Auswahl der wissenschaftlichen Literatur zum Thema „Crypto Wallet“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Crypto Wallet" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Crypto Wallet"

1

Zhang, Xitong, He Zhu und Jiayu Zhou. „Shoreline: Data-Driven Threshold Estimation of Online Reserves of Cryptocurrency Trading Platforms (Student Abstract)“. Proceedings of the AAAI Conference on Artificial Intelligence 34, Nr. 10 (03.04.2020): 13985–86. http://dx.doi.org/10.1609/aaai.v34i10.7265.

Der volle Inhalt der Quelle
Annotation:
With the proliferation of blockchain projects and applications, cryptocurrency exchanges, which provides exchange services among different types of cryptocurrencies, become pivotal platforms that allow customers to trade digital assets on different blockchains. Because of the anonymity and trustlessness nature of cryptocurrency, one major challenge of crypto-exchanges is asset safety, and all-time amount hacked from crypto-exchanges until 2018 is over $1.5 billion even with carefully maintained secure trading systems. The most critical vulnerability of crypto-exchanges is from the so-called hot wallet, which is used to store a certain portion of the total asset online of an exchange and programmatically sign transactions when a withdraw happens. It is important to develop network security mechanisms. However, the fact is that there is no guarantee that the system can defend all attacks. Thus, accurately controlling the available assets in the hot wallets becomes the key to minimize the risk of running an exchange. In this paper, we propose Shoreline, a deep learning-based threshold estimation framework that estimates the optimal threshold of hot wallets from historical wallet activities and dynamic trading networks.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Zhang, Xitong, He Zhu und Jiayu Zhou. „Shoreline: Data-Driven Threshold Estimation of Online Reserves of Cryptocurrency Trading Platforms“. Proceedings of the AAAI Conference on Artificial Intelligence 34, Nr. 01 (03.04.2020): 1194–201. http://dx.doi.org/10.1609/aaai.v34i01.5472.

Der volle Inhalt der Quelle
Annotation:
With the proliferation of blockchain projects and applications, cryptocurrency exchanges, which provides exchange services among different types of cryptocurrencies, become pivotal platforms that allow customers to trade digital assets on different blockchains. Because of the anonymity and trustlessness nature of cryptocurrency, one major challenge of crypto-exchanges is asset safety, and all-time amount hacked from crypto-exchanges until 2018 is over $1.5 billion even with carefully maintained secure trading systems. The most critical vulnerability of crypto-exchanges is from the so-called hot wallet, which is used to store a certain portion of the total asset of an exchange and programmatically sign transactions when a withdraw happens. Whenever hackers managed to gain control over the computing infrastructure of the exchange, they usually immediately obtain all the assets in the hot wallet. It is important to develop network security mechanisms. However, the fact is that there is no guarantee that the system can defend all attacks. Thus, accurately controlling the available assets in the hot wallets becomes the key to minimize the risk of running an exchange. However, determining such optimal threshold remains a challenging task because of the complicated dynamics inside exchanges. In this paper, we propose Shoreline, a deep learning-based threshold estimation framework that estimates the optimal threshold of hot wallets from historical wallet activities and dynamic trading networks. We conduct extensive empirical studies on the real trading data from a trading platform and demonstrate the effectiveness of the proposed approach.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Ozeran, Alla, und Nadiia Gura. „Audit and accounting considerations on cryptoassets and related transactions“. Economic Annals-ХХI 184, Nr. 7-8 (10.09.2020): 124–32. http://dx.doi.org/10.21003/ea.v184-11.

