Emmanouil Markoulakis, A. Konstantaras, J. Chatzakis, R. Iyer, E. Antonidakis
{"title":"Real Time Observation of Stationary Magneton","authors":"Emmanouil Markoulakis, A. Konstantaras, J. Chatzakis, R. Iyer, E. Antonidakis","doi":"10.1016/j.rinp.2019.102793","DOIUrl":"https://doi.org/10.1016/j.rinp.2019.102793","url":null,"abstract":"","PeriodicalId":89488,"journal":{"name":"The electronic journal of human sexuality","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89972565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Barcode Technology and its Application in Libraries","authors":"Dr. Anupam Chanda","doi":"10.2139/ssrn.3649957","DOIUrl":"https://doi.org/10.2139/ssrn.3649957","url":null,"abstract":"The library is one of the essential place in any academic institution. With the invention of ICT (Information and Communications Technology), every sector now a day are trying to automate their system and library is also one of them. We can find that the technologies have taken over and helped the library in various ways. Now a day’s libraries need new tools that will allow them to increase their productivity and improve user service without adding personnel. Application of Bar-code technology in libraries is a way to process client requests from fast to fastest. Bar-code technology is mostly used in the circulation system of a library and most successful due to its speed, accuracy and reliability. Bar-coding though comparatively an old technology is one of the significant steps in library automation and is still not widely used in libraries.<br><br>This article briefly discusses the description of the application of Bar-code technology in libraries, its working mechanism and also the advantages and disadvantages of this technology. The researcher has tried to explore the technical aspects of Bar-code technology in the library. The main aim of the article is to create awareness among the librarians to use Bar-code technology in the library. Bar-code is very cost-effective technology can be used by every library. The paper also discusses the creation of Bar-code with Glabels open-source software which is absolutely free of cost.","PeriodicalId":89488,"journal":{"name":"The electronic journal of human sexuality","volume":"44 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74320683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fish Tracking by Machine Vision for Indoor Farming Systems","authors":"Zhongqiang Ding, Poh Kok Loo, Y. Chong","doi":"10.2139/ssrn.3475324","DOIUrl":"https://doi.org/10.2139/ssrn.3475324","url":null,"abstract":"Singapore is exploring the development of multiple-story buildings for farming to provide more spaces for fish farming and open up more opportunities for shared facilities and resources to relieve the limited space and the manpower intensive requirements. Therefore, it is necessary to apply new technologies on production techniques to optimize fish farming operations, equipment and infrastructures for efficiency and accuracy. Video tracking is one of major approaches to analyse high temporal and spatial resolutions of animals in groups. In this work on indoor farming system of fishes, video capturing approaches and video unmarking approaches are investigated and compared to attain suitable solutions to understand physical characteristics of fishes and environmental factors to best inform successful fish farming. Video background removal and video fish segment approaches are proposed to analyse the trajectories of fish movement such as fish speed, swim patterns etc. To simulate the indoor farming environment, a fish tank with a fish physical characteristics monitoring system is established. The collected data are stored in dedicated workstations. The collected data are stored in dedicated workstations. The system employs conventional cameras with output of grayscale images. The system is fully automatic and can achieve near to high correct identities.","PeriodicalId":89488,"journal":{"name":"The electronic journal of human sexuality","volume":"76 2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83459611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Engineering Tools that Shaped the Rational Expectations Revolution","authors":"M. Boumans","doi":"10.1215/00182702-8717960","DOIUrl":"https://doi.org/10.1215/00182702-8717960","url":null,"abstract":"The rational expectations revolution was not based only on the introduction of Muth’s idea of rational expectations to macroeconomics; this introduction alone cannot explain the more drastic changes to the mathematical toolbox, concepts, and research strategies since the 1980s. The shift from “Keynesian economics” to “new classical economics” is based on a shift from a control engineering approach to an information engineering methodology. This “revolution” was even more radical; it also changed the epistemology and ontology