695 research outputs found

    1959 Opticon

    Get PDF
    LIU Post (formerly C.W. Post College, Long Island University) 1959 yearbook. 159 pageshttps://digitalcommons.liu.edu/post_yearbooks/1003/thumbnail.jp

    A Critical Analysis Of The State-Of-The-Art On Automated Detection Of Deceptive Behavior In Social Media

    Get PDF
    Recently, a large body of research has been devoted to examine the user behavioral patterns and the business implications of social media. However, relatively little research has been conducted regarding users’ deceptive activities in social media; these deceptive activities may hinder the effective application of the data collected from social media to perform e-marketing and initiate business transformation in general. One of the main contributions of this paper is the critical analysis of the possible forms of deceptive behavior in social media and the state-of-the-art technologies for automated deception detection in social media. Based on the proposed taxonomy of major deception types, the assumptions, advantages, and disadvantages of the popular deception detection methods are analyzed. Our critical analysis shows that deceptive behavior may evolve over time, and so making it difficult for the existing methods to effectively detect social media spam. Accordingly, another main contribution of this paper is the design and development of a generic framework to combat dynamic deceptive activities in social media. The managerial implication of our research is that business managers or marketers will develop better insights about the possible deceptive behavior in social media before they tap into social media to collect and generate market intelligence. Moreover, they can apply the proposed adaptive deception detection framework to more effectively combat the ever increasing and evolving deceptive activities in social medi

    A comparison of terrestrial laser scanning and structure-from-motion photogrammetry as methods for digital outcrop acquisition

    Get PDF
    Terrestrial laser scanning (TLS) has been used extensively in Earth Science for acquisition of digital outcrop data over the past decade. Structure-from-­motion (SfM) photogrammetry has recently emerged as an alternative and competing technology. The real-world performance of these technologies for ground-based digital outcrop acquisition is assessed using outcrops from North East England and the United Arab Emirates. Both TLS and SfM are via­ble methods, although no single technology is universally best suited to all situations. There are a range of practical considerations and operating conditions where each method has clear advantages. In comparison to TLS, SfM benefits from being lighter, more compact, cheaper, more easily replaced and repaired, with lower power requirements. TLS in comparison to SfM provides intrinsically validated data and more robust data acquisition in a wide range of operating conditions. Data post-processing is also swifter. The SfM data sets were found to contain systematic inaccuracies when compared to their TLS counterparts. These inaccuracies are related to the triangulation approach of the SfM, which is distinct from the time-of-flight principle employed by TLS. An elaborate approach is required for SfM to produce comparable results to TLS under most circumstances

    The quantum cryptographic switch

    Full text link
    We illustrate using a quantum system the principle of a cryptographic switch, in which a third party (Charlie) can control to a continuously varying degree the amount of information the receiver (Bob) receives, after the sender (Alice) has sent her information. Suppose Charlie transmits a Bell state to Alice and Bob. Alice uses dense coding to transmit two bits to Bob. Only if the 2-bit information corresponding to choice of Bell state is made available by Charlie to Bob can the latter recover Alice's information. By varying the information he gives, Charlie can continuously vary the information recovered by Bob. The performance of the protocol subjected to the squeezed generalized amplitude damping channel is considered. We also present a number of practical situations where a cryptographic switch would be of use.Comment: 7 pages, 4 Figure

    The Alleged Necessity of Microfoundations

    Get PDF
    It is often said that models in the microfoundations literature derive macroeconomic results from the theory of individual behavior only. This paper examines two of the assumptions that are usually made in these models: market clearing and rational expectations. In the context of simple models it is shown that only in some special cases these assumptions can be derived from the fundamental notion that individuals behave rationally. Thus, the usual rationale for the microfoundations literature is challenged. The paper concludes with a more modest rationale for the “necessity” of microfoundations

    Simulating (electro)hydrodynamic effects in colloidal dispersions: smoothed profile method

