دانلود و نمایش مقالات مرتبط با Challenges::صفحه 1

بلافاصله پس از پرداخت دانلود کنید

کارابرن عزیز، مقالات سایت ( همگی جزو مقالات isi می باشند) بالاترین کیفیت ترجمه را دارند، ترجمه آنها کامل و دقیق می باشد (حتی محتوای جداول و شکل های نیز ترجمه شده اند) و از بهترین مجلات isi مانند IEEE، Sciencedirect، Springer، Emerald و ... انتخاب گردیده اند.

پشتیبانی
اپلیکشن اندروید
آرشیو مقالات
ورود اعضا
توجه توجه توجه !!!!
تمامی مقالات ترجمه شده ، انگلیسی و کتاب های این سایت با دقت تمام انتخاب شده اند. در انتخاب مقالات و کتاب ها پارامترهای جدید بودن، پر جستجو بودن، درخواست کاربران ، تعداد صفحات و ... لحاظ گردیده است. سعی بر این بوده بهترین مقالات در هر زمینه انتخاب و در اختیار شما کاربران عزیز قرار گیرد. ضمانت ما، کیفیت ماست.
نرم افزار winrar

از نرم افزار winrar برای باز کردن فایل های فشرده استفاده می شود. برای دانلود آن بر روی لینک زیر کلیک کنید
دانلود

