Search results for "Crypt"

showing 10 items of 1111 documents

Cryptosporidium parvum: Structural Components of the Oocyst Wall

1999

Cryptosporidium parvum, an enteropathogenic parasite, infects a wide range of mammals including man and constitutes a substantial veterinary and medical threat due to its ubiquitous distribution and the stability of the oocyst stage. The oocyst wall of C. parvum is known to be extremely resistant to chemical and mechanical disruption. Isolated oocyst walls are shown by both thin sectioning and negative staining transmission electron microscopy to possess a filamentous array on the inner surface. This filamentous array can be greatly depleted by digestion with proteinase K and trypsin, but pepsin has less effect. Ultrasonication of the untreated oocyst walls produced almost no fragmentation,…

biologyanimal diseasesfungibiology.organism_classificationTrypsinProteinase KNegative stainMicrobiologyCryptosporidium parvumparasitic diseasesmedicineUltrastructurebiology.proteinParasite hostingProtozoaParasitologyFragmentation (cell biology)Ecology Evolution Behavior and Systematicsmedicine.drugThe Journal of Parasitology
researchProduct

Blockchain Disrupting Fintech and the Banking System

2021

Nowadays society is profoundly changed by technology, velocity and productivity. While individuals are not yet prepared for holographic connection with banks or financial institutions, other innovative technologies have been adopted. Lately, a new world has been launched, personalized and adapted to reality. It has emerged and started to govern almost all daily activities due to the five key elements that are foundations of the technology: machine to machine (M2M), internet of things (IoT), big data, machine learning and artificial intelligence (AI). Competitive innovations are now on the market, helping with the connection between investors and borrowers—notably crowdfunding and peer-to-pe…

blockchainBlockchainbusiness.industryfintechBig datalcsh:APopularityMachine to machineCommerceKey (cryptography)Relevance (information retrieval)Businesslcsh:General Worksbanking systemInternet of ThingsProductivityElrondThe 7th International Management Information Systems Conference
researchProduct

Initial Coin Offering (ICO) as a Fundraising Strategy : A Multiple Case Study on Success Factors

2019

Cryptocurrencies and Initial Coin Offerings (ICO) are some of the more prominent examples of currently used blockchain technology applications. Especially software startups have leveraged ICOs to gain funding early on in their lifecycles, going on to develop and create new blockchain based applications. Recently, larger companies such as Facebook have also begun to show interest in cryptocurrency, although thus far not for funding purposes in the form of ICOs. In this paper, we investigate factors that positively affect the abilities of companies to meet their fundraising goals via ICOs. We first identify a set of factors from extant literature and then seek to further confirm the effect of…

blockchainCryptocurrencyinitial coin offeringKnowledge managementcrowd salelohkoketjutSecurity tokenstartup-yrityksetExtant taxontoken0502 economics and businessfundraisingSet (psychology)menestystekijät050208 financebusiness.industry05 social sciencessuccess factorSuccess factorscomputer.file_formatvarainhankintacryptocurrencyvirtuaalivaluuttaICOMultiple casebusinesscomputer050203 business & management
researchProduct

Giełdy Bitcoina w Polsce

2017

W artykule zaprezentowano przyczyny powstania najbardziej znanej waluty cyfrowej na świecie jaką jest Bitcoin oraz przedstawiono funkcjonujące obecne w Polsce giełdy walut cyfrowych, z uwzględnieniem ich kapitalizacji oraz miejsca jakie zajmują na tle innych giełd na świecie. Dokonano analizy aktualnej oferty giełd, skupiając się przede wszystkim na podstawowych różnicach pomiędzy obowiązującymi na nich ofertami, będącymi swoistymi wyróżnikami giełd. Ponadto przedstawiono i porównano również wielkość opłat związanych z korzystaniem z serwisu giełdowego. Zasygnalizowano również niebezpieczeństwa związane z upadkami bądź też atakami hakerskimi na giełdach, skutkującymi w przeważającej mierze …

blockchaingiełdy krypto walutbitcoinbitcooinkryptowalutyexchange cryptocurrency.waluty cyfrowedigital currenciescryptocurrencyPrzegląd Nauk Stosowanych
researchProduct

A Survey on Technologies Which Make Bitcoin Greener or More Justified

2022

According to recent estimates, one bitcoin transaction consumes as much energy as 1.5 million Visa transactions. Why is bitcoin using so much energy? Most of the energy is used during the bitcoin mining process, which serves at least two significant purposes: a) distributing new cryptocurrency coins to the cryptoeconomy and b) securing the Bitcoin blockchain ledger. In reality, the comparison of bitcoin transactions to Visa transactions is not that simple. The amount of transactions in the Bitcoin network is not directly connected to the amount of bitcoin mining power nor the energy consumption of those mining devices; for example, it is possible to multiply the number of bitcoin transactio…

blockchainhajautetut järjestelmätenergiankulutus (energiateknologia)General Computer ScienceDLTbitcoinGeneral Engineeringlohkoketjutsustainabilitycryptocurrencyvirtuaalivaluuttagreen technologyunconventional computingclimate changeekologinen kestävyysGeneral Materials ScienceElectrical and Electronic EngineeringIEEE Access
researchProduct

