Mohammed Abbas Fadhil Al-Husainy, Bassam Al-Shargabi
{"title":"Secure and Lightweight Encryption Model for IoT Surveillance Camera","authors":"Mohammed Abbas Fadhil Al-Husainy, Bassam Al-Shargabi","doi":"10.30534/ijatcse/2020/143922020","DOIUrl":"https://doi.org/10.30534/ijatcse/2020/143922020","url":null,"abstract":"We are witnessing the era of Internet of Things (IoT), where its applications such as smart cities and smart homes catch sensitive data gathered mostly by IoT surveillance cameras among other sensors or devices. Therefore, security and privacy protection is a key concern during transmitting such sensitive data across the IoT network to be processed and stored on Cloud. In this paper, we proposed a lightweight encryption model that complies with the limited resources of IoT devices in terms of process and memory. Also, the encryption model also provides a high level of security for the transmitted data through a constant change of the key used for encrypting of transmitted IoT data. In addition, the key size used to encrypt transmitted data in the proposed model is large enough which makes it hard to break by the attackers. The experimental results show outstanding results with an average of 170.7 ms of encryption time for a key size 80 bits where the key size is relatively large and with an average PSNR of 7.7 compared to other algorithms.","PeriodicalId":89488,"journal":{"name":"The electronic journal of human sexuality","volume":"33 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87911425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Inclined Slotted Waveguide Antenna Design","authors":"Riyaz Pathan","doi":"10.2139/ssrn.3573535","DOIUrl":"https://doi.org/10.2139/ssrn.3573535","url":null,"abstract":"Waveguide antennas are the most powerful tool of Radar system. Slotted Waveguide antennas have been very popular from last two decades. Slotted Waveguide antennas are preferred for Radar System. Maritime Radar & aircraft radar system completely depends on the performance of Slotted Waveguide Antenna Lots of work have been done for the design of Planar arrays but very few are available for Slotted Waveguide. By Changing the position & inclination of the slot optimum gain can be achieved. A prototype microwave slotted designed waveguide antenna will be fabricated and tested to get the design results in accordance with the simulation. The purpose of research paper is to give an objective WaveguideTechnology.","PeriodicalId":89488,"journal":{"name":"The electronic journal of human sexuality","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90855648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Verification of Identity and Educational Certificates of Students Using Biometric and Blockchain","authors":"Jignasha Dalal, Meenal Chaturvedi, Himani Gandre, Sanjana Thombare","doi":"10.2139/ssrn.3564638","DOIUrl":"https://doi.org/10.2139/ssrn.3564638","url":null,"abstract":"Blockchain technology is being adopted in various areas like finance, healthcare, and trade. It is adding value to the existing business methods with its features like transparency, security, and decentralization. It can also transform the working of education systems. In the current education systems, students identify themselves through multiple government-authorized identity proofs. Additionally, their previous degree certificates are manually verified by college authorities during the admission process. This requires lots of time and manpower. A blockchain-based system can offer more security, transparency and efficiency than the existing system. The proposed solution is the use of biometric to access all the previous degree certificates of a student using blockchain. The students will submit the hash of their biometric and a unique phrase. This hash will be stored on the blockchain. The degree certificate for a student will be issued by the college authorities. They will upload the hash of digitally signed certificate on the blockchain. For admission into higher studies, college authorities can fetch a student’s previous certificates from the blockchain using the hash of his/her biometric and a unique phrase. This concept can be extended to verify any documents by linking them to a person’s identity without involving a third party.","PeriodicalId":89488,"journal":{"name":"The electronic journal of human sexuality","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73664853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Akshi Kumar, Binayak Chakrabarti, Aseer Ahmad Ansari
{"title":"Kisan Mitra: A Data Analytic Based Prototype for Avoiding Crops Price Crash","authors":"Akshi Kumar, Binayak Chakrabarti, Aseer Ahmad Ansari","doi":"10.2139/ssrn.3567604","DOIUrl":"https://doi.org/10.2139/ssrn.3567604","url":null,"abstract":"Price crash is an imminent issue faced by farmers in our country.Farm crisis has been faced owing to worst price slumps in 18 years at a point in time the previous year. Analyzing the various factors affecting cultivation and price crash like previous trends in demand, supply, exports of various kinds of crops will help us forecast beforehand when can a price crash situation arise. This will help in alarming the farmers regarding the same so that they can cultivate the crops accordingly. In our work we have proposed to use machine learning to forecast price crash and display them in an explicitly understandable format which could help in the generation of doable