card number
Recently Published Documents


TOTAL DOCUMENTS

72
(FIVE YEARS 25)

H-INDEX

3
(FIVE YEARS 0)

Author(s):  
Honak I.

The article is devoted to the study of theoretical and practical aspects of the risks that accompany the activities of economic actors in the cryptocurrency market (both mining and trading) at the micro­ and macro­economic level at the beginning of the third decade of the XXI century. The risks associated with the functioning of economic entities in the market of cryptocurrency coins and such risks are the following: lack of legal regulation on the cryptocurrency market and insurance of owners of assets stored on crypto wallets; use of malware in order to access assets rotating on the cryptocurrency market; hacking attacks on cryptocurrency wallets and exchanges in order to steal cryptoassets; loss of assets deposited into accounts of cryptocurrency exchanges in case of bank-ruptcy or closure of these exchanges; loss of the password used to access the crypto wallet; loss of a secret personal PIN code, which is the key to access funds deposited into the crypto wallet at the exchange and used to transfer assets (cryptocurrencies or fiat currencies) to other crypto wallets or a bank card; erroneous transaction due to one number or letter mistake when transferring from one crypto wallet to another or error (when entering bank card number), when transferring funds from crypto wallet to bank card, a mistake of one or more numbers is possible and funds will be transferred to the wrong addressee, in both cases it is impos-sible to cancel the transaction and funds are lost irrevocably; significant volatility in the value of cryptocurrencies, because of which an investor can go bankrupt. It was revealed that the functioning of the cryptocurrency market is also associated with risks to the national economy and security: monetary policy (reduction of control over monetary circulation due to the replacement of national fiat currency with cryptocurrency coins and the loss of the central bank monopoly on the emission of money and reducing the country's income from seigniorage due to mining cryptocurrencies), financial stability (because of the threat of the outflow of deposits from the banking system and replacing them with investments in cryptocurrencies, the possibility of replacing traditional banking, as well as the possibility of avoiding taxation and shadowing the economy) and national security. It has been proven that the intensive activity of an economic entity associated with mining, trading, investing or other economic activities in the cryptocurrency market requires significant theoretical and practical training of the individual and patience and faith in the future of cryptocurrency market activity because of the probability of losing savings invested in cryptocurrencies or investments.Keywords: risk, cryptocurrency, cryptocurrency market, crypto coin, crypto wallet, Bitcoin, Ethereum, cyberattack. Статтю присвячено дослідженню ризиків, які супроводжують діяльність ринку криптовалют, як майнінгу, так і трейдингу. Охарактеризовано ризики, з якими пов’язане функціонування ринку криптовалют, і такими ризиками є: відсутність правового регулювання та страхування власників криптогаманців; використання шкідливих програм та здійснення хакерських атак на криптогаманці і біржі криптовалют; утрата активів, розміщених на рахунках криптовалютних бірж, у разі банкрутства чи закриття цих бірж; утрата паролю від криптогаманця чи втрата секретного персонального PIN­коду, що є ключем доступу до коштів, розміщених на криптогаманці на біржі; помилкова транзакція (через помилку на одну цифру чи букву) під час переказу з одного криптогаманця до іншого (також під час переказу грошових коштів із криптогаманця на банківську картку можлива помилка на одну чи кілька цифр, і кошти будуть переказані не тому адресанту, якому вони передбачалися); значна волатильність вартості криптовалют. Виявлено, що функціонування ринку криптовалют пов’язане з ризиками для національної економіки: монетарної політики, фі-нансової стабільності, інвестиційної та банківської діяльності. Доведено, що активна діяльність економічного суб’єкта, пов’язана з майнінгом, торгівлею, інвестуванням чи іншою економічною діяльністю на ринку криптовалют, вимагає значної теоретичної і практичної підготовки особи через імовірність утратити заощадження, вкладені у криптоферми чи інвестиції.Ключові слова: ризик, криптовалюта, крипторинок, криптомонета, криптогаманець, Bitcoin, Ethereum, хакерська атака.


Author(s):  
A. Santhosh ◽  
S. S. Dawn

Abstract Food waste has been a complex component added to the Municipal solid waste, making it a major reason for the evolution of greenhouse gases, foul odour and a dwelling habitat for insects and microbes. Diversion of the mixed food waste (unsegregated) to useful materials (activated carbon) would have immense industrial significance. In this study, rice, vegetables, oil and spice (WCVR); mixed fruit peels including banana peel, pomegranate peel, orange peel and lemon peel (MFPW); plain rice (WCR) and mixed food waste (rice, dhal, vegetables, fruits, meat and bones) (MFW) were used. Food waste samples were heated at a temperature of 350 °C for 3 h in an incinerator and then activated with zinc chloride for 2 h in a muffle furnace maintained at 500–600 °C temperature. Zinc chloride activated carbon was characterized through XRD, FESEM and FTIR. WCR carbon resulted to be best-activated carbon, yielding nanomaterials with 2θ = 25.81, 31.76, 34.41 and 56.54, which was in accordance with JCPDS card number. The mixed food waste activated carbon reduced the biodiesel wash water pH from 10 to 6.5 making it suitable for recycle. Turbidity by 98.41%, COD by 41.33%, oil and grease by 99.05% for mixed food waste carbon.