Der volle Inhalt der Quelle
Annotation:
Introduction. The rapid rise and volatility of cryptoassets have led to increased global interest by governments, investors, regulators. In 2020, the market capitalization of cryptocurrencies increased to USD 758.06 billion by expert estimations. Each of the cryptoassets has its own unique features and characteristics which makes their accounting and auditing challenging. The lack of official accounting and auditing guidance for cryptoassets and related transactions impose additional audit risks that should be measured properly before the client-acceptance stage and planning audit procedures. We developed a model which links financial statement assertions, identified cryptoassets’ risks that should be considered during the audit, and related controls in response to such risks. The purpose of this paper is to identify cryptoassets framework for audit planning and gathering audit evidence to support management assertions regarding their financial statements. Methods. This paper adopts an empirical research approach with application of auditing and analytical procedures. In a comprehensive analytical overview of trends in cryptoassets market capitalization, the authors have used statistical methods and structural analysis, the selected sample includes daily data of cryptoassets market capitalization during January 2016 - February 2020. Results. According to the conducted research, the auditors have to consider whether to accept or continue an audit engagement when an entity has engaged in material cryptocurrency transactions; the auditors have to identify and assess risks of material misstatement in financial statements related to cryptoassets transactions and balances. We suggested a possible substantive audit procedures for cryptoassets and related transactions, such as: inspection of the wallets and verification the balances on them; confirmation by a third party (traders); inspection of documents supporting ownership of the asset (white papers, agreements with crypto-traders); testing client internal controls system and controls that are implemented to ensure the security of the private key of crypto-wallet. Conclusions. It is becoming common for financial statements to show cryptoassets balances and reflect the results of cryptoassets transactions, however, many auditors may have little or no experience with cryptoassets and therefore may not fully appreciate the challenges that auditing these items may present. The auditors need to identify and assess risks of material misstatement throughout the process of obtaining an understanding of the entity and its control environment, and evaluate the potential effect of that risks on financial statements.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Vashchekina, I. V., und A. N. Vashchekin. „INTERNATIONAL MEASURES TO COUNTERACT THE LAUNDERING OF ILLEGAL INCOME OF THE FIFTH GENERATION – LEGAL CONDITIONS FOR STRENGTHENING THE SECURITY OF THE FINANCIAL MARKET“. Vestnik Universiteta, Nr. 1 (25.02.2021): 126–33. http://dx.doi.org/10.26425/1816-4277-2021-1-126-133.

Der volle Inhalt der Quelle
Annotation:
The article analyses the development of international agreements on the means of controlling financial activities, concluded to counteract the laundering of proceeds from crime and the financing of terrorism. The study was carried out by analytical methods based on domestic legislation, international agreements and regulations. As a result of thirty years of work on organizing interaction in the developing three-level financial monitoring system, a whole set of measures has developed, the main development trend of which is to reduce information uncertainty. In this regard, the fifth generation of agreements on the limitation of potentially illegal activities in the financial sector, introduced in 2020, is acquiring special importance. The legal entities covered by the restrictive and control measures now include crypto exchange platforms, virtual wallet providers, as well as firms that provide currency exchange services. In a number of areas, information is automatically exchanged about ongoing transactions, as well as about their participants – clients of banks, insurance and brokerage companies, investment funds, in order to prevent aggressive tax planning and make it difficult to access unjustified tax breaks. The paper presents the economic and organizational results of the introduced legal measures.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Rodríguez-Andrade, Ernesto, Alberto M. Stchigel und José F. Cano-Lira. „New Xerophilic Species of Penicillium from Soil“. Journal of Fungi 7, Nr. 2 (09.02.2021): 126. http://dx.doi.org/10.3390/jof7020126.