preventive measures.There would be conception of clustering methodology along with machine learning algorithms. The Performance of each algorithm is analyzed and the best algorithm is found out which is having maximum accuracy of price crash forecasting. The basic aim is to provide with an online application the knowledge from where could be disseminated to help the farmers to understand the outer world of demand and supply of agricultural commodities which are domestically and internationally traded and thus prevent themselves from price crash situation.","PeriodicalId":89488,"journal":{"name":"The electronic journal of human sexuality","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74158494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhanna Biksitova, O. Grechkina, L. Dushakova, Andrey Margiev, O. Sushkova, O. V. Shmaliy
{"title":"Современные подходы к формированию концепции правового обеспечения цифровой экономики (Modern Approaches to the Formation of the Concept of Legal Support for the Digital Economy)","authors":"Zhanna Biksitova, O. Grechkina, L. Dushakova, Andrey Margiev, O. Sushkova, O. V. Shmaliy","doi":"10.2139/ssrn.3677924","DOIUrl":"https://doi.org/10.2139/ssrn.3677924","url":null,"abstract":"One of the main tasks of the state at the present stage is the development of a clear concept for the development of innovative technologies in socially significant areas of life. The successful implementation of this concept is mediated by an understanding of the technological component that determines the operation of algorithms encoded in software, and legal support of innovative digital technologies. The rapid processes of the emergence and spread of new digital technologies in the economic turnover and, above all, in the financial sphere, dictate the need to increase the role of the state in the legislative support of their regulation and implementation. In this regard, actual monitoring of the latest digital technologies is in demand with the development of legal models for their adaptation to Russian conditions.","PeriodicalId":89488,"journal":{"name":"The electronic journal of human sexuality","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79265256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Artificial Intelligence and Access to the Patent System","authors":"W. Robinson","doi":"10.2139/ssrn.3580850","DOIUrl":"https://doi.org/10.2139/ssrn.3580850","url":null,"abstract":"How likely is it that the average American will become an inventor? With a novel idea and hard work it should be a possibility for all Americans. The data suggests otherwise. Most patents are obtained by inventors that work for large corporations. Small businesses, solo inventors, women, and minorities lag behind their counterparts in patenting. A common explanation for this phenomenon is that it is a “pipeline” issue. However, evidence suggest that the patent system is not accessible to underrepresented innovators for more problematic reasons. \u0000 \u0000At almost the same time as information about the concentration of patenting activity has garnered attention, the U.S. Patent and Trademark Office (“USPTO”) has become more vocal about its interest in Artificial Intelligence (“AI”). AI will transform how the USPTO examines patent applications. It may also transform how people invent. What has been absent from the conversation about AI and patenting is the negative effect AI has had when introduced in other social systems. For example, AI models can exhibit bias that concentrates power around incumbents. In addition, leaders overestimate the ability of AI models to solve human issues. This Article refers to these problems collectively as “AI enthusiasm.” \u0000 \u0000This Article argues that AI enthusiasm threatens to make the patent system less accessible for underrepresented innovators. In response, this article presents a framework for improving access to the patent system given the emergence of AU. First, limits must be placed on AI assisted examination informed by best practices that combat AI bias. Second, the USPTO should grant patents to inventions that are created with the assistance of AI only if the AI involved adheres to a set of best practices that reduce the chance of biased outcomes. Finally, true access involves removing obstacles to the innovation culture that has historically been closed to underrepresented inventors. Thus, AI tools should be deployed to assist underrepresented innovators in the patenting process. Collectively, these measures may provide U.S. innovators from all walks of life the opportunity to call themselves an inventor.","PeriodicalId":89488,"journal":{"name":"The electronic journal of human sexuality","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84495553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Théo Persenot, A. Burr, R. Dendievel, J. Buffière, E. Maire, J. Lachambre, G. Martin
