از نرم افزار winrar برای باز کردن فایل های فشرده استفاده می شود. برای دانلود آن بر روی لینک زیر کلیک کنید
myStone: A system for automatic kidney stone classification
myStone: یک سیستم طبقه بندی خودکار سنگ کلیه-2017
Article history:Received 5 April 2017Revised 14 July 2017Accepted 15 July 2017Available online 17 July 2017Keywords: Kidney stone Optical device Computer visionImage classiﬁcationKidney stone formation is a common disease and the incidence rate is constantly increasing worldwide. It has been shown that the classiﬁcation of kidney stones can lead to an important reduction of the re- currence rate. The classiﬁcation of kidney stones by human experts on the basis of certain visual color and texture features is one of the most employed techniques. However, the knowledge of how to analyze kidney stones is not widespread, and the experts learn only after being trained on a large number of samples of the different classes. In this paper we describe a new device speciﬁcally designed for cap- turing images of expelled kidney stones, and a method to learn and apply the experts knowledge with regard to their classiﬁcation. We show that with off the shelf components, a carefully selected set of fea- tures and a state of the art classiﬁer it is possible to automate this diﬃcult task to a good degree. We report results on a collection of 454 kidney stones, achieving an overall accuracy of 63% for a set of eight classes covering almost all of the kidney stones taxonomy. Moreover, for more than 80% of samples the real class is the ﬁrst or the second most probable class according to the system, being then the patient recommendations for the two top classes similar. This is the ﬁrst attempt towards the automatic visual classiﬁcation of kidney stones, and based on the current results we foresee better accuracies with the increase of the dataset size.© 2017 Elsevier Ltd. All rights reserved.
Keywords: Kidney stone | Optical device | Computer vision | Image classification
حتی زن و شوهرها هم به یک تعطیلات نیاز دارند: واکنش های زنان به مسافرت بدون شوهرانشان
سال انتشار: 2017 - تعداد صفحات فایل pdf انگلیسی: 6 - تعداد صفحات فایل doc فارسی: 25
"سفر کردن دخترها باهم" گفته شده است که به صورت بالقوه ای میزان رضایتمندی یک فرد از انتخاب های تفریحی را افزایش داده و به صورت بالقوه ای رضاینتمدی از رابطه زن و شوهر را بهبود می بخشد (دورکو و پتریک 2015؛ کاوالاری 2008؛ بوند 2008). این مطالعه کیفی به دنبال شناسایی دلایل مسافرت زنان بدون شوهرانشان و تاثیری که این استراحت ها ممکن است روی رابطه آنها و رضایتمندی آنها از استراحت داشته باشد می باشد. زنانی به چند دلیل کلی بدون شوهرانشان به مسافرت می روند: قیدهای زنانه، محدودیت های شخصی شوهر، فرار از روزمره گی ها و نیاز به تنهایی. اکثریت عظیمی از پاسخ دهنده ها بر این اعتقاد بودند که مسافرت کردن به صورت جدا از شریک زندگی، یک مولفه سودمند از یک رابطه سالم و عاشقانه است. تقریبا" همه آنها از استراحت کردن بدون شریک زندگی راضی بودند و اگر شریک زندگی آنها در این سفر به آنها ملحق می شد میزان رضایت آنها کمتر می شد. تقریبا" دو سوم آنها احساس می کردند که روابط آنها مثل بعد از مسافرت بوده است، درحالیکه 31% اعتقاد داشتند که سفر کردن روابط آنها را بهبود داده است. به علاوه روابط با همسفران نیز ارتقا یافته است. دلالت های بازاریابی و عملی برای صنعت گردشگری نیز ارائه می شود.