Der volle Inhalt der Quelle
Annotation:
Soil is one of the main reservoirs of fungi. The aim of this study was to study the richness of ascomycetes in a set of soil samples from Mexico and Spain. Fungi were isolated after 2% w/v phenol treatment of samples. In that way, several strains of the genus Penicillium were recovered. A phylogenetic analysis based on internal transcribed spacer (ITS), beta-tubulin (BenA), calmodulin (CaM), and RNA polymerase II subunit 2 gene (rpb2) sequences showed that four of these strains had not been described before. Penicillium melanosporum produces monoverticillate conidiophores and brownish conidia covered by an ornate brown sheath. Penicillium michoacanense and Penicillium siccitolerans produce sclerotia, and their asexual morph is similar to species in the section Aspergilloides (despite all of them pertaining to section Lanata-Divaricata). P. michoacanense differs from P. siccitolerans in having thick-walled peridial cells (thin-walled in P. siccitolerans). Penicillium sexuale differs from Penicillium cryptum in the section Crypta because it does not produce an asexual morph. Its ascostromata have a peridium composed of thick-walled polygonal cells, and its ascospores are broadly lenticular with two equatorial ridges widely separated by a furrow. All four new species are xerophilic. Despite the genus Penicillium containing more than 480 known species, they are rarely reported as xerophilic.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Sotiropoulou, Anastasia, und Stéphanie Ligot. „Legal Challenges of Cryptocurrencies: Isn’t It Time to Regulate the Intermediaries?“ European Company and Financial Law Review 16, Nr. 5 (09.10.2019): 652–76. http://dx.doi.org/10.1515/ecfr-2019-0023.

Der volle Inhalt der Quelle
Annotation:
In only one decade, cryptocurrencies have witnessed significant growth, with Bitcoin being the most dominant one. They are not efficient payment methods, although they bring some benefits linked to the underlying technology they use (Blockchain). In reality, they function more as investment assets than as payment instruments and pose various risks, which are very similar to those encountered on capital markets (price volatility, fraud, market manipulation). In order to deal with these risks, regulation should apply to intermediaries who provide services in relation to cryptocurrencies, such as crypto wallets, operation of crypto exchanges and brokerage. To this end, the European legislator should consider two options. It could, on the one hand, bring cryptocurrency service providers within the scope of the existing financial services regime and thus modify MIFID II in order to include cryptocurrencies in the list of financial instruments. The European legislator could also, on the other hand, aim at creating a new appropriate and proportionate regime that draws on the existing one. Insofar as the existing regulatory framework was not designed with cryptocurrencies in mind and as some of the current rules may not be tailored to the specificities of these assets, the second option is preferable.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Lozano, Luis-Fernando, Arthur A. Bickford, Anthony E. Castro, Joyce Swartzman-Andert, Richard Chin, Carol Meteyer, George Cooper, Bruce Reynolds und Rosa Lynn Manalac. „Association of Reoviridae Particles in an Enteric Syndrome of Poults Observed in Turkey Flocks during 1988“. Journal of Veterinary Diagnostic Investigation 1, Nr. 3 (Juli 1989): 254–59. http://dx.doi.org/10.1177/104063878900100311.

Der volle Inhalt der Quelle
Annotation:
An enteric syndrome of turkey poults, characterized by enteritis, crop mycosis, intestinal changes (pale, thin-walled ballooning with watery contents), and rickets, occurred during 1988 in 74 turkey flocks from different farms belonging to 9 California turkey growers. The flocks ranged in size from 9,000 to 120,000 birds. Pools of intestine sections from 618 birds, representing 78 field cases, were examined. Histopathological examination of the intestines showed a mild to severe atrophy with a reduced depth of crypts, which was more prominent in the distal part of the small intestine. Viral isolation attempts with primary cell cultures of chicken embryo kidney cells were negative. Examination by electron microscopy of negatively stained intestinal specimens revealed the presence of Reoviridae particles of 58.8 to 80 nm in diameter. Enzyme-linked immunosorbent assay results on the intestinal pools for mammalian and group A avian rotaviruses were negative. A statistically significant relationship was found for the presence of Reoviridae particles in the intestines of 10-21-day-old birds. Of the 7 most common pathological conditions analyzed, 2, rickets and intestinal changes (thin-walled ballooning intestine with watery contents), showed a statistically significant association with the presence of Reoviridae particles.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Noudem, Jacques G. „Superconducting materials by design: Bulk with artificial thin walls as cryo-magnets“. Mechanik, Nr. 2 (Februar 2015): 124/13–124/23. http://dx.doi.org/10.17814/mechanik.2015.2.73.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Wong, Evan S., Gregory A. Dahlem, Trevor I. Stamper und Ronald W. DeBry. „Discordance between morphological species identification and mtDNA phylogeny in the flesh fly genus Ravinia (Diptera : Sarcophagidae)“. Invertebrate Systematics 29, Nr. 1 (2015): 1. http://dx.doi.org/10.1071/is14018.