{"title":"Fatigue Performances of Chemically Etched Thin Struts Built by Selective Electron Beam Melting: Experiments and Predictions","authors":"Théo Persenot, A. Burr, R. Dendievel, J. Buffière, E. Maire, J. Lachambre, G. Martin","doi":"10.1016/j.mtla.2020.100589","DOIUrl":"https://doi.org/10.1016/j.mtla.2020.100589","url":null,"abstract":"","PeriodicalId":89488,"journal":{"name":"The electronic journal of human sexuality","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74517695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Model of Intelligent Recommender System with Explicit Feedback Mechanism for Performance Improvement","authors":"O. Temitope.","doi":"10.2139/ssrn.3577730","DOIUrl":"https://doi.org/10.2139/ssrn.3577730","url":null,"abstract":"Recommender Systems are intelligent applications designed to assist the user in a decision-making process whereby user wants to choose one item amongst the potentially overwhelming set of alternative products or services. This work focused on using users bank statements that explicitly shows inflow and outflow of funds. The dataset used is real and reliable because the use of non-reliable data in a recommender system causes users lack of trust in the system. However, the data collected were anonymized for privacy reasons. The recommender system was developed as a web application using Java programming language. Unlike other recommender systems, the graph-oriented database management system was used. In Google news, 38% of the total views are the result of recommendations; similarly, 60% of the rented movies from Netflix come from recommendations and more than that Amazon sales percentage due to recommendations are 35%. Successful integration of recommendation system by online companies like Amazon, eBay, Flipkart amongst others impelled the research community to avail similar benefits in financial domain to recommend product and services (Lim, 2015). Therefore, recommendation systems are considered an expedient factor in business nowadays. The aim of all recommender systems is to provide recommendation that will be favourably evaluated and accepted by its users. This work provides detailed descriptions of methods employed to proffer solutions to intelligent recommender system with explicit feedback mechanism. The methodology of this research work refers to the research approach adopted by the researcher to tackle the research problem as stated in earlier chapter. Since the efficiency and maintainability of any application is solely dependent on how the designs are prepared, this chapter describes the various processes, methods and procedures used to achieve set objectives and the conceptual structure within which the research was conducted.","PeriodicalId":89488,"journal":{"name":"The electronic journal of human sexuality","volume":"43 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81306658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection and Prevention Policies of Jellyfish Attack in MANET","authors":"Shruti Thapar, S. Sharma","doi":"10.2139/ssrn.3548382","DOIUrl":"https://doi.org/10.2139/ssrn.3548382","url":null,"abstract":"A mobile ad hoc network works on without any specified infrastructure but still very flexible and self configurable network in nature. It acts as hosts as well as routers both simultaneously. Due to its dynamic topology and higher power constraint mobile ad hoc network has to face many security related issues in it. And due to this security becomes the important part of the research area now days. Ad hoc networks are exposed to large number of attacks like Wormhole attack, Blackhole attack, rushing attack, Jellyfish attack etc. In which Jellyfish attack is DOS attack and it is very hard to analyze because it obeys all the rules and regulations of the network. A Jelly Fish (JF) attack is mainly destructive for TCP-based ad hoc networks which will delay the data packet, drop or reorder the data packets. JF attacks works on network layer and it also affect the work of transport layer by degrading the levels of end-to-end delay and goodput of the network. It contains all the information about existing routes and all the specifications setup in the environment, which is hard to analyze. The Prime motive of this paper is to learn and analyze the different approaches and methods given by the various authors to solve the different versions of JF attacks in MANET wisely.","PeriodicalId":89488,"journal":{"name":"The electronic journal of human sexuality","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82784378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Haley M. Butler, E. Naseri, D. MacDonald, R. Andrew Tasker, A. Ahmadi
{"title":"Optimization of Starch- and Chitosan-Based Bio-Inks for 3D Bioprinting of Scaffolds for Neural Cell Growth","authors":"Haley M. Butler, E. Naseri, D. MacDonald, R. Andrew Tasker, A. Ahmadi","doi":"10.2139/ssrn.3539196","DOIUrl":"https://doi.org/10.2139/ssrn.3539196","url":null,"abstract":"Abstract This paper investigates the use of starch and chitosan blends for bioprinting of neural cell applications. The printability and biocompatibility of different starch to chitosan ratio bio-inks were studied. The biofabrication window paradigm was used to determine the optimum composition of bio-ink as 50% starch and 50% chitosan in terms of both printability and biocompatibility with Neuro-2a cells. This defies the conventional understanding that increasing the chitosan percentage enhances the biocompatibility. Moreover, the limitations of the conventional framework for characterizing the printability of bio-inks were identified and a revised framework based on the flattening factor was proposed. It was shown that the revised framework provides better means of characterizing the printability of bio-inks.","PeriodicalId":89488,"journal":{"name":"The electronic journal of human sexuality","volume":"37 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82551075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}