scholarly journals Unforgettable User Defined Seed Phrase for Cryptocurrency Wallets

Author(s):  
Cheman Shaik

In this paper I have discussed a new method of enabling a cryptocurrency wallet user to define his own unforgettable seed phrase. An algorithm named SEEPT (Seed Phrase Transformation) is provided and illustrated with a real user defined seed phrase as input and a BIP39 standard seed phrase generated as output through cryptographic transformations. Discussed in detail is how an unforgettable seed phrase can be generatedfrom a set of names or words that are specific to a user’s personal life. Explained in detail as to how a wallet user can reconstruct his seed phrase on demand without depending on any storage, thereby relieving him from the burden of memorizing it frequently or storing it digitally on a computer hardware or physically on a paper or metal media.

2007 ◽  
Vol 149 (4) ◽  
pp. 187-195 ◽  
Author(s):  
Steven M. Alston ◽  
Kenneth A. Solen ◽  
Adam H. Broderick ◽  
Sivaprasad Sukavaneshvar ◽  
S. Fazal Mohammad

2020 ◽  
pp. 27-52
Author(s):  
Sharon Zukin

This chapter dives deeply into the subculture of hackathons as a paradigmatic event of the new economy. Using ethnographic observations and interviews with participants at seven public hackathons sponsored by companies in New York, the account shows how the weekend-long competition to write computer code socializes highly skilled, young tech workers to produce “innovation” on demand. Corporate sponsors appeal to participants’ love of coding and “building things” as well as their desire to build their résumés, promising jobs, networking, and glory to winners who can produce marketable products and ideas. Participants willingly engage in both self-exploitation and self-promotion, aware that corporate sponsors have the upper hand but enjoying the sense of play, mutual learning, and collaboration-with-competition that hackathons foster. The combination of self-exploitation and self-promotion, amid both emotional and rational appeals, represents the culture of the new economy and sets a new, permeable boundary between personal life, workspace, and worktime.


Author(s):  
Jianfang Shao ◽  
Changyong Liang ◽  
Xihui Wang ◽  
Xiang Wang ◽  
Liang Liang

Demand calculation, which is the base of most logistics decisions and activities, is a critical work in humanitarian logistics (HL). However, previous studies on demand calculation in HL mainly focus on demand forecasting methodology, with many neglecting the checklist of critical supplies and practice background. This work proposes a new method for relief demand calculation by dividing the process into two parts: supply classification and demand calculation. A general method for classifying relief supplies and clarifying the checklist of relief items for multi-disaster and multiple natural scenarios is given in detail, followed by the procedure of demand calculation for each relief material. The authors present a case study to validate the feasibility and effectiveness of the proposed method based on the disaster response practice in China. Detailed lists of relief demand for different types and severities of disaster are provided.


2014 ◽  
Vol 13 (03) ◽  
pp. 585-602 ◽  
Author(s):  
Haifeng Zhao ◽  
Bin Lin ◽  
Chongqing Guo

Rumors greatly impact consumers' attitudes and purchasing intention. Rumor spreading can disrupt supply chain demand, particularly in today's Internet age. We propose a mathematical model for the quantitative analysis of demand disruption caused by rumor spreading based on the susceptible-infective-isolated-immune (SI2I) rumor spreading model, which extends the susceptible-infective-recovered (SIR) rumor spreading model by dividing stiflers into isolators and immunes. Both groups represent individuals who do not propagate a rumor, but the former believes the rumor while the latter does not. From the firms' perspective, only ignorants and immunes will still purchase their products and services after a rumor has spread. Hence, the influence of rumors on demand can be quantitatively reflected by the proportion of ignorants and immunes in the population. This study offers a new method for company managers to predict the variation trend of demand and estimate demand loss when a firm is attacked by rumors.


2011 ◽  
Vol 55 (1) ◽  
pp. 010501 ◽  
Author(s):  
Sungjune Jung ◽  
Stephen D. Hoath ◽  
Graham D. Martin ◽  
Ian M. Hutchings
Keyword(s):  

2016 ◽  
Vol 2016 ◽  
pp. 1-11 ◽  
Author(s):  
Hung T. Le ◽  
Hai N. Nguyen ◽  
Nam Pham Ngoc ◽  
Anh T. Pham ◽  
Truong Cong Thang

Recently, HTTP streaming has become very popular for delivering videos over the Internet. For adaptivity, a provider should generate multiple versions of a video as well as the related metadata. Various adaptation methods have been proposed to support a streaming client in coping with strong bandwidth variations. However, most of existing methods target at constant bitrate (CBR) videos only. In this paper, we present a new method for quality adaptation in on-demand streaming of variable bitrate (VBR) videos. To cope with strong variations of VBR bitrate, we use a local average bitrate as the representative bitrate of a version. A buffer-based algorithm is then proposed to conservatively adapt video quality. Through experiments in the mobile streaming context, we show that our method can provide quality stability as well as buffer stability even under very strong variations of bandwidth and video bitrates.


Cloud computing is associate on demand access to a shared pool of resources. Vendor’s of cloud computing offer application and change technology, infrastructure, hardware, software, and integration for consumer. The most aspect of cloud computing is accessibility and performance of their network association. It refers to the method of allocating users’ tasks to virtual machines (VMs) with a goal of minimizing the work time and rising the resource utilization. Tasks programming is taken into account NP onerous drawback with O (m, n) run time complexness to schedule n tasks on m resources. A computer hardware adapts its programming strategy consistent with the ever-changing setting and therefore the variety of task. We provide comparison with Max–min scheduling formula and Genetic formula. Our hybrid algorithm provides higher performance compared to different programming algorithm.


Author(s):  
W.A. Carrington ◽  
F.S. Fay ◽  
K.E. Fogarty ◽  
L. Lifshitz

Advances in digital imaging microscopy and in the synthesis of fluorescent dyes allow the determination of 3D distribution of specific proteins, ions, GNA or DNA in single living cells. Effective use of this technology requires a combination of optical and computer hardware and software for image restoration, feature extraction and computer graphics.The digital imaging microscope consists of a conventional epifluorescence microscope with computer controlled focus, excitation and emission wavelength and duration of excitation. Images are recorded with a cooled (-80°C) CCD. 3D images are obtained as a series of optical sections at .25 - .5 μm intervals.A conventional microscope has substantial blurring along its optical axis. Out of focus contributions to a single optical section cause low contrast and flare; details are poorly resolved along the optical axis. We have developed new computer algorithms for reversing these distortions. These image restoration techniques and scanning confocal microscopes yield significantly better images; the results from the two are comparable.


Author(s):  
C. C. Clawson ◽  
L. W. Anderson ◽  
R. A. Good

Investigations which require electron microscope examination of a few specific areas of non-homogeneous tissues make random sampling of small blocks an inefficient and unrewarding procedure. Therefore, several investigators have devised methods which allow obtaining sample blocks for electron microscopy from region of tissue previously identified by light microscopy of present here techniques which make possible: 1) sampling tissue for electron microscopy from selected areas previously identified by light microscopy of relatively large pieces of tissue; 2) dehydration and embedding large numbers of individually identified blocks while keeping each one separate; 3) a new method of maintaining specific orientation of blocks during embedding; 4) special light microscopic staining or fluorescent procedures and electron microscopy on immediately adjacent small areas of tissue.


Sign in / Sign up

Export Citation Format

Share Document