Der volle Inhalt der Quelle
Annotation:
In order to better understand the phylogenetic relationships among species in the genus Ravinia Robineau-Desvoidy, 1863, we analysed data from two mitochondrial gene fragments: cytochrome oxidase I (COI) and cytochrome oxidase II (COII). We used Bayesian inference and maximum likelihood methods to infer phylogenetic relationships. Our results indicate that the genera Ravinia and Chaetoravinia, previously synonymised into the genus Ravinia (sensu lato) are each likely to be monophyletic (posterior probability 1; bootstrap support 85%). We found highly supported paraphyletic relationships among species of Ravinia, with relatively deep splits in the phylogeny. This conflict between the morphological species definitions and the mtDNA phylogeny could be indicative of the presence of cryptic species in Ravinia anxia (Walker, 1849), Ravinia floridensis (Aldrich, 1916), Ravinia lherminieri (Robineau-Desvoidy, 1830), and Ravinia querula (Walker, 1849).
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Sochorová, Zuzana, Peter Döbbeler, Michal Sochor und Jacques van Rooy. „Octospora conidiophora (Pyronemataceae) – a new species from South Africa and the first report of anamorph in bryophilous Pezizales“. MycoKeys 54 (10.06.2019): 49–76. http://dx.doi.org/10.3897/mycokeys.54.34571.

Der volle Inhalt der Quelle
Annotation:
Octosporaconidiophorais described as a new species, based on collections from South Africa. It is characterised by apothecia with a distinct margin, smooth or finely warted ellipsoid ascospores, stiff, thick-walled hyaline hairs, warted mycelial hyphae and growth on pleurocarpous mossesTrichosteleumperchlorosumandSematophyllumbrachycarpum(Hypnales) on decaying wood in afromontane forests. It is the first species of bryophilous Pezizales in which an anamorph has been observed; it produces long, claviform, curved, hyaline and transversely septate conidia. Three other cryptic species ofOctosporawere detected using three molecular markers (LSU and SSU nrDNA and EF1α), but these could not be distinguished phenotypically. These are not described formally here and an informal species aggregateO.conidiophoraagg. is established for them. The new species and finds ofLamprosporacampylopodisgrowing onCampylopuspyriformisandNeottiellaalbocinctaonAtrichumandrogynumrepresent the first records of bryophilous Pezizales in South Africa.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Crypto Wallet"

1

Schmid, Philipp, und Sabine Houy. „Investigating Security Aspects of Cryptocurrency Wallets - a Systematic Study“. Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44798.

Der volle Inhalt der Quelle
Annotation:
Cryptocurrencies are gaining prominence among individuals and companies alike, resulting in the growing adoption of so-called cryptocurrency wallet applications, as these simplify carrying out transactions. These wallets are available in a myriad of different forms and specifications. For example, there are hardware and software wallets. The latter can be divided into mobile, web, and desktop wallets. All of them offer attackers various ways to exploit vulnerabilities and steal money from victims. It is hard to keep track of this multitude of options and thus choose the right cryptocurrency wallet. For this reason, in this thesis, we collect the findings from previous literature to provide an overview of the various attack surfaces, possible countermeasures, and further research. Our systematic study has shown that there is still a considerable variety of attack vectors, which we have divided into six subcategories, (i) Memory and Storage, (ii) Operating Systems, (iii) Software Layer, (iv) Network Layer, (v) Blockchain Protocol, and (vi) Others. Some of the identified vulnerabilities have currently no solutions at all or hardly applicable countermeasures. However, some are easy to fix and simple to implement. One of the essential measures is to raise awareness of the identified weaknesses and the associated mitigations, if any, among the involved stakeholders, including users, developers, and exchanges.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

„Solubility, length characterization, and cryo-TEM of pristine and functionalized single-walled carbon nanotubes in surfactant and superacid systems, with application to spinning SWNT fibers“. Thesis, 2010. http://hdl.handle.net/1911/62052.