پیوندهای کاربردی
پیوندهای مرتبط
نتیجه جستجو - Challenges

تعداد مقالات یافته شده: 402
ردیف عنوان نوع
1 آن سوی فناوری: شناسایی چالش های دولت محلی برای استفاده کردن از بسترهای دیجیتال برای مواجهه با شهروندان
سال انتشار: 2018 - تعداد صفحات فایل pdf انگلیسی: 4 - تعداد صفحات فایل doc فارسی: 13
تحقیقات قبلی تاکید کرده اند که یک فقدان راه حل های فناوارنه پیشرفته ای که قادر به پرورش همکاری های بین دولت – شهروندان باشد وجود دارد. ما بحث می کنیم که مثالهای زیادی از بسترهای مشارکتی دیجیتال، پیش از این برای استفاده دولتها و شهروندان دردسترس و نیز آماده شده اند. از این رو دلایل مواجهه ناکارآمد با شهروندان و همکاری با دولت محلی نباید در فقدان فناوری پیشرفته دنبال شود. بنابراین ما روی مسائل و چالش هایی تمرکز می کنیم که دولتهای محلی در پرورش مواجهه آنلاین و آفلاین با شهروندان با آنها روبرو هستند. ما همچنین یک دسته بندی از چالشها به شش طبقه به عنوان یک پیش نیاز برای شناسایی اقدامات و راه حل ها برای دولتهای محلی ارائه می کنیم.
کلیدواژه ها: بسترهای مشارکتی دیجیتال | چالش های دولت محلی | مواجهه با شهروند | فناوری شهری
مقاله ترجمه شده
2 سیاست خارجی دونالد ترامپ و آمریکا و تاثیرات بالقوه آن بر روی صنعت گردشگری ایران: دوران پسا – هسته ای
سال انتشار: 2018 - تعداد صفحات فایل pdf انگلیسی: 3 - تعداد صفحات فایل doc فارسی: 11
از روز اجرای توافقنامه هسته ای ایران در 14 جولای 2015، و متعاقبا" نرم تر شدن تحریم های بین المللی این کشور، صنعت گردشگری ایران پیشرفت های قابل ملاحظه ای را تجربه کرده است. این از طریق افزایش قابل توجه افراد وارد شده به این کشور به ویژه از بازارهای غربی و سرمایه گذاری خارجی در زیرساخت های مربوط به گردشگری، مشهود است. با این حال، انتخاب دونالد ترامپ به عنوان 45 اُمین رییس جمهور آمریکا و سیاست خارجی آشفته و ستیزه جویانه (یا درواقع عدم وجود سیاست خارجی روشن) تردیدی جدی در آینده توافقنامه هسته ای ایجاد کرده است. هدف این مقاله (1) بررسی برخی تاثیرات مثبتی است که توافقنامه هسته ای ایران بر پیشرفت گردشگری در ایران درطی دو سال گذشته داشته است؛ (2) شناسایی و مرور کلی چالش های احتمالی آتی به ویژه در رابطه با سیاست خارجی جدید تهاجمی دونالد ترامپ درقبال ایران می باشد.
کلیدواژه ها: دونالد ترامپ | سیاست خارجی | گردشگری ایران | هسته ای ایران | توسعه گردشگری
مقاله ترجمه شده
3 Utilizing Cloud Computing to address big geospatial data challenges
ستفاده از محاسات ابری برای پرداختن به چالش های داده های جغرافیایی بزرگ-2017
Big Data has emerged with new opportunities for research, development, innovation and business. It is charac- terized by the so-called four Vs: volume, velocity, veracity and variety and may bring significant value through the processing of Big Data. The transformation of Big Datas 4 Vs into the 5th (value) is a grand challenge for pro- cessing capacity. Cloud Computing has emerged as a new paradigm to provide computing as a utility service for addressing different processing needs with a) on demand services, b) pooled resources, c) elasticity, d) broad band access and e) measured services. The utility of delivering computing capability fosters a potential solution for the transformation of Big Datas 4 Vs into the 5th (value). This paper investigates how Cloud Computing can be utilized to address Big Data challenges to enable such transformation. We introduce and review four geospatial scientific examples, including climate studies, geospatial knowledge mining, land cover simulation, and dust storm modelling. The method is presented in a tabular framework as a guidance to leverage Cloud Computing for Big Data solutions. It is demostrated throught the four examples that the framework method supports the life cycle of Big Data processing, including management, access, mining analytics, simulation and forecasting. This tabular framework can also be referred as a guidance to develop potential solutions for other big geospatial data challenges and initiatives, such as smart cities.© 2016 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY license(http://creativecommons.org/licenses/by/4.0/).
Keywords: Big Data | Cloud Computing | Spatiotemporal data | Geospatial science | Smart cities
مقاله انگلیسی
4 Theorizing animal–computer interaction as machinations
تئوری تعامل حیوان و کامپیوتر به عنوان مکانیسم-2017
The increased involvement of animals in digital technology and user-computer research opens up for new possibilities and forms of interaction. It also suggests that the emerging field of Animal–Computer Interaction (ACI) needs to reconsider what should be counted as interaction. The most common already established forms of interaction are direct and dyadic, and limited to domesticated animals such as working dogs and pets. Drawing on an ethnography of the use of mobile proximity sensor cameras in ordinary wild boar hunting we emphasize a more complex, diffuse, and not directly observable form of interaction, which involves wild animals in a technological and naturalistic setting. Investigating human and boar activities related to the use of these cameras in the light of Actor-Network Theory (ANT) and Goffmans notion of strategic interaction reveals a gamelike interaction that is prolonged, networked and heterogeneous, in which members of each species is opposed the other in a mutual assessment acted out through a set of strategies and counter-strategies. We stress the role of theory for the field of ACI and how conceptualizations of interaction can be used to excite the imagination and be generative for design. Seeing interaction as strategies and acknowledging the existence of complex interdependencies could potentially inspire the design of more indirect and non-dyadic interactions where a priori simplifications of design challenges as either human or animal can be avoided.& 2016 Elsevier Ltd. All rights reserved.
Keywords:Animal–computer interaction | Actor-networktheory | Strategic interaction | Ontological symmetry | Ethnography
مقاله انگلیسی
5 An Automotive Signal-Layer Security and Trust-Boundary Identification Approach
امنیت لایه سیگنال خودرو و رویکرد شناسایی مرز اعتماد-2017
An important trend in the automotive domain is to adapt established functional safety processes and methods for security engi- neering. Although functional safety and cyber-security engineering have a considerable overlap, the trend of adapting methods from one domain to the other is often challenged by non-domain experts. Just as safety became a critical part of the development in the late 20th century, modern vehicles are now required to become resilient against cyber-attacks. As vehicle providers gear up for this challenge, they can capitalize on experiences from many other domains, but must also face several unique challenges. Such as, that cyber-security engineering will now join reliability and safety as a cornerstone for success in the automotive industry and approaches need to be integrated into the mainly safety oriented development lifecycle of the domain. The recently released SAE J3061 guidebook for cyber-physical vehicle systems focus on designing cyber-security aware systems in close relation to the automotive safety standard ISO 26262.The key contribution of this paper is to analyse a method to identify attack vectors on complex automotive systems via signal interfaces and propose a security classification scheme and protection mechanisms on signal layer. To that aim, the hardware- software interface (HSI), a central development artefact of the ISO 26262 functional safety development process, is used and extended to support the cyber-security engineering process and provide cyber-security countermeasures on signal layer.1877-0509 © 2017 The Authors. Published by Elsevier B.V.Peer-review under responsibility of the Conference Program Chairs.
Keywords: automotive systems | hardware-software interfaces | cyber-security | functional safety
مقاله انگلیسی
