Search results for "Crypt"
showing 10 items of 1111 documents
Cryptosporidium parvum: Structural Components of the Oocyst Wall
1999
Cryptosporidium parvum, an enteropathogenic parasite, infects a wide range of mammals including man and constitutes a substantial veterinary and medical threat due to its ubiquitous distribution and the stability of the oocyst stage. The oocyst wall of C. parvum is known to be extremely resistant to chemical and mechanical disruption. Isolated oocyst walls are shown by both thin sectioning and negative staining transmission electron microscopy to possess a filamentous array on the inner surface. This filamentous array can be greatly depleted by digestion with proteinase K and trypsin, but pepsin has less effect. Ultrasonication of the untreated oocyst walls produced almost no fragmentation,…
Blockchain Disrupting Fintech and the Banking System
2021
Nowadays society is profoundly changed by technology, velocity and productivity. While individuals are not yet prepared for holographic connection with banks or financial institutions, other innovative technologies have been adopted. Lately, a new world has been launched, personalized and adapted to reality. It has emerged and started to govern almost all daily activities due to the five key elements that are foundations of the technology: machine to machine (M2M), internet of things (IoT), big data, machine learning and artificial intelligence (AI). Competitive innovations are now on the market, helping with the connection between investors and borrowers—notably crowdfunding and peer-to-pe…
Initial Coin Offering (ICO) as a Fundraising Strategy : A Multiple Case Study on Success Factors
2019
Cryptocurrencies and Initial Coin Offerings (ICO) are some of the more prominent examples of currently used blockchain technology applications. Especially software startups have leveraged ICOs to gain funding early on in their lifecycles, going on to develop and create new blockchain based applications. Recently, larger companies such as Facebook have also begun to show interest in cryptocurrency, although thus far not for funding purposes in the form of ICOs. In this paper, we investigate factors that positively affect the abilities of companies to meet their fundraising goals via ICOs. We first identify a set of factors from extant literature and then seek to further confirm the effect of…
Giełdy Bitcoina w Polsce
2017
W artykule zaprezentowano przyczyny powstania najbardziej znanej waluty cyfrowej na świecie jaką jest Bitcoin oraz przedstawiono funkcjonujące obecne w Polsce giełdy walut cyfrowych, z uwzględnieniem ich kapitalizacji oraz miejsca jakie zajmują na tle innych giełd na świecie. Dokonano analizy aktualnej oferty giełd, skupiając się przede wszystkim na podstawowych różnicach pomiędzy obowiązującymi na nich ofertami, będącymi swoistymi wyróżnikami giełd. Ponadto przedstawiono i porównano również wielkość opłat związanych z korzystaniem z serwisu giełdowego. Zasygnalizowano również niebezpieczeństwa związane z upadkami bądź też atakami hakerskimi na giełdach, skutkującymi w przeważającej mierze …
A Survey on Technologies Which Make Bitcoin Greener or More Justified
2022
According to recent estimates, one bitcoin transaction consumes as much energy as 1.5 million Visa transactions. Why is bitcoin using so much energy? Most of the energy is used during the bitcoin mining process, which serves at least two significant purposes: a) distributing new cryptocurrency coins to the cryptoeconomy and b) securing the Bitcoin blockchain ledger. In reality, the comparison of bitcoin transactions to Visa transactions is not that simple. The amount of transactions in the Bitcoin network is not directly connected to the amount of bitcoin mining power nor the energy consumption of those mining devices; for example, it is possible to multiply the number of bitcoin transactio…
Media’s portrayal of CAM: Exploring 40 years of narratives and meanings in public discourse
2021
The media are a key element in being able to assess how the climate of public opinion regarding Complementary and Alternative Medicines (CAM) has evolved over the years. The aim of this study is to explore the variation of the media representations along 40 years (1979–2018) in Spanish newspapers to assess if the press has contributed to legitimise, delegitimise or maintain the status quo of these therapies. From quantitative and qualitative approaches, we evaluate the media attention, the narratives, linguistic terms and tone used, and the relations between them. Results indicate the media reporting on CAM has remained relatively stable during the first 37 years (1979–2015) of the study, …
Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets
2021
International audience; With the Internet's unprecedented growth and nations' reliance on computer networks, new cyber‐attacks are created every day as means for achieving financial gain, imposing political agendas, and developing cyberwarfare arsenals. Network security is thus acquiring increasing attention among researchers, practitioners, network architects, policy makers, and others. To defend organizations' networks from existing, foreseen, and future threats, intrusion detection systems (IDSs) are becoming a must. Existing surveys on anomaly‐based IDS (AIDS) focus on specific components such as detection mechanisms and lack many others. In contrast to existing surveys, this article co…
Current characterisation for ultra low power wireless body area networks
2010
The emerging area of body area networks (BAN) imposes challenging requirements on hardware and software to achieve the desired lifetimes for certain devices such as long term medical implants. In this paper, we propose a novel approach to the measurement and characterisation of the energy consumption of BAN devices. The approach uses a low cost energy auditing circuit and addresses the problem of accurately measuring low-level current consumption. This new technique will allow precise and analytical measurements of systems and components in terms of energy. This will help circuit designers minimise power consumption in BAN devices. Software engineers might use this approach to validate and …
Trusted Computing and DRM
2015
Trusted Computing is a special branch of computer security. One branch of computer security involves protection of systems against external attacks. In that branch we include all methods that are used by system owners against external attackers, for example Firewalls, IDS, IPS etc. In all those cases the system owner installs software that uses its own means to determine if a remote user is malicious and terminates the attack. (Such means can be very simple such as detecting signatures of attacks or very complex such as machine learning and detecting anomalies in the usage pattern of the remote user). Another branch of attacks requires protection by the system owner against internal users. …
Benchmarking non-photorealistic rendering of portraits
2017
We present a set of images for helping NPR practitioners evaluate their image-based portrait stylisation algorithms. Using a standard set both facilitates comparisons with other methods and helps ensure that presented results are representative. We give two levels of difficulty, each consisting of 20 images selected systematically so as to provide good coverage of several possible portrait characteristics. We applied three existing portrait-specific stylisation algorithms, two general-purpose stylisation algorithms, and one general learning based stylisation algorithm to the first level of the benchmark, corresponding to the type of constrained images that have often been used in portrait-s…