We present a spatial analysis of Bitcoin-accepting merchants using BTC Map,a global crowdsourced dataset built on OpenStreetMap,to provide ground-level evidence on Bitcoin’s payment ecosystem.While prior research emp...We present a spatial analysis of Bitcoin-accepting merchants using BTC Map,a global crowdsourced dataset built on OpenStreetMap,to provide ground-level evidence on Bitcoin’s payment ecosystem.While prior research emphasizes macroeconomic drivers,our analysis of approximately 11,000 merchants shows that local adoption is more strongly shaped by community dynamics and sectoral niches.Acknowledging quality variance in crowdsourced data,we focus on verified regional clusters.We find a global concentration of adoption in the hospitality sector,localised clusters driven by grassroots initiatives rather than national policy and significant presence in alternative healthcare and IT services.These findings highlight the limits of top-down interventions such as El Salvador’s legal tender law and underscore the role of social networks in sustaining adoption.By contrasting spatial micro-level evidence with national studies,this work positions merchant data as a key lens for understanding Bitcoin’s evolving role as a medium of exchange.展开更多
Role–event videos are rich in information but challenging to be understood at the story level.The social roles and behavior patterns of characters largely depend on the interactions among characters and the backgroun...Role–event videos are rich in information but challenging to be understood at the story level.The social roles and behavior patterns of characters largely depend on the interactions among characters and the background events.Understanding them requires analysis of the video contents for a long duration,which is beyond the ability of current algorithms designed for analyzing short-time dynamics.In this paper,we propose In Social Net,an interactive video analytics tool for analyzing the contents of role–event videos.It automatically and dynamically constructs social networks from role–event videos making use of face and expression recognition,and provides a visual interface for interactive analysis of video contents.Together with social network analysis at the back end,In Social Net supports users to investigate characters,their relationships,social roles,factions,and events in the input video.We conduct case studies to demonstrate the effectiveness of In Social Net in assisting the harvest of rich information from role–event videos.We believe the current prototype implementation can be extended to applications beyond movie analysis,e.g.,social psychology experiments to help understand crowd social behaviors.展开更多
Over the last few years,the need of a cloud environment with the ability to detect illegal behaviours along with a secured data storage capability has increased largely.This study presents such a secured cloud storage...Over the last few years,the need of a cloud environment with the ability to detect illegal behaviours along with a secured data storage capability has increased largely.This study presents such a secured cloud storage framework comprising of a deoxyribonucleic acid(DNA)based encryption key which has been generated to make the framework unbreakable,thus ensuring a better and secured distributed cloud storage environment.Furthermore,this work proposes a novel DNA-based encryption technique inspired by the biological characteristics of DNA and the protein synthesis mechanism.The introduced DNA based model also has an additional advantage of being able to decide on selecting suitable storage servers from an existing pool of storage servers on which the data must be stored.A fuzzy-based technique for order of preference by similarity to ideal solution(TOFSIS)multi-criteria decisionmaking(MCDM)model has been employed to achieve the above-mentioned goal.This can decide the set of suitable storage servers and also results in a reduction in execution time by keeping up the level of security to an improved grade.This study also investigates and analyzes the strength of the proposed S-Box and encryption technique against some standard criteria and benchmarks,such as avalanche effect,correlation coefficient,information entropy,linear probability,and differential probability etc.After the avalanche effect analysis,the average change in cipher-text has been found to be 51.85%.Moreover,thorough security,sensitivity and functionality analysis show that the proposed scheme guarantees high security with robustness.展开更多
基金funded in part by the Rapid Response Fund of the AI for Collective Intelligence(AI4CI)hub,a UKRI National AI Research Hub(grant ref EP/Y028392/1).
文摘We present a spatial analysis of Bitcoin-accepting merchants using BTC Map,a global crowdsourced dataset built on OpenStreetMap,to provide ground-level evidence on Bitcoin’s payment ecosystem.While prior research emphasizes macroeconomic drivers,our analysis of approximately 11,000 merchants shows that local adoption is more strongly shaped by community dynamics and sectoral niches.Acknowledging quality variance in crowdsourced data,we focus on verified regional clusters.We find a global concentration of adoption in the hospitality sector,localised clusters driven by grassroots initiatives rather than national policy and significant presence in alternative healthcare and IT services.These findings highlight the limits of top-down interventions such as El Salvador’s legal tender law and underscore the role of social networks in sustaining adoption.By contrasting spatial micro-level evidence with national studies,this work positions merchant data as a key lens for understanding Bitcoin’s evolving role as a medium of exchange.
基金supported by National Natural Science Foundation of China(No.61802278).
文摘Role–event videos are rich in information but challenging to be understood at the story level.The social roles and behavior patterns of characters largely depend on the interactions among characters and the background events.Understanding them requires analysis of the video contents for a long duration,which is beyond the ability of current algorithms designed for analyzing short-time dynamics.In this paper,we propose In Social Net,an interactive video analytics tool for analyzing the contents of role–event videos.It automatically and dynamically constructs social networks from role–event videos making use of face and expression recognition,and provides a visual interface for interactive analysis of video contents.Together with social network analysis at the back end,In Social Net supports users to investigate characters,their relationships,social roles,factions,and events in the input video.We conduct case studies to demonstrate the effectiveness of In Social Net in assisting the harvest of rich information from role–event videos.We believe the current prototype implementation can be extended to applications beyond movie analysis,e.g.,social psychology experiments to help understand crowd social behaviors.
基金This publication was an outcome of the R&D work undertaken project under the Visvesvaraya PhD Scheme of Ministry of Electronics&Information Technology,Government of India,being implemented by Digital India Corporation.
文摘Over the last few years,the need of a cloud environment with the ability to detect illegal behaviours along with a secured data storage capability has increased largely.This study presents such a secured cloud storage framework comprising of a deoxyribonucleic acid(DNA)based encryption key which has been generated to make the framework unbreakable,thus ensuring a better and secured distributed cloud storage environment.Furthermore,this work proposes a novel DNA-based encryption technique inspired by the biological characteristics of DNA and the protein synthesis mechanism.The introduced DNA based model also has an additional advantage of being able to decide on selecting suitable storage servers from an existing pool of storage servers on which the data must be stored.A fuzzy-based technique for order of preference by similarity to ideal solution(TOFSIS)multi-criteria decisionmaking(MCDM)model has been employed to achieve the above-mentioned goal.This can decide the set of suitable storage servers and also results in a reduction in execution time by keeping up the level of security to an improved grade.This study also investigates and analyzes the strength of the proposed S-Box and encryption technique against some standard criteria and benchmarks,such as avalanche effect,correlation coefficient,information entropy,linear probability,and differential probability etc.After the avalanche effect analysis,the average change in cipher-text has been found to be 51.85%.Moreover,thorough security,sensitivity and functionality analysis show that the proposed scheme guarantees high security with robustness.