Der volle Inhalt der Quelle
Annotation:
Single wall carbon nanotubes (SWNTs) have remarkable properties: the thermal conductivity of diamond, the electrical conductivity of copper, and mechanical properties greater than steel at a sixth of the weight. If these properties can be retained at the macroscale, SWNT fibers could be used in many high performance applications. The difficulty lies with dispersing SWNTs at high concentrations. Strong van der Waals attractive forces cause bundle formation, which limits SWNT self-assembly into highly aligned macro-structures. Using additives, SWNTs can be dispersed as individuals at low concentrations. Although spinning fibers is difficult to do with these dispersions, I have exploited their ability to disperse individual SWNT to develop an easy technique to measure the SWNT length distribution through the bulk measurements of viscosity or polarized absorbance in an external magnetic field. Determining length is important for fiber spinning, since longer nanotubes offer promise of stronger, more conductive fibers at the cost of higher viscosities and difficulty in dispersing. To produce neat SWNT fibers, we use superacids, which can disperse SWNTs at high concentrations, forming liquid crystalline phases that are valuable in forming highly-aligned SWNT fibers. I found that functionalization improves SWNT stabilization and solubility at lower concentrations, but at high concentrations, most of functional groups studied prevents the formation of highly aligned phases, which translated into poorly-aligned fibers. I found that chlorosulfonic acid is the most effective solvent, yielding high isotropic solubility and liquid crystallinity at high concentrations. Moreover, cryo-TEM shows that chlorosulfonic acid dissolves as individuals 500mum-long SWNTs and MWNTs.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "Crypto Wallet"

1

Great Britain. Welsh Office. Education Department. Inspectorate. Report by H.M. Inspectors: Llanfawr County Primary School, Holyhead, Gwynedd : inspected during spring term 1993 : a summary report for parents = Adroddiad gan Arolygwyr ei Mawrhydi : Ysgol Gynradd Llanfawr, Caergybi, Gwynedd : arolygwyd yn ystod tymor y gwanwyn 1993 : adroddiad cryno i rieni. (Cardiff): Welsh Office, 1993.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Great Britain. Welsh Office. Education Department. Inspectorate. Report by H.M. Inspectors: Ysgol Bro Lleu, Penygroes,Gwynedd : inspected during spring term 1993 : a summary report for parents = Adroddiad gan Arolygwyr ei Mawrhydi : Ysgol Bro Lleu, Penygroes, Gwynedd : arolygwyd yn ystod tymor y gwanwyn 1993 : adroddiad cryno i rieni. (Cardiff): Welsh Office, 1993.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Inspectorate, Great Britain Welsh Office Education Department. Report by H.M. Inspectors: Ysgol Dyffryn Nantlle, Penygroes, Gwynedd : inspected during spring term 1993 : a summary report for parents = Adroddiad gan Arolygwyr ei Mawrhydi : Ysgol Dyffryn Nantlle, Penygroes, Gwynedd : arolygwyd yn ystod tymor y gwanwyn 1993 : adroddiad cryno i rieni. (Cardiff): Welsh Office, 1993.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Crypto Wallet"

1

Agarwal, Pravin. „E-Retailing Laws and Regulations in India“. In Advances in Electronic Commerce, 21–28. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3787-8.ch003.