کلیدواژه ها: سودهای سفر | مسافرت های زنانه | رضایت از تفریح | رضایت از رابطه
|مقاله ترجمه شده|
Power Flow Studies for Assessment the Security of Steady States in Zone Inside the Large Interconnected Power System
مطالعات جریان قدرت برای ارزیابی امنیت حالت های ثابت در منطقه درونی سیستم قدرت متصل شده ی بزرگ-2017
This paper aims to introduce an effective method of making allowance for the potential impact of other transmission system operators (TSOs) or market players on the operation mode of a specific TSO in estimations referring to the full grid model based on the amount of real-time data sufficient to simulate a limited the interconnected power system (IPS) zone, yet not enough to update the full grid model. The preparation procedure of simulation of the equipotential grid model (EG) within the IPS based on the up-to-date computer technology is disclosed. The results of the EG-based emergency disturbance simulation in reference to the power system state estimation (SE) in real-time are more reliable in comparison with the results of other models. The EG application is more efficient in the procedure of analyzing the IPS tolerability against a specific number of potential faults and outages of individual components empowered by the most relevant calculations due to well-known software support.© 2016 The Authors. Published by Elsevier B.V.Peer-review under responsibility of organizing committee of the scientific committee of the international conference; ICTE 2016.© 2017 Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).Peer-review under responsibility of organizing committee of the scientific committee of the international conference; ICTE 2016
Keywords: TSO | Power flow study | Superposition principle | Equipotential grid model | Compensating injections
آنالیز هفت مرحله¬ای مدیریت زنجیره تامین در بهینه سازی دارایی قطعات الکترونیکی انبار کالا بوسیله توزیع اقتصادی بار با استفاده از الگوریتم ژنتیک
سال انتشار: 2017 - تعداد صفحات فایل pdf انگلیسی: 12 - تعداد صفحات فایل doc فارسی: 21
هدف از مطالعه پیشنهادی، ارائه بعد جدید انبار بوسیله توزیع اقتصادی بار با استفاده از فرآیندهای الگوریتم ژنتیک در هفت مرحله است- 10 عضو زنجیره تامین در بهینه سازی دارایی قطعات الکترونیکی برای توصیف تقاضای بازار مشخص و نامعین کاربرد دارد که این تقاضا بر پایه قابلیت اطمینان عرضه و برای توسعه مدل های واقع بینانه و انعطاف پذیرتر است. امیدواریم که مطالعه پیشنهادی، با استفاده از فرآیندهای الگوریتم ژنتیکی در هفت مرحله - 10 عضو زنجیره تامین در بهینه سازی دارایی قطعات الکترونیک، پتانسیل بالایی برای حل مشکلات مختلف عملی مربوط به انبار داشته باشد و همچنین یک مرورکلی بر کاربرد تکنیک های محاسباتی نرم مانند الگوریتم های ژنتیک به منظور بهبود اثربخشی و کارایی جنبه های مختلف انبار بوسیله توزیع اقتصادی بار با استفاده از الگوریتم ژنتیک ارائه شد.
کلید واژه ها: زنجیره تامین | بهینه سازی دارایی | انبار | بارگذاری اقتصادی | الگوریتم ژنتیک.
|مقاله ترجمه شده|
Computer vision for assistive technologies
چشم انداز کامپیوتر برای فن آوری های کمک-2017
Article history:Received 17 April 2015Revised 1 September 2016Accepted 2 September 2016Available online 6 September 2016Keywords:Computer vision Assistive technologiesIn the last decades there has been a tremendous increase in demand for Assistive Technologies (AT) useful to overcome functional limitations of individuals and to improve their quality of life. As a consequence, different research papers addressing the development of assistive technologies have appeared into the literature pushing the need to organize and categorize them taking into account the application assistive aims. Several surveys address the categorization problem for works concerning a speciﬁc need, hence giving the overview on the state of the art technologies supporting the related function for the individual. Unfortunately, this “user-need oriented” way of categorization considers each technology as a whole and then a deep and critical explanation of the technical knowledge used to build the operative tasks as well as a discussion on their cross-contextual applicability is completely missing making thus existing surveys unlikely to be technically inspiring for functional improvements and to explore new technological frontiers. To overcome this critical drawback, in this paper an original “task oriented” way to categorize the state of the art of the AT works has been introduced: it relies on the split of the ﬁnal assistive goals into tasks that are then used as pointers to the works in literature in which each of them has been used as a component. In particular this paper concentrates on a set of cross-application Computer Vision tasks that are set as the pivots to establish a categorization of the AT already used to assist some of the user’s needs. For each task the paper analyzes the Computer Vision algorithms recently involved in the development of AT and, ﬁnally, it tries to catch a glimpse of the possible paths in the short and medium term that could allow a real improvement of the assistive outcomes. The potential impact on the assessment of AT considering users, medical, economical and social perspective is also addressed.© 2016 Elsevier Inc. All rights reserved.
