unique item
Recently Published Documents


TOTAL DOCUMENTS

26
(FIVE YEARS 16)

H-INDEX

3
(FIVE YEARS 1)

Author(s):  
Vitalij S. Sinika ◽  
◽  
Sergey D. Lysenko ◽  
Sergey N. Razumov ◽  
Nicolai P. Telnov ◽  
...  

The paper for the first time publishes and analyzes the materials obtained in the study of the burial of the child no. 10 in the barrow 16 of the “Sluiceway” group near the Glinoe village, Slobodzeya district, on the left bank of the Lower Dniester. The grave dates back to the third quarter of the 4th century BC and contained the burial of a small child. The western part of the pit was intended to sacrificial food and a knife, and the eastern part was intended for the body of the child and grave goods, where a “bed” was made of a mixture of natural clay and humus. Two Cypraea moneta shells, one glass bead, as well as an iron model of the sword were part of the necklace. The last find is a unique item in the Scythian burials of the North Black Sea region. It imitated swords of the Solokha type (with claw-shaped tops and false-triangular crosshairs), known in the Scythian burials of the Northern Black Sea Region from the last quarter of the 5th century BC until the end of the 4th century BC. It is noteworthy that it was such a sword that was found in the pair burial of the same barrow where the burial of the child was sunk. There is no doubt that the model of the sword in the necklace of a child was a votive object. Perhaps it indicated the child's belonging to the estate of the warriors.


2021 ◽  
Vol 11 (1) ◽  
pp. 1-11
Author(s):  
Cheman Shaik

Counterfeit production is a threat for every genuine business causing damage to their brand image and stealing their revenues. The aim of this paper is topresenta novel method to prevent counterfeit products using cryptography, QR code and webservice. The method requires that every original product manufacturer obtain a cryptographic key pair, securely store their private key and publish their public key on their website as a QR code. The product manufacturer needs to print a unique item code on their product packs and provide inside the pack a QR code encoding the ciphertext generated by encrypting the item code with their private key. For product verification by buyers, the manufacture is required to provide a QR code scanning app for download on their website, Google Play Store or iPhone App Store. The scanning app should have additional cryptographic functionality to decrypt ciphertext of the item code encoded in the QR code. The manufacturer also needs to launch a simple webservice on his hosting server to accept requests from the mobile app and verify the item code and buyer’s name in its database. Technicalimplementation and the verification process are described in detail through figures and flowchart. The method can be implemented even by small manufacturers with nominal cost by obtaining a key pair and creating a scanning app and webservices. We have also tested the method with an actual software code written for cryptographic operations using the Java cryptography Extension and QR code operations using Google Zxing libraries.


Author(s):  
Sukanta Ghosh ◽  
Amar Singh

Facial expression recognition is an activity that is performed by every human in their day-to-day lives. Each one of us analyses the expressions of the individuals we interact with to understand how people interact and respond with us. The malicious intentions of a thief or a person to be interviewed can be recognized with the help of his facial features and gestures. Face recognition from picture or video is a well-known point in biometrics inquiry. Numerous open places, for the most part, have reconnaissance cameras, and these cameras have their noteworthy security incentives. It is generally recognized that face recognition has assumed a significant job in reconnaissance framework. The genuine favorable circumstances of face-based distinguishing proof over different biometrics are uniqueness. Since the human face is a unique item having a high level of inconstancy in its appearance, face location is a troublesome issue in computer vision. This chapter explores emotion detection using facial images.


Author(s):  
Wilma A Bainbridge ◽  
Elizabeth H Hall ◽  
Chris I Baker

Abstract During memory recall and visual imagery, reinstatement is thought to occur as an echoing of the neural patterns during encoding. However, the precise information in these recall traces is relatively unknown, with previous work primarily investigating either broad distinctions or specific images, rarely bridging these levels of information. Using ultra-high-field (7T) functional magnetic resonance imaging with an item-based visual recall task, we conducted an in-depth comparison of encoding and recall along a spectrum of granularity, from coarse (scenes, objects) to mid (e.g., natural, manmade scenes) to fine (e.g., living room, cupcake) levels. In the scanner, participants viewed a trial-unique item, and after a distractor task, visually imagined the initial item. During encoding, we observed decodable information at all levels of granularity in category-selective visual cortex. In contrast, information during recall was primarily at the coarse level with fine-level information in some areas; there was no evidence of mid-level information. A closer look revealed segregation between voxels showing the strongest effects during encoding and those during recall, and peaks of encoding–recall similarity extended anterior to category-selective cortex. Collectively, these results suggest visual recall is not merely a reactivation of encoding patterns, displaying a different representational structure and localization from encoding, despite some overlap.


2020 ◽  
Author(s):  
Susan L. Benear ◽  
Chi Ngo ◽  
Ingrid R. Olson ◽  
Nora Newcombe

Episodic memories typically share overlapping elements in distinctive combinations, and, to be valuable for future behavior, they need to withstand delays. There is relatively little work on whether children have special difficulty with overlap or withstanding delay. However, Yim, Dennis, and Sloutsky (2013) suggested that extensive overlap is more problematic for younger children, and Darby and Sloutsky (2015) reported that a delay period actually improves children’s memory for overlapping pairs of items. In this study, we asked how children’s naturalistic episodic memory is affected by stimulus overlap, delay, and age, using visual stimuli containing either overlapping or unique item pairs. Children aged 4 and 6 years were tested both immediately and after a 24-hour delay. As expected, older children performed better than younger children and both age groups performed worse on overlapping pairs. Surprisingly, the 24-hour delay had only a marginal effect on overall accuracy. There were no interactions. However, when errors were examined, there was evidence that the delay period affected memory differentially in the younger children, with overlapping pairs buffered against cross-contextual confusion.