of macroeconomics. The ontology of information engineering, and hence of new classical economics, is a world populated by machines that communicate by the exchange of noisy information. The decisions these machines make are conditioned on the (noisy) information they have about the current state of the world but which at the same time will affect future states. Policy in this world therefore means tracing an optimal trajectory taking all these issues into account. To show this shift in epistemology and ontology, the history of economics is interwoven with the history of mathematics, which cannot be detangled from the emergence of the digital computer. The computer changed the nature of mathematics in a specific way by adopting a new concept of solution, namely the algorithm.","PeriodicalId":89488,"journal":{"name":"The electronic journal of human sexuality","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83242131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Addressing Imbalanced Classes Problem of Intrusion Detection System Using Weighted Extreme Learning Machine","authors":"Mohammed Awad, A. Alabdallah","doi":"10.5121/ijcnc.2019.11503","DOIUrl":"https://doi.org/10.5121/ijcnc.2019.11503","url":null,"abstract":"The main issues of the Intrusion Detection Systems (IDS) are in the sensitivity of these systems toward the errors, the inconsistent and inequitable ways in which the evaluation processes of these systems were often performed. Most of the previous efforts concerned with improving the overall accuracy of these models via increasing the detection rate and decreasing the false alarm which is an important issue. Machine Learning (ML) algorithms can classify all or most of the records of the minor classes to one of the main classes with negligible impact on performance. The riskiness of the threats caused by the small classes and the shortcoming of the previous efforts were used to address this issue, in addition to the need for improving the performance of the IDSs were the motivations for this work. In this paper, stratified sampling method and different cost-function schemes were consolidated with Extreme Learning Machine (ELM) method with Kernels, Activation Functions to build competitive ID solutions that improved the performance of these systems and reduced the occurrence of the accuracy paradox problem. The main experiments were performed using the UNB ISCX2012 dataset. The experimental results of the UNB ISCX2012 dataset showed that ELM models with polynomial function outperform other models in overall accuracy, recall, and F-score. Also, it competed with traditional model in Normal, DoS and SSH classes.","PeriodicalId":89488,"journal":{"name":"The electronic journal of human sexuality","volume":"122 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84899608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization Location Scenarios of Generation Capacity with ETAP Application","authors":"Hestikah Eirene Patoding, Matius Sau, M. Rombe","doi":"10.34218/ijeet.10.5.2019.001","DOIUrl":"https://doi.org/10.34218/ijeet.10.5.2019.001","url":null,"abstract":"This study aims to determine the distribution of electrical power by considering the addition of generating capacity and the addition of networks using ETAP applications. The simulation results show that for the first scenario the addition of generating capacity is carried out at Barru Bus without the addition of transmission networks, the voltage on bus 36 (Barawaja) stabilizes from 0.92 pu to 1.02 pu, with losses of 17.218 MW and 30.171 MVAR. This shows that power losses have decreased from 18.853 MW and 41.291 MVAR or decreased by 1.635 MW from power losses before the addition of generation in Barru. and the second scenario is the addition of generation at Bontoala and the addition of an express network. the system voltage that previously dropped became stable at the existing tolerance limit. Besides that, there were power losses when adding a generator at the Barru Bus. Thus, the distribution of electricity will be better when there is an additional generation at Bontoala Bus and the addition of an express network in the Sulselbar system.","PeriodicalId":89488,"journal":{"name":"The electronic journal of human sexuality","volume":"165 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86337923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Q&A on Financial Machine Learning (Course Materials)","authors":"Marcos M. López de Prado","doi":"10.2139/ssrn.3459207","DOIUrl":"https://doi.org/10.2139/ssrn.3459207","url":null,"abstract":"Machine learning (ML) is changing virtually every aspect of our lives. Today ML algorithms accomplish tasks that until recently only expert humans could perform. As it relates to finance, this is the most exciting time to adopt a disruptive technology that will transform how everyone invests for