Keywords: Computer vision | Assistive technologies
Supply chain coordination with information sharing: The informational advantage of GPOs
هماهنگی زنجیره تامین با به اشتراک گذاری اطلاعات: مزیت اطلاعاتی GPO ها-2017
This paper explores the potential of group purchasing organizations (GPOs) in facilitating information sharing and coordinating horizontal competition. We consider a supply chain composed of one GPO and two manufacturers competing in quantity. The GPO sources and prices a common component for the manufacturers. Each manufacturer has some private information about the uncertain demand, and can choose a part to share with the GPO. Through benchmark analysis, we identify the manufacturers’ hori zontal competition and information incompletion as two determinants of supply chain inefficiency under individual purchasing. Then, we investigate the impacts of the GPO on the supply chain with whole sale price contracts and show that double marginalization induced by the GPO is another determinant of inefficiency. For this, both manufacturers have no incentive to share information and group purchas ing damages the supply chain. We also show that under group purchasing, information sharing partially from the lower-precision manufacturer rather than both can benefit the supply chain. Next, we present a forecast-sharing-based compensation contracting scheme, under which, the GPO can make perfect supply chain coordination in both quantities and information sharing, and all members in the supply chain can reach win–win results. Finally, we illustrate the GPO’s informational advantage by numerical examples.
Keywords: Supply chain management | Purchasing | Information sharing | Coordination |Quantity competition
A Comprehensive Survey on Security in Cloud Computing
بررسی جامع در مورد امنیت در محاسبات ابری-2017
According to a Forbes’ report published in 2015, cloud-based security spending is expected to increase by 42%. According to another research, the IT security expenditure had increased to 79.1% by 2015, showing an increase of more than 10% each year. International Data Corporation (IDC) in 2011 showed that 74.6% of enterprise customers ranked security as a major challenge. This paper summarizes a number of peer-reviewed articles on security threats in cloud computing and the preventive methods. The objective of our research is to understand the cloud components, security issues, and risks, along with emerging solutions that may potentially mitigate the vulnerabilities in the cloud. It is a commonly accepted fact that since 2008, cloud is a viable hosting platform; however, the perception with respect to security in the cloud is that it needs significant improvements to realise higher rates of adaption in the enterprise scale. As identified by another research, many of the issues confronting the cloud computing need to be resolved urgently. The industry has made significant advances in combatting threats to cloud computing, but there is more to be done to achieve a level of maturity that currently exists with traditional/on-premise hosting.© 2017 The Authors. Published by Elsevier B.V.Peer-review under responsibility of the Conference Program Chairs.
Keywords: Cloud computing | Security in cloud | Security Threats
Robust normal estimation and region growing segmentation of infrastructure 3D point cloud models
تخمین قوی نرمال و تقسیم بندی ناحیه رشد و زیر بنای مدل ابری نقطه ای-2017
Modern remote sensing technologies such as three-dimensional (3D) laser scanners and image-based 3D scene reconstruction are in increasing demand for applications in civil infrastructure design, mainte- nance, operation, and as-built construction verification. The complex nature of the 3D point clouds these technologies generate, as well as the often massive scale of the 3D data, make it inefficient and time con- suming to manually analyze and manipulate point clouds, and highlights the need for automated analysis techniques. This paper presents one such technique, a new region growing algorithm for the automated segmentation of both planar and non-planar surfaces in point clouds. A core component of the algorithm is a new point normal estimation method, an essential task for many point cloud processing algorithms. The newly developed estimation method utilizes robust multivariate statistical outlier analysis for reli- able normal estimation in complex 3D models, considering that these models often contain regions of varying surface roughness, a mixture of high curvature and low curvature regions, and sharp features. An adaptation of Mahalanobis distance, in which the mean vector and covariance matrix are derived from a high-breakdown multivariate location and scale estimator called Deterministic MM-estimator (DetMM) is used to find and discard outlier points prior to estimating the best local tangent plane around any point in a cloud. This approach is capable of more accurately estimating point normals located in highly curved regions or near sharp features. Thereafter, the estimated point normals serve a region growing segmen- tation algorithm that only requires a single input parameter, an improvement over existing methods which typically require two control parameters. The reliability and robustness of the normal estimation subroutine was compared against well-known normal estimation methods including the Minimum Volume Ellipsoid (MVE) and Minimum Covariance Determinant (MCD) estimators, along with Maximum Likelihood Sample Consensus (MLESAC). The overall region growing segmentation algorithm was then experimentally validated on several challenging 3D point clouds of real-world infrastructure systems. The results indicate that the developed approach performs more accurately and robustly in comparison with conventional region growing methods, particularly in the presence of sharp features, outliers and noise.© 2017 Elsevier Ltd. All rights reserved.