2021 ◽  
Vol 14 (2) ◽  
pp. 206-217
Author(s):  
Nur Muchammad Ivan Firmansyah ◽  
Luki Nurfanto

AbstractThe purpose of the study was to determine the form of criminal responsibility and the prevention of carding crimes in Indonesia. The research method used in this study was descriptive analysis. Descriptive because it describes the conditions that become the independent variable and the dependent variable which is the basis of the problems discussed. The definition of carding itself is a form of crime that uses other people's credit cards to spend without the knowledge of the owner. Carding is a form of crime using someone else's credit card number to spend without the knowledge of the rightful owner. Transactions are usually carried out electronically. Carding itself is a criminal act that is illegal interception or physically tapping customer data or credit card owners, meaning to shop at online stores. This mode can occur due to the weakness of the authentication system used to ensure the identity of ordering goods at online stores.Keywords: carding; credit card; criminal liabilityAbstrakTujuan penelitian untuk mengetahui bentuk pertanggungjawaban pidana dan penanggulangan tindak pidana carding di Indonesia Metode penelitian yang digunakan dalam penelitian ini adalah deskriptif analistis. Deskriptif karena menggambarkan kondisi-kondisi yang menjadi variabel independen dan variabel dependen yang merupakan dasar dari permasalahan yang dibahas. Pengertian dari carding itu sendiri adalah suatu bentuk kejahatan yang menggunakan kartu kredit orang lain untuk dibelanjakan tanpa sepengetahuan pemiliknya. Carding adalah bentuk kejahatan menggunakan nomor kartu kredit orang lain untuk dibelanjakan tanpa sepengetahuan pemiliknya yang sah. Transaksi lazimnya dilakukan secara elektronik. Carding sendiri merupakan tindak pidana yang bersifat illegal interception atau menyadap data nasabah atau pemilik kartu kredit secara fisik artunya untuk belanja di toko online. Modus ini dapat terjadi akibat lemahnya sistem otentikasi yang digunakan dalam memastikan identitas pemesanan barang di toko online.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Cheng Ding ◽  
Cheng Wang ◽  
Xinyi Wang ◽  
Yueer Gao ◽  
Yongxin Liao ◽  
...  

In the case of passengers taking the subway many times in a short time, missing cards in and out of the station, and staying in the subway station for a long time, the previous table join method cannot accurately set the time threshold parameters and correctly match the OD pairs of passengers. In order to solve these problems, an OD matching method based on analysis function is proposed in this paper. LAG () is an analytic function in Oracle which allows you to access the row at a given offset prior to the current row without using a self-join. Metro IC card dataset stores the card swiping records of passengers entering and leaving the subway station every time. In this method, the dataset is sorted in ascending order according to the card number and card swiping time, and then, the lag function of Oracle is used to take the offset of the upper line of card ID, transaction date, transaction time, in and out sign, and station ID. Finally, the matching process is completed according to the OD conditions of card number, time, and inbound and outbound sign fields. This method does not need to set a time threshold and so as to deal with the situation where passengers stay too long in the subway station. The OD matching results on in and out IC swiping cards dataset in April and May 2019 of passengers of Xiamen Metro Line verify that analysis function method has better OD matching, missing swiping identification accuracy, and effect compared to the table join method.


Author(s):  
Mayra Durán ◽  
Reyes Juárez-Ramírez ◽  
Samantha Jiménez ◽  
Claudia Tona

Currently, in Scrum, there are different methods to estimate user stories in terms of effort or complexity. Most of the existing techniques consider factors in a fine grain level; these techniques are not always accurate. Although Planning Poker is the most used method in Scrum to estimate user stories, it is primarily effective in experienced teams since the estimation mostly depends on the observation of experts, but it is difficult when is used by inexperienced teams. In this paper, we present a proposal for complexity decomposition in a coarse grain level, in order to consider important factors for complexity estimation. We use a Bayesian network to represent those factors and their relations. The edges of the network are weighted with the judge of professional practitioners about the importance of the factors. The nodes of the network represent the factors. During the user estimation phase, the Scrum team members introduce the values for each factor; in this way, the network generates a value for the complexity of a User story, which is transformed in a Planning Poker card number, which represents the story points. The purpose of this research is to provide to development teams without experience or without historical data, a method to estimate the complexity of user stories through a model focused on the human aspects of developers.


2020 ◽  
pp. 197-200
Author(s):  
Saranya K ◽  
Rajasekar S S ◽  
Nagarajan B

Now a days the security dangers in the online ex-changes, ATM money withdrawals’ have expanded on a substan-tial scale. Individuals in the country zone are as yet ignorant of these dangers are as yet encountering many loses. Individuals unconscious of these dangers don't perceive that sharing their ATM PIN number, yet additionally sharing their credit/debit card number and CCV can likewise prompt the getting to of financial balance without their insight. In this way, in this proposed framework it is said that the credit/debit card number and CCV are being supplanted with dynamically produced QR codes. This QR code that is created can't be reproduced or hacked as effec-tively as the current framework. In the present framework OTP is sent to authenticate our transactions. This OTP is additionally added with Bio-metric confirmation like unique finger-print, iris information. This provides an additionally improved verification amid all the ATM exchanges. The execution on the above framework is basic as all the financial accounts are now linked with Aadhar card. And this can be implementing the QR code scanner alongside unique finger-print scanner and iris scanner in later stages. This never enables the unapproved clients to access or make any installments without the respective of the account holders. This expands the security level and furthermore enables the client to the exchange cash all the more securely. The pro-posed framework improves the security in the exchanges in our everyday life as no ATM withdrawal or Deposit should be possi-ble without the QR code and the Account holder themselves.


Sign in / Sign up

Export Citation Format

Share Document