Der volle Inhalt der Quelle
Annotation:
Cross-border boundaries have changed the way business is being conducted. From time-consuming strenuous manual transactions, consumers have walked a long way to instant e-commerce transactions pushed across by ease and digitization of financial services. Thus rules and regulations are required for setting-up web sites, conducting of business, providing of financial services, digitizing of all commerce-related activities and services, protection of IPR, protecting against all risks and losses, all legal aspects including terms and conditions/conduct of trade/provision of after-sales service/security/entry and exit of start-ups/protection of consumer rights/crypto currency/virtual banks/legally acceptable unsigned documents/mobile commerce, and all other related aspects. These laws cannot be country specific but have to be framed with global outlook since transaction can happen from any place to any other place worldwide.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Thrush, Coll. „The Unhidden City“. In Indigenous London. Yale University Press, 2016. http://dx.doi.org/10.12987/yale/9780300206302.003.0001.

Der volle Inhalt der Quelle
Annotation:
This chapter adds to the canon of secret Londons through the inscription of another layer, another arcane and invisible text in the palimpsest that is the urban landscape. Such accounts of other Londons gesture toward the irreducible survivals of past landscapes in a place that constantly unearths its own history. As stated by Prof. Timothy Morton, “the streets beneath the streets, the Roman Wall, the boarded-up houses, the unexploded bombs, are records of everything that happened to London.” London's history exists in its form. From histories of the Underground to accounts by urban explorers entering the city's sewers and crypts, from compendia of obscure folklore to catalogs of nearly forgotten ghost stories, London provokes a predilection with the hidden.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Açar, Gülay. „Surgical Anatomy of the Tonsils“. In Oral and Maxillofacial Surgery. IntechOpen, 2021. http://dx.doi.org/10.5772/intechopen.93038.

Der volle Inhalt der Quelle
Annotation:
The tonsils represent a circular band of mucosa associated with lymphoid tissues, Waldeyer’s ring, which is located at the entrance of the upper aerodigestive tract, with a significant role in the immune defense system. Waldeyer’s ring is composed of the pharyngeal, tubal, palatine, and lingual tonsils acting as secondary lymphoid tissues. Particularly, the palatine tonsils are the largest of the tonsils with deep branching crypts and contain B and T lymphocytes and M cell which plays a role in the uptake and transport of antigens. Because of the tonsil enlargement during childhood, upper airway obstruction and obstructive sleep apnea syndrome are mostly seen. Knowledge of the surgical anatomy of the tonsils and variations of the neurovascular and muscular structures around it allows optimal choice of surgical technique to avoid iatrogenic complications during tonsillectomy. Recent medical studies reported that a detailed understanding of the anatomic risk factors in upper airway obstruction allows to predict treatment response to surgical intervention. Due to the penetration of benign or malign lesions of the tonsil into the lateral wall of the pharynx, transoral robotic approach to this region is necessary to identify the surgical anatomic landmarks which are required to perform safe and effective surgical intervention.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Kajita, Yui. „Calling Parrots in Walter de la Mare and Elizabeth Bowen: A Communion in The London Mercury“. In The Modern Short Story and Magazine Culture, 1880-1950, 169–86. Edinburgh University Press, 2020. http://dx.doi.org/10.3366/edinburgh/9781474461085.003.0009.

Der volle Inhalt der Quelle
Annotation:
In The London Mercury, Walter de la Mare and Elizabeth Bowen each published a short story featuring a cryptic parrot within three months of each other: de la Mare’s ‘Pretty Poll’ appeared in the April 1925 number, and Bowen’s ‘The Parrot’ in July 1925. Given Bowen’s appreciation for de la Mare’s work and her familiarity with The London Mercury as the ‘dominating magazine’ in the 1920s, this publication context turns their stories into possible companion pieces. This chapter first delineates the textual and thematic links between the two stories, then explores how the magazine — its presentation; its interactive community of contributors and readers; and its self-professed position as an arbiter of taste, committed to protecting and advancing literature and culture — plays a role in this intertextual communication between the two stories, which influences our interpretation. Both stories participate in the aesthetic debates in The London Mercury, subtly challenging some of its contributors’ assumptions about prose fiction. As this analysis of the magazine’s contents alongside the two authors’ literary essays show, the characteristics of the magazine seem to have stimulated de la Mare and Bowen to engage with questions of genre and form through their own stories.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Niederhofer, Helmut, und Klaus Pittschieler. „Behavioral and Cognitive Manifestations of Celiac Disease“. In Cognitive and Behavioral Abnormalities of Pediatric Diseases. Oxford University Press, 2010. http://dx.doi.org/10.1093/oso/9780195342680.003.0020.

