This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
      Learn more about bidirectional Unicode characters
    
  
  
    
  | Telecom Fraud Detection Using GAN for Banking Industry | |
| https://www.sciencedirect.com/science/article/pii/S0893608018300698 | |
| Continous Recurrent Neural Networks with Adversarial Training | |
| http://mogren.one/publications/2016/c-rnn-gan/mogren2016crnngan.pdf | |
| Jupyter Notebooks for DRN and GAN | |
| https://insights.untapt.com/deep-reinforcement-learning-and-generative-adversarial-networks-tutorials-with-jupyter-notebooks-6ef4dc6957ea | |
| Live Lessons | 
  
    
      This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
      Learn more about bidirectional Unicode characters
    
  
  
    
  | Creating a Transaction Handlers | |
| https://sawtooth.hyperledger.org/docs/core/nightly/master/_autogen/sdk_TP_tutorial_go.html | |
| Gossip Protocol and Protobuf Messages | |
| https://jira.hyperledger.org/browse/FAB-10302 | 
  
    
      This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
      Learn more about bidirectional Unicode characters
    
  
  
    
  | https://www.visualcapitalist.com/decentralized-finance/ | |
| https://blockonomi.com/what-is-decentralized-finance-defi/ | |
| https://www.investinblockchain.com/decentralized-finance-redefine-banking/ | |
| https://www.mycryptopedia.com/what-are-decentralized-finance-defi-applications/ | |
| https://tokeneconomy.co/mapping-the-decentralized-financial-system-7c5af65e0335 | |
| https://www.theblockcrypto.com/2019/03/14/mapping-out-ethereums-defi/ | |
| https://blog.blockonomics.co/6-basics-of-decentralized-finance-you-should-know-fb169dcf4673 | |
| https://www.coindesk.com/decentralized-finance-emerges-as-banner-topic-at-ethereum-denver-conference | 
  
    
      This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
      Learn more about bidirectional Unicode characters
    
  
  
    
  | NEM Blockchain Feature Overview : https://testnet.help/en/article/nem-blockchain | |
| NEM Blockchain Architecture : https://sites.google.com/site/blockchaintutorial/nem-blockchain-architecture | |
| NEM Blockchain High Performance Architecture : https://sludgefeed.com/nem-high-performance-blockchain-architecture/ | |
| NEM Blockchain Production Capabilities : https://blog.nem.io/production-level-blockchain/ | |
| NEM Blockchain Node Overview : https://nemtech.github.io/concepts/node.html | |
| NEM Blockchain Architect Guide : https://nemtech.github.io/getting-started/what-is-nem.html | |
| NEM v/s Ethereum Comparison : https://blog.nem.io/ethereum-versus-nem-the-obvious-choice/ | |
| NEM v/s Bitcoin v/s Ethereum v/s Nxt v/s Ardor : https://www.jelurida.com/blockchain-comparison | |
| NEM v/s Ethereum v/s Hyperledger : https://hackernoon.com/comparison-of-smart-contract-platforms-2796e34673b7 | 
  
    
      This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
      Learn more about bidirectional Unicode characters
    
  
  
    
  | Bullet Proofs does not requrie trusted setup like ZK Snarks. Bulletproofs shrink the size of the cryptographic proof from over 10kB to less than 1kB. If all Bitcoin transactions were confidential and used Bulletproofs, then the total size of the UTXO set would be only 17 GB, compared to 160 GB with the currently used proofs. Bulletproofs have many other applications in cryptographic protocols, such as shortening proofs of solvency, short verifiable shuffles, confidential smart contracts, and as a general drop-in replacement for Sigma-protocols - https://crypto.stanford.edu/bulletproofs/ | |
| Decentralized Anonymous Payments - https://blog.acolyer.org/2017/02/21/zerocash-decentralized-anonymous-payments-from-bitcoin/ | |
| Most efficient zero knowledge proofs known are based on Sigma protocols. Informally, Sigma protocols are honest-verifier perfect zero-knowledge interactive proof systems with some very interesting properties. First, they are three round public-key protocols (meaning | |
| that the verifier’s single messag | 
  