Keywords: Segmentation | 3D point cloud models | Robust estimation | Outliers | 3D reconstruction | Computer vision | Normal estimation | 3D data processing
A survey on authentication schemes in VANETs for secured communication
یک نظرسنجی در مورد طرح های تأیید هویت در VANET برای برقراری ارتباط امن-2017
Article history:Received 5 January 2016Received in revised form 5 January 2017 Accepted 23 February 2017Available online 2 March 2017Keywords:Vehicular Ad Hoc Networks (VANETs) Dedicated Short Range Communications (DSRC)Vehicle to Vehicle (V2V) Vehicle to Infrastructure (V2I) SecurityAuthenticationA vehicular Ad Hoc Network (VANET) is a class of mobile ad hoc network (MANET) which supports, vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) communications. The signiﬁcant features of VANET includes, self-organization, distributed networking, and highly dynamic topology. The VANET features and its applications to road safety have attracted a lot of interest in industry and academia more so into the research on improvement of transportation systems for saving millions of lives. The transmission of messages in open-access environment like VANET leads to the most critical and challenging security issues. Authentication, data conﬁdentiality, data integrity, data availability, and non- repudiation are crucial components of security in VANET. This paper focuses on the authentication schemes in VANET as it plays a important role in secured communication. The authentication schemes are basically classiﬁed into three categories: cryptography techniques, digital signatures, and message veriﬁcation techniques. The main objective of this paper is to provide a taxonomy of authentication schemes, and discuss their mechanisms, advantages, disadvantages, performance and scope of research. Furthermore, the paper concludes with presentation of open security issues in VANET authentication. 2017 Elsevier Inc. All rights reserved.
Keywords:VehicularAd Hoc Networks (VANETs) | Dedicated Short Range Communications (DSRC) | Vehicle to Vehicle (V2V) | Vehicle to Infrastructure (V2I) | Security | Authentication
A collaborative cyber incident management system for European interconnected critical infrastructures
سیستم مدیریت حادثه سایبری مشترک برای زیرساخت های بحرانی مرتبط با اروپا-2017
Article history:Available online 2 June 2016Keywords:Cyber security Information sharing Cyber incident reporting Security operation center Cyber incident handlingToday’s Industrial Control Systems (ICSs) operating in critical infrastructures (CIs) are becoming increas- ingly complex; moreover, they are extensively interconnected with corporate information systems for cost-eﬃcient monitoring, management and maintenance. This exposes ICSs to modern advanced cyber threats. Existing security solutions try to prevent, detect, and react to cyber threats by employing secu- rity measures that typically do not cross the organization’s boundaries. However, novel targeted multi- stage attacks such as Advanced Persistent Threats (APTs) take advantage of the interdependency between organizations. By exploiting vulnerabilities of various systems, APT campaigns intrude several organiza- tions using them as stepping stones to reach the target infrastructure. A coordinated effort to timely reveal such attacks, and promptly deploy mitigation measures is therefore required. Organizations need to cooperatively exchange security-relevant information to obtain a broader knowledge on the current cyber threat landscape and subsequently obtain new insight into their infrastructures and timely react if necessary. Cyber security operation centers (SOCs), as proposed by the European NIS directive, are be- ing established worldwide to achieve this goal. CI providers are asked to report to the responsible SOCs about security issues revealed in their networks. National SOCs correlate all the gathered data, analyze it and eventually provide support and mitigation strategies to the aﬃliated organizations. Although many of these tasks can be automated, human involvement is still necessary to enable SOCs to adequately take decisions on occurring incidents and quickly implement counteractions. In this paper we present a collaborative approach to cyber incident information management for gaining situational awareness on interconnected European CIs. We provide a scenario and an illustrative use-case for our approach; we propose a system architecture for a National SOC, deﬁning the functional components and interfaces it comprises. We further describe the functionalities provided by the different system components to sup- port SOC operators in performing incident management tasks.© 2016 Elsevier Ltd. All rights reserved.
Keywords: Cyber security | Information sharing | Cyber incident reporting | Security operation center | Cyber incident handling