Author(s):  
Г.Г. Король

Вводится в научный оборот ременная концевая накладка, изготовленная из бронзы, с позолотой, хранящаяся в Музейном ведомстве Финляндии (Хельсинки) в составе коллекции древностей из Минусинской котловины И. П. Товостина. Предмет уникален декором – сюжетным изображением буддийского мифологического содержания. Аналогии сюжету неизвестны. Рассмотрены аналогии иконографическим деталям изображения, приведены интерпретации смыслового наполнения символических образов. Сюжет носит благопожелательный характер, изначально, возможно, имел и более глубокий религиозный смысл. На основе особенностей технологии изготовления предмет отнесен к изделиям киданьского круга (империя Ляо) и условно датирован X – началом XI в. A bronze-gilt belt mount kept in the Finland’s National Board of Antiquities (Helsinki) from I. P. Tovostin’s collection of antiquities from the Minusinsk Depression is introduced into scientific discourse. It is a unique item because of its decoration featuring a narrative scene related to a Buddhist myth (Fig. 1). No analogies to this narrative scene are known. The paper examines analogies to the iconographic elements of the scene (Fig. 2; 3), and provides interpretation of the meaning of symbolic images. The narrative scene is benevolent in its character and initially might have had a more religious significance. Based on the distinctive features of the production technology, the item has been attributed to the artifacts of the Khitan circle (Liao Empire) and tentatively dated to the 10th – early 11th centuries.


The Winners ◽  
2020 ◽  
Vol 21 (1) ◽  
pp. 35
Author(s):  
Surono Surono ◽  
Tulus Suryanto ◽  
Erike Anggraini

The research aimed to examine the effect of cost leadership strategy and differentiation strategy on company’s performance. It was conducted in companies listed in the Jakarta Islamic Index from 2014 to 2018. Purposive sampling was used to obtain samples from 12 companies. Analysis was done by multiple linear regression with the help of the IBM SPSS 23 statistical program for windows with a quantitative descriptive approach. The results show that the cost leadership strategy influences company’s performance compared to differentiation strategy. The implementation of a low-cost strategy is significantly relevant to the condition of people who are sensitive to price and are not much aware about brand products in decision making. The design of a unique item model does not determine success in marketing a product, the relative price offered is quite high and only in certain market segments the product is of public interest. Product quality is defeated by the quantity of goods, people prefer how much goods are obtained than the durability of the products consumed.


2020 ◽  
Vol 4 (1) ◽  
pp. 136-155
Author(s):  
Herlina Herlina ◽  
Bagus Sartono ◽  
Budi Susetyo

The results of the FAO study since 2013 through the Voices of Hungry Project (VoH-FAO) have produced measures of the Food Insecurity Experience Scale (FIES). FIES is a global reference scale that becomes a reference for comparing the prevalence of food insecurity between countries and regions. The challenge of using the FIES instrument, each country must carry out linguistic adaptations that are appropriate to the culture and national language. This study aims to analyze the validity of FIES measurements in Indonesia, including internal and external analysis. The Rasch model (RM) used for internal validity analysis. Measurement of the validity and reliability of Indonesian FIES items was calibrated with a global reference scale. Differences in the scale of calibration items with a global reference scale of less than 0.35 indicate that they are standard items. FIES measurements require at least five common items. External analysis of FIES measurements uses the Pearson correlation between district-level aggregation on each FIES item that is answered "yes" and determinant characteristics of household food insecurity. The expected correlation coefficient indicated the direction of a positive correlation and observed the correlation coefficient of item 1501 to 1508, which is getting smaller. Internal analysis of FIES measurements in Indonesia shows the achievement of unidimensional and local independence assumptions. However, item 1501 has identified as an outlier. Then identify unique issues are 1501 and 1504, while unique items in rural subsamples are 1503 and 1508. Unique item differences founded in food expenditure 60 percent or more, i.e., 1502. This shows a discordance with items assumption of parameter invariance. The reliability of the FIES item is 0.78, and this reflects the suitability of the model quite well. External analysis of the FIES measurement identifies item 1501 and 1504 as invalid items (unique items).


Nowadays IoT has its influence over every sector of life ,striving hard to improve quality of life. Obsonium is a never ending business and to improve the quality of obsonium we can take the help of technology. In today’s technology, many companies are developing products that ensure convenience toward all people who needs a good obsonium experience from today’s hectic obsonium which takes a lot of time for billing and getting out. Thus, we have developed a Smart Obsonium Cart, that allows faster check-out. First the product will have a RFID card which will filled first by shop Admin with other de- tails of the product. Then cart uses the RFID reader technology to identify the products details which is already available in the database. The total cost will be displayed on the mobile attached to the cart as and when the product is added to the cart. The user can view the details of the product on his mobile. IoT helps to design such a cart which will automatically scan the product and add the respective amount to be paid in the bill on our own smart phone itself. Technologies used in this system are RFID tags and RFID reader for fetching the price of each unique item. Arduino microcontroller to perform the sum of the prices of the products and to prepare the final bill. Mobile application for the final display of bill and the complete obsonium list. Security is provided by the weight scanner and validating the products bought to avoid tag tampering. All the item’s information is stored in the cloud at first. Checkout verification is also done by passing the cart after payment through a lane with RFID readers.


Sign in / Sign up

Export Citation Format

Share Document