    
      This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
      Learn more about bidirectional Unicode characters
    
  
  
    
  | Understanding Blockchain Platform Architectures and Implementation Styles | |
| https://www.gartner.com/en/documents/3627217 | |
| An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends | |
| https://ieeexplore.ieee.org/document/8029379 | |
| How Hyperledger Fabric Delivers Security to Enterprise Blockchain | |
| https://www.altoros.com/blog/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain/ | |
| Security Analyzer for Hyperledger Fabric Smart Contracts | 
  
    
      This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
      Learn more about bidirectional Unicode characters
    
  
  
    
  | The only purpose of RLP is to encode structure; | |
| Encoding specific atomic data types (eg. strings, ints, floats) is left up to higher-order protocols | |
| In Ethereum integers must be represented in big endian binary form with no leading zeroes | |
| Thus making the integer value zero be equivalent to the empty byte array | |
| https://ethereum.stackexchange.com/questions/30518/does-rlp-specify-integer-encoding?rq=1 | |
| Shared Nibble in the Extension Node | |
| https://ethereum.stackexchange.com/questions/31920/what-is-the-shared-nibble-of-this-extension-node | |
| Ethereum Compact Merkle Trie | 
  
    
      This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
      Learn more about bidirectional Unicode characters
    
  
  
    
  | Developing Architecture Baseline | |
| http://www.informit.com/articles/article.aspx?p=375542&seqNum=3 | |
| The architecture is manifested as an early version of the final system known as an architecture baseline. | |
| The architecture baseline is a subset of the entire system, so we call it the skinny system. This skinny system has versions of all the models that the full-fledged system has at the end of the project. It includes the same skeleton of subsystems, components, and nodes, but not all the musculature is in place. | |
| Developing Architecture Views | |
| http://pubs.opengroup.org/architecture/togaf8-doc/arch/chap31.html | |
| Firstly, there is common usage. Typically an overall enterprise architecture comprising all four "architectures" (Business, Data, Applications, Technology) will not be undertaken as a single project. Rather each "architecture" - and in some cases, subsets of them - will be undertaken as individual projects. The ultimate deliverable of such a project is commonly referred to as an "... architecture" (for e | 
  
    
      This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
      Learn more about bidirectional Unicode characters
    
  
  
    
  | https://www.searchtechnologies.com/blog/natural-language-processing-techniques | |
| https://stackoverflow.com/questions/46383076/how-to-implement-synonyms-for-use-in-a-search-engine | |
| https://towardsdatascience.com/simple-nlp-search-in-your-application-step-by-step-guide-in-scala-22ca1ce3e475 | |
| https://medium.com/@chrisfotache/text-classification-in-python-pipelines-nlp-nltk-tf-idf-xgboost-and-more-b83451a327e0 | |
| Data Sample | |
| Training NER | |
| Entity Extraction | |
| Categorizing Content | |
| Clustering Content | 
  
    
      This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
      Learn more about bidirectional Unicode characters
    
  
  
    
  | Tezos can instantiate any blockchain based protocol. Its seed protocol specifies a procedure for stakeholders to approve amendments to the proto- col, including amendments to the amendment procedure itself. Upgrades to Tezos are staged through a testing environment to allow stakeholders to recall potentially problematic amendments. | |
| Tezos Transaction Management | |
| A manager operation, such as a transaction, has 3 important parameters: counter, gas and storage limit. | |
| The counter belongs to each account, it increases at each operation signed by that account and enforces some good intuitive properties: | |
| In Tezos there are two kinds of accounts: implicit and originated. | |
| The implicit accounts are the tz1 we have used up to now. | |
| They are created with a transfer operation to the account public key hash. Originated accounts have addresses KT1 and are created with an origination operation. |