition to the fossils mentioned, it refers specifically to the fossilisation process.La obra “Perì líthon” o “Tratado de Piedras” de Teofrasto, es considerado el texto más antiguo conservado sobre minerales y rocas, aunque hay…

TheophrastusQE1-996.5Cryptopalaeontologylcsh:QE1-996.5historia de la geologíahistory of geologyGeologyPaleontologiaBiologyteofrastoArchaeologycriptopaleontologíalcsh:GeologyGeologia històricaPaleontologyEstudios Geológicos
researchProduct

On the Cryptanalysis of Two Cryptographic Algorithms That Utilize Chaotic Neural Networks

2015

This paper deals with the security and efficiency issues of two cipher algorithms which utilize the principles of Chaotic Neural Networks (CNNs). The two algorithms that we consider are (1) the CNN-Hash, which is a one-way hash function based on the Piece-Wise Linear Chaotic Map (PWLCM) and the One-Way Coupled Map Lattice (OCML), and (2) the Delayed CNN-Based Encryption (DCBE), which is an encryption algorithm based on the delayed CNN. Although both of these cipher algorithms have their own salient characteristics, our analysis shows that, unfortunately, the CNN-Hash is not secure because it is neither Second-Preimage resistant nor collision resistant. Indeed, one can find a collision with …

Theoretical computer scienceArticle SubjectComputer sciencebusiness.industryGeneral Mathematicslcsh:MathematicsHash functionGeneral EngineeringPlaintextCryptographyEncryptionlcsh:QA1-939law.inventionCipherMalleabilitySymmetric-key algorithmlawlcsh:TA1-2040Known-plaintext attackCiphertextCryptanalysisbusinesslcsh:Engineering (General). Civil engineering (General)AlgorithmMathematical Problems in Engineering
researchProduct

Parallel Calculation of CCSDT and Mk-MRCCSDT Energies.

2010

A scheme for the parallel calculation of energies at the coupled-cluster singles, doubles, and triples (CCSDT) level of theory, several approximate iterative CCSDT schemes (CCSDT-1a, CCSDT-1b, CCSDT-2, CCSDT-3, and CC3), and for the state-specific multireference coupled-cluster ansatz suggested by Mukherjee with a full treatment of triple excitations (Mk-MRCCSDT) is presented. The proposed scheme is based on the adaptation of a highly efficient serial coupled-cluster code leading to a communication-minimized implementation by parallelizing the time-determining steps. The parallel algorithm is tailored for affordable cluster architectures connected by standard communication networks such as …

Theoretical computer scienceBasis (linear algebra)Computer scienceComputationGigabit EthernetCode (cryptography)Parallel algorithmBenchmark (computing)Basis functionPhysical and Theoretical ChemistryComputer Science ApplicationsComputational scienceAnsatzJournal of chemical theory and computation
researchProduct