generations.","PeriodicalId":89488,"journal":{"name":"The electronic journal of human sexuality","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80390222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ethical Issues in Biometrics","authors":"Isaac Cooper, Jimmy Yon","doi":"10.15354/si.19.re095","DOIUrl":"https://doi.org/10.15354/si.19.re095","url":null,"abstract":"In recent years, the social application of biometrics has brought great benefits, but also caused people’s concerns about privacy protection, autonomy, and social exclusion. Here we have sorted out the ethical issues related to the application of biometrics, such as privacy protection, functional transformation, body informationization, informed consent, and social exclusion, and analyzed their core and unique issues. We believe that the current management specifications for the development and application of biometric technology are significantly behind their development. In addition to the introduction of policies, the regulation or governance of biometrics technology should also accelerate the practice of ethical governance and regulatory governance.","PeriodicalId":89488,"journal":{"name":"The electronic journal of human sexuality","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89161033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secured Data Storage in Cloud Using Homomorphic Encryption","authors":"R. Kanagavalli, V. S.","doi":"10.2139/ssrn.3499579","DOIUrl":"https://doi.org/10.2139/ssrn.3499579","url":null,"abstract":"Cloud data storage is a model of data storage where data in its digital form is stored in logical pools across the physical storage which is distributed across multiple servers usually in diverse locations. The full physical environment is owned and managed by an organization called Cloud Service Provider (CSP). In this type of storage, the data is distributed and owned by third party, and there is risk of unauthorized access. This makes security, reliability, confidentiality and privacy of data more important when storage in cloud is thought of. Although there are methods available for providing security, much work is not done with emphasis on dynamic nature of the data. Hence securing the data while updating becomes important. In this paper, a method that ensures confidentiality of data stored in cloud using homomorphic encryption is presented. The paper also provides a technique to ensure confidentiality during data updates in cloud. The presented method includes byte level automorphism for ensuring data integrity and confidentiality. The tabulated experimental results show that the proposed method provides more secure frame work for ensuring confidentiality and integrity of data in cloud.","PeriodicalId":89488,"journal":{"name":"The electronic journal of human sexuality","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78638257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Carles Fuertes-Espinosa, Cristina García-Simón, Míriam Pujals, M. Garcia‐Borràs, L. Gomez, T. Parella, J. Juanhuix, I. Imaz, D. Maspoch, M. Costas, X. Ribas
{"title":"Supramolecular Fullerene Sponges As Catalytic Masks for Regioselective Functionalization of C 60","authors":"Carles Fuertes-Espinosa, Cristina García-Simón, Míriam Pujals, M. Garcia‐Borràs, L. Gomez, T. Parella, J. Juanhuix, I. Imaz, D. Maspoch, M. Costas, X. Ribas","doi":"10.2139/ssrn.3430708","DOIUrl":"https://doi.org/10.2139/ssrn.3430708","url":null,"abstract":"Summary Isomer-pure poly-functionalized fullerenes are required to boost the development of fullerene chemistry in all fields. On a general basis, multi-adduct mixtures with uncontrolled regioselectivity are obtained, and the use of chromatographic purification is prohibitively costly and time consuming, especially in the production of solar cells. Single-isomer poly-functionalized fullerenes are only accessible via stoichiometric, multistep paths entailing protecting-unprotecting sequences. Herein, a nanocapsule is used as a supramolecular tetragonal prismatic mask to exert full control on the reactivity and the equatorial regioselectivity of Bingel-Hirsch cyclopropanation reactions of a confined C60 guest. Thus, equatorial bis-, tris-, and tetrakis-C60 homo-adducts are exclusively obtained in a stepwise manner. Furthermore, isomer-pure equatorial hetero-tetrakis-adducts or hetero-Th-hexakis-adducts are synthesized at will in one-pot synthesis for the first time. This work provides a synthetically valuable path to produce a plethora of new pure-isomer poly-functionalized C60-based compounds as candidates for testing in solar cell devices and biomedical applications. Video Abstract Download : Download video (34MB)","PeriodicalId":89488,"journal":{"name":"The electronic journal of human sexuality","volume":"53 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73775697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}