    Full text link
    Previously, we have proposed a direct simulation scheme for colloidal dispersions in a Newtonian solvent [Phys.Rev.E 71,036707 (2005)]. An improved formulation called the ``Smoothed Profile (SP) method'' is presented here in which simultaneous time-marching is used for the host fluid and colloids. The SP method is a direct numerical simulation of particulate flows and provides a coupling scheme between the continuum fluid dynamics and rigid-body dynamics through utilization of a smoothed profile for the colloidal particles. Moreover, the improved formulation includes an extension to incorporate multi-component fluids, allowing systems such as charged colloids in electrolyte solutions to be studied. The dynamics of the colloidal dispersions are solved with the same computational cost as required for solving non-particulate flows. Numerical results which assess the hydrodynamic interactions of colloidal dispersions are presented to validate the SP method. The SP method is not restricted to particular constitutive models of the host fluids and can hence be applied to colloidal dispersions in complex fluids

    Relativistic Calculation of the Meson Spectrum: a Fully Covariant Treatment Versus Standard Treatments

    Full text link
    A large number of treatments of the meson spectrum have been tried that consider mesons as quark - anti quark bound states. Recently, we used relativistic quantum "constraint" mechanics to introduce a fully covariant treatment defined by two coupled Dirac equations. For field-theoretic interactions, this procedure functions as a "quantum mechanical transform of Bethe-Salpeter equation". Here, we test its spectral fits against those provided by an assortment of models: Wisconsin model, Iowa State model, Brayshaw model, and the popular semi-relativistic treatment of Godfrey and Isgur. We find that the fit provided by the two-body Dirac model for the entire meson spectrum competes with the best fits to partial spectra provided by the others and does so with the smallest number of interaction functions without additional cutoff parameters necessary to make other approaches numerically tractable. We discuss the distinguishing features of our model that may account for the relative overall success of its fits. Note especially that in our approach for QCD, the resulting pion mass and associated Goldstone behavior depend sensitively on the preservation of relativistic couplings that are crucial for its success when solved nonperturbatively for the analogous two-body bound-states of QED.Comment: 75 pages, 6 figures, revised content

    Improved protocols of secure quantum communication using W states

    Full text link
    Recently, Hwang et al. [Eur. Phys. J. D. 61, 785 (2011)] and Yuan et al. [Int. J. Theo. Phys. 50, 2403 (2011)] have proposed two efficient protocols of secure quantum communication using 3-qubit and 4-qubit symmetric W state respectively. These two dense coding based protocols are generalized and their efficiencies are considerably improved. Simple bounds on the qubit efficiency of deterministic secure quantum communication (DSQC) and quantum secure direct communication (QSDC) protocols are obtained and it is shown that dense coding is not essential for designing of maximally efficient DSQC and QSDC protocols. This fact is used to design maximally efficient protocols of DSQC and QSDC using 3-qubit and 4-qubit W states.Comment: 8 page

    Accretion, Outflows, and Winds of Magnetized Stars

    Full text link
    Many types of stars have strong magnetic fields that can dynamically influence the flow of circumstellar matter. In stars with accretion disks, the stellar magnetic field can truncate the inner disk and determine the paths that matter can take to flow onto the star. These paths are different in stars with different magnetospheres and periods of rotation. External field lines of the magnetosphere may inflate and produce favorable conditions for outflows from the disk-magnetosphere boundary. Outflows can be particularly strong in the propeller regime, wherein a star rotates more rapidly than the inner disk. Outflows may also form at the disk-magnetosphere boundary of slowly rotating stars, if the magnetosphere is compressed by the accreting matter. In isolated, strongly magnetized stars, the magnetic field can influence formation and/or propagation of stellar wind outflows. Winds from low-mass, solar-type stars may be either thermally or magnetically driven, while winds from massive, luminous O and B type stars are radiatively driven. In all of these cases, the magnetic field influences matter flow from the stars and determines many observational properties. In this chapter we review recent studies of accretion, outflows, and winds of magnetized stars with a focus on three main topics: (1) accretion onto magnetized stars; (2) outflows from the disk-magnetosphere boundary; and (3) winds from isolated massive magnetized stars. We show results obtained from global magnetohydrodynamic simulations and, in a number of cases compare global simulations with observations.Comment: 60 pages, 44 figure

    Uptake of Alkanes and Alcohols by Ion-Exchange Resins in Aqueous Solution

    Get PDF
    Uptake of alkane (C5 - C9) and alcohol (C4 - C7) solutes by both strong acid cation exchange resins and strong base anion exchange resins in aqueous medium has been studied. The amount of solute taken up by resins is directly proportional to the solute concentration equilibrium with resins. Hydrophobic interaction between the solute and the resin matrix appears to play an important role in the uptake phenomenon
    corecore