6 Cyber Security Attacks on Smart Cities and Associated Mobile Technologies
حمله های امنیتی سایبری به شهرهای هوشمند و فن آوری های تلفن همراه مرتبط-2017
Smart City refer to the city that integrates modern technologies for automated and efficient service providing to enhance citizens’ lifestyle. Latest studies show that like 60 present of the whole world’s population will be living in urban environments by the year 2030. This massively growing population in urban environments leads to the need of advanced management approaches that use latest IT platforms and techniques for smartening every city-related service. Such emergent integration of technologies faces several security- related challenges because of not considering security tests of new deployed technologies, in addition to not engaging other system parties with security incidents due to the huge communication. On the other side, high complexity, high interdependency and intensive communication lead to unbounded attack surface and cryptography-related issues. In our paper, we intend to provide detailed overview based on literature of smart cities’ major security problems and current solutions. Moreover, we present several influencing factors that affect data and information security in smart cities.1877-0509 © 2017 The Authors. Published by Elsevier B.V.Peer-review under responsibility of the Conference Program Chairs.
Keywords: Smart Cities Technologies | Cloud Computing | Mobile Devices | Cyber Security
مقاله انگلیسی
7 Investigating Security for Ubiquitous Sensor Networks
بررسی امنیت برای شبکه های حسگر همه جانبه-2017
The availability of powerful and sensor-enabled mobile and Internet-connected devices have enabled the advent of the ubiquitous sensor network paradigm which is providing various types of solutions to the community and the individual user in various sectors including environmental monitoring, entertainment, transportation, security, and healthcare. We explore and compare the features of wireless sensor networks and ubiquitous sensor networks and based on the differences between these two types of systems, we classify the security-related challenges of ubiquitous sensor networks. We identify and discuss solutions available to address these challenges. Finally, we briefly discuss open challenges that need to be addressed to design more secure ubiquitous sensor networks in the future.1877-0509 © 2017 The Authors. Published by Elsevier B.V.Peer-review under responsibility of the Conference Program Chairs.
Keywords: Human-centric Sensing | Internet of Things | Opportunistic Sensing | Participatory Sensing | Security | Ubiquitous Sensing
مقاله انگلیسی
8 Sustainable improvement of competitiveness in rural tourism destinations: The quest for tourist loyalty in Spain
بهبود پایدار رقابت در مقصد گردشگری روستایی: تلاش برای وفاداری توریستی در اسپانیا-2017
Rural tourism in Spain has developed intensively in recent years and although this branch of tourism is now well established, it still faces some challenges that causal marketing research can address. Tourism destinations now must operate in extremely competitive markets, forcing destination managers to seek out innovative strategies and sustainable competitive advantage, including cultivating tourist loyalty. This paper focuses on developing a better understanding of how destination loyalty is generated in rural tourism by identifying factors that contribute to this loyalty. The paper first examines previous theore tical analyses of the importance of loyalty as a sustainable competitive advantage and the capacity of rural tourism destinations to generate tourist loyalty. It then presents a structural model that includes the main antecedents of destination loyalty that are applicable to Spanish rural tourism. Based on a sample of 464 rural tourists and data analysis using the partial least squares technique, the results indicate that image, quality and destination attribute satisfaction are the direct antecedents of rural tourism desti nation loyalty. The findings also show that these are indirect precursors of loyalty through overall sa tisfaction.
Keywords: Rural tourism | Destination loyalty | Tourism management | Tourism marketing | Sustainability | PLS technique
مقاله انگلیسی
9 Vision-based and marker-less surgical tool detection and tracking: a review of the literature
تشخیص و ردیابی ابزار مبتنی بر چشم انداز و بدون ابزار تشریحی : بررسی ادبیات-2017
Article history:Received 31 January 2016Revised 26 June 2016Accepted 5 September 2016Available online 13 September 2016Keywords:Tool detection Object detection Data-set ValidationEndoscopic/microscopic imagesIn recent years, tremendous progress has been made in surgical practice for example with Minimally In- vasive Surgery (MIS). To overcome challenges coming from deported eye-to-hand manipulation, robotic and computer-assisted systems have been developed. Having real-time knowledge of the pose of surgical tools with respect to the surgical camera and underlying anatomy is a key ingredient for such systems. In this paper, we present a review of the literature dealing with vision-based and marker-less surgical tool detection. This paper includes three primary contributions: (1) identification and analysis of data-sets used for developing and testing detection algorithms, (2) in-depth comparison of surgical tool detection methods from the feature extraction process to the model learning strategy and highlight existing short- comings, and (3) analysis of validation techniques employed to obtain detection performance results and establish comparison between surgical tool detectors. The papers included in the review were selected through PubMed and Google Scholar searches using the keywords: “surgical tool detection”, “surgical tool tracking”, “surgical instrument detection” and “surgical instrument tracking” limiting results to the year range 2000 2015. Our study shows that despite significant progress over the years, the lack of es- tablished surgical tool data-sets, and reference format for performance assessment and method ranking is preventing faster improvement.© 2016 Elsevier B.V. All rights reserved.
Keywords: Tool detection | Object detection | Data-set | Validation | Endoscopic/microscopic images
مقاله انگلیسی
10 VANet security challenges and solutions: A survey
چالش ها و راه حل های امنیتی VANet: یک نظرسنجی-2017
Article history:Received 16 September 2016Received in revised form 28 November 2016 Accepted 20 January 2017Available online 27 January 2017Keywords:VANETSecurity challenges Attacks classification V2V communication Security solutionsVANET is an emergent technology with promising future as well as great challenges especially in its security. In this paper, we focus on VANET security frameworks presented in three parts. The first presents an extensive overview of VANET security characteristics and challenges as well as requirements. These requirements should be taken into consideration to enable the implementation of secure VANET infrastructure with efficient communication between parties. We give the details of the recent security architectures and the well-known security standards protocols. The second focuses on a novel classification of the different attacks known in the VANET literature and their related solutions. The third is a comparison between some of these solutions based on well-known security criteria in VANET. Then we draw attention to different open issues and technical challenges related to VANET security, which can help researchers for future use. 2017 Elsevier Inc. All rights reserved.
Keywords:VANET | Security challenges | Attacks classification | V2V communication | Security solutions
مقاله انگلیسی
موضوعات
footer