Der volle Inhalt der Quelle
Annotation:
Celiac disease (CD) is an immune-mediated chronic inflammatory disorder characterized by permanent gluten intolerance in genetically susceptible individuals. Exposure to gluten perpetuates an enteropathy leading to malabsorption with chronic diarrhea, weight loss, and abdominal distension. The small intestine mucosa is abnormal, and jejunal biopsy demonstrates various degrees of villous atrophy, absence of surface mucosa, and crypt hyperplasia. The diagnosis is based on the demonstration of a more or less pronounced villus atrophy in a jejunal biopsy. The villous atrophy improves after withdrawal of gluten from the diet. If undetected or neglected, CD may cause considerable late complications from malabsorption or secondary autoimmune diseases (Feigbery 1999; Maki and Collins 1997; Holmes 1996). The therapy consists of permanently excluding gluten from the diet and allows the healing of the mucosal lesion. Abnormalities of humeral and cell-mediated immunity suggest that celiac disease is an immunologic disorder (Walker-Smith 1996). It is caused by inappropriate immune response to the gliadin component in the dietary gluten (Dieterich 1997). Genetic susceptibility is present, and 90% of the patients have HLA DRG 3 DQ-2 haplotype, and some have the HLA DR4 DQ8 gene (Hadjivassiliou 1998). A close relationship exists between the biochemical properties of tissue transglutaminase and the basic molecular mechanisms responsible for CD, and possibly with the neuropsychiatric manifestations of CD (Gentile 2002). Anti–tissue transglutaminase antibody assay has been used as a serologic screening test for CD. In addition, antiendomysial, antigliadin, and antireticulin antibodies are associated with the disease. Nevertheless, the clinical symptomatology affecting the gastrointestinal (GI) system, histological abnormalities on gut biopsy, and presence of antiendomysial antibodies do not always coexist. Also, presentation with minor symptoms, such as irritable bowel syndrome, anaemia, slight weight loss, and fatigue, has become increasingly common, and in many cases the disease may be clinically silent, despite manifest small-bowel mucosal lesions. Therefore, CD is underdiagnosed (Catassi et al. 1996; Feigbery 1999; Holmes 1996; Kolho et al. 1998; Maki and Collins 1997).
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Crypto Wallet"

1

Ganesan, Geetha. „G2R Crypto Wallet using Indian language Mnemonics“. In 2020 International Conference on Interdisciplinary Cyber Physical Systems (ICPS). IEEE, 2020. http://dx.doi.org/10.1109/icps51508.2020.00016.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Ko, Ju-Chun. „Crypto Wallet Working on Low-cost 4G LTE Mobile Phone (video)“. In MobiSys '19: The 17th Annual International Conference on Mobile Systems, Applications, and Services. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3307334.3328591.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Chen, You-Ping, und Ju-Chun Ko. „CryptoAR Wallet“. In MobileHCI '19: 21st International Conference on Human-Computer Interaction with Mobile Devices and Services. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3338286.3344386.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Urien, Pascal. „Crypto Terminal: A New Open Device For Securing Blockchain Wallets“. In 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 2020. http://dx.doi.org/10.1109/icbc48266.2020.9169410.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