Media’s portrayal of CAM: Exploring 40 years of narratives and meanings in public discourse

2021

The media are a key element in being able to assess how the climate of public opinion regarding Complementary and Alternative Medicines (CAM) has evolved over the years. The aim of this study is to explore the variation of the media representations along 40 years (1979–2018) in Spanish newspapers to assess if the press has contributed to legitimise, delegitimise or maintain the status quo of these therapies. From quantitative and qualitative approaches, we evaluate the media attention, the narratives, linguistic terms and tone used, and the relations between them. Results indicate the media reporting on CAM has remained relatively stable during the first 37 years (1979–2015) of the study, …

business.industryCommunication05 social sciencesMedia studies050801 communication & media studies050905 science studiesPublic opinionScientific journalism0508 media and communicationsArts and Humanities (miscellaneous)Public discourseKey (cryptography)NarrativeSociology0509 other social sciencesElement (criminal law)businessHealth communicationJournalism
researchProduct

Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets

2021

International audience; With the Internet's unprecedented growth and nations' reliance on computer networks, new cyber‐attacks are created every day as means for achieving financial gain, imposing political agendas, and developing cyberwarfare arsenals. Network security is thus acquiring increasing attention among researchers, practitioners, network architects, policy makers, and others. To defend organizations' networks from existing, foreseen, and future threats, intrusion detection systems (IDSs) are becoming a must. Existing surveys on anomaly‐based IDS (AIDS) focus on specific components such as detection mechanisms and lack many others. In contrast to existing surveys, this article co…

business.industryComputer scienceAnomaly (natural sciences)020206 networking & telecommunications02 engineering and technologyIntrusion detection system[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]Computer securitycomputer.software_genre[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingThe Internet[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Electrical and Electronic Engineering[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businesscomputer
researchProduct

Current characterisation for ultra low power wireless body area networks

2010

The emerging area of body area networks (BAN) imposes challenging requirements on hardware and software to achieve the desired lifetimes for certain devices such as long term medical implants. In this paper, we propose a novel approach to the measurement and characterisation of the energy consumption of BAN devices. The approach uses a low cost energy auditing circuit and addresses the problem of accurately measuring low-level current consumption. This new technique will allow precise and analytical measurements of systems and components in terms of energy. This will help circuit designers minimise power consumption in BAN devices. Software engineers might use this approach to validate and …

business.industryComputer scienceBody area networks Body sensor networks Circuits Costs Current measurement Energy consumption Energy measurement Hardware Implants Power engineering and energy Body Area Networks Current characterization Embedded system design Energy efficiency Power Consumption Wireless Network softwareEnergy consumptionPower (physics)SoftwareEmbedded systemCode (cryptography)Electronic engineeringWirelessbusinessEnergy (signal processing)Electronic circuitEfficient energy use2010 8th Workshop on Intelligent Solutions in Embedded Systems
researchProduct

Trusted Computing and DRM

2015

Trusted Computing is a special branch of computer security. One branch of computer security involves protection of systems against external attacks. In that branch we include all methods that are used by system owners against external attackers, for example Firewalls, IDS, IPS etc. In all those cases the system owner installs software that uses its own means to determine if a remote user is malicious and terminates the attack. (Such means can be very simple such as detecting signatures of attacks or very complex such as machine learning and detecting anomalies in the usage pattern of the remote user). Another branch of attacks requires protection by the system owner against internal users. …

business.industryComputer scienceCloud computingTrusted ComputingAttack surfaceConditional accessComputer securitycomputer.software_genreDigital mediaDisk encryptionDirect Anonymous AttestationTrusted Platform Modulebusinesscomputer
researchProduct

Benchmarking non-photorealistic rendering of portraits

2017

We present a set of images for helping NPR practitioners evaluate their image-based portrait stylisation algorithms. Using a standard set both facilitates comparisons with other methods and helps ensure that presented results are representative. We give two levels of difficulty, each consisting of 20 images selected systematically so as to provide good coverage of several possible portrait characteristics. We applied three existing portrait-specific stylisation algorithms, two general-purpose stylisation algorithms, and one general learning based stylisation algorithm to the first level of the benchmark, corresponding to the type of constrained images that have often been used in portrait-s…

business.industryComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION020207 software engineeringImage processing02 engineering and technologyBenchmarkingMachine learningcomputer.software_genreNon-photorealistic renderingImage (mathematics)Set (abstract data type)0202 electrical engineering electronic engineering information engineeringBenchmark (computing)Key (cryptography)020201 artificial intelligence & image processingArtificial intelligencebusinesscomputerAbstraction (linguistics)
researchProduct