[ANN] [POS/MN] [DEQ] Dequant - Quantum-Computer Intelligence and Deep Learning

Live Crypto

Currency
Rates
BTC
11253.8 USD
ETH
391.78 USD
XRP
0.30912 USD
USDT
1.00149 USD
BCH
293.256 USD
BSV
228.826 USD
LTC
57.9507 USD
ADA
0.13825 USD
LINK
9.5959 USD
BNB
21.9547 USD

CG Sponsors




Cazkys

Fun Poster
Joined
Oct 22, 2017
Messages
304
Reaction score
2
Points
15

WEBSITE | WHITEPAPER | ROADMAP | FACEBOOK | TWITTER | DISCORD | EXPLORER 1 | EXPLORER 2 | GITHUB | WALLETS

We are now listed on mnrank.com


COIN INFORMATION

TPYE: POS / MN
Coin name: DEQUANT
Coin Symbol: DEQ
Algo: Quark
Rewards: MN - 80%, PoS - 20%
MAX COIN SUPPLY: 40.000.000
Coin Lock: 20.000.000
MN REQUIRED COINS: 5000
Block Time: 90 Seconds



PRESALE Start 11.03.2019



The approach of DEQUANT is to solve this problem with an quantum-computer based artificial
Intelligence and deep learning techniques to protect our customers against modern and next-generation threats.





Effects such as superposition and entanglement that are not present in the classical world of IT offer
information-processing benefits many of which can be meaningfully applied to cryptography.

The DEQUANT AI permanently monitors all decentralized devices in real-time. The quantum entanglement plays a central role here.
Quantum particles that are interconnected react to the status of the other networked particles even thousands of miles away and all in zero-time.


WEBSITE
WHITEPAPER
ROADMAP
FACEBOOK
TWITTER
DISCORD
EXPLORER 1
EXPLORER 2
GITHUB
WALLETS








Zero-time makes it possible to protect all other quantum blockchain participants in
the same moment of the attack against the threat that has just become known.

The deep learning method in conjunction with the Quantum technology allows us to
detect even the smallest changes or attempts to manipulate.

Based on attacks that occur on the individual devices with the most diverse system configurations
and operating systems, the artificial intelligence continuously extends its own database by itself.

The Dequant LFAP (learned-from-attack-protocol) analyze, categorize and archives the threat after the attack.
Permanent database updates as known from standard anti-virus procedures are now a thing of the past.








 
Top
Log in Register