„Wallets and Crypto Terminals for Blockchain; Introducing the Big Bang paradigm“. In 2019 Fifth Conference on Mobile and Secure Services (MobiSecServ). IEEE, 2019. http://dx.doi.org/10.1109/mobisecserv.2019.8686561.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Pillai, Anish, Ruturaj Kadikar, M. S. Vasanthi und B. Amutha. „Analysis of AES-CBC Encryption for Interpreting Crypto-Wall Ransomware“. In 2018 International Conference on Communication and Signal Processing (ICCSP). IEEE, 2018. http://dx.doi.org/10.1109/iccsp.2018.8524494.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Voskobojnikov, Artemij, Oliver Wiese, Masoud Mehrabi Koushki, Volker Roth und Konstantin (Kosta) Beznosov. „The U in Crypto Stands for Usable: An Empirical Study of User Experience with Mobile Cryptocurrency Wallets“. In CHI '21: CHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3411764.3445407.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Zhou, T., und Y. Song. „Design of ITER TF Magnet Cryostat Feeder Through“. In 18th International Conference on Nuclear Engineering. ASMEDC, 2010. http://dx.doi.org/10.1115/icone18-29625.

Der volle Inhalt der Quelle
Annotation:
International Thermonuclear Experimental Reactor (ITER) TF feeder systems convey the cryogenic supply and electrical power to the TF coils. The Cryostat Feed-through (CFT) includes the straight feeder part from the cryostat wall to the S-Bend Box (SBB). It is the bottleneck of the feeders. The huge Lorentz-force is a challenge for the CFT design. So the reasonable distribution and structural design of the internal and external supports are important. The CFT include the cold (cryogenic) to warm (room temperature) transitions. It is highly integrated with the cryo-pipes, the busbars, the superconductor joints, the thermal radiation shield and the instrumentation pipes and so on. The cryogenic and electrical requirements, the vacuum and mechanical requirements, and so on are considered when the CFT is designed. This paper presents the functional requirements on the TF CFT, gives its structure. The supports are designed and arrayed according to their mechanical or thermal function separately to stand the huge mechanical loads and isolate the conducting heat load from room temperature respectively. The assembly scheme is also described. Mid-joint and cryostat joint are designed to give the facility for the assembly on location. The mechanical analysis result shows the stress in the stainless steel and G10 material both are within the materials stress safety margin. The heat load to the cryogenic pipes and busbars are also less than the requirement 15W. Transient thermal analysis of global feeder model indicates that 32 days are needed for the feeder components to cool down to the required condition.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Zakin, Jacques L., Yunying Qi und Ying Zhang. „Recent Experimental Results on Surfactant Drag Reduction“. In ASME/JSME 2003 4th Joint Fluids Summer Engineering Conference. ASMEDC, 2003. http://dx.doi.org/10.1115/fedsm2003-45654.

Der volle Inhalt der Quelle
Annotation:
Certain surfactant solutions are drag reducing in turbulent shear flows. Because they “self-repair” after mechanical degradation, they are very attractive for reducing pumping energy losses in recirculating water applications such as district heating and cooling systems. Some surfactant systems reduce drag below the Virk limiting drag reduction asymptote for high polymers. The surfactant asymptote is 40% below that for polymers and the limiting velocity profile slope for highly drag reducing surfactant systems is about twice that for polymers. Like polymers, surfactants show low turbulence intensities normal to the wall and may exhibit zero Reynolds stresses requiring the postulation of an “elastic” stress to satisfy the total stress balance. The influences of counterion chemical structure and shear on microstructures, rheology and therefore drag reduction of cationic surfactant solutions are also addressed. Viscoelasticity, high extensional/shear viscosity ratios and threadlike microstructures have been proposed as necessary physical criteria for surfactant drag reduction. Recently, however, several non-viscoelastic drag reducing surfactant solution systems (zero first normal stress differences, no recoil and no stress overshoot) have been reported. Most drag reducing surfactant solutions have extensional to shear viscosity ratios of 100 or more. However, two solutions with a low ratio in the shear/extensional rate range of 20∼1000 s−1 have been observed. The ratio tends to increase at higher extensional rates, however, so the second criterion may be valid. Finally, cryo-TEM images of some drag reducing surfactant micelle microstructures which lacked threadlike structures in the quiescent state have been observed. However, Zheng et al. [1] showed that vesicle microstructures in the quiescent state can change to threadlike micelles under shear, supporting the third criterion.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie