دانلود و نمایش مقالات مرتبط با AGM::صفحه 5
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - AGM

تعداد مقالات یافته شده: 173
ردیف عنوان نوع
41 Learning in the machine: To share or not to share?
یادگیری در دستگاه: برای به اشتراک گذاشتن یا عدم اشتراک گذاری؟-2020
Weight-sharing is one of the pillars behind Convolutional Neural Networks and their successes. However, in physical neural systems such as the brain, weight-sharing is implausible. This discrepancy raises the fundamental question of whether weight-sharing is necessary. If so, to which degree of precision? If not, what are the alternatives? The goal of this study is to investigate these questions, primarily through simulations where the weight-sharing assumption is relaxed. Taking inspiration from neural circuitry, we explore the use of Free Convolutional Networks and neurons with variable connection patterns. Using Free Convolutional Networks, we show that while weight-sharing is a pragmatic optimization approach, it is not a necessity in computer vision applications. Furthermore, Free Convolutional Networks match the performance observed in standard architectures when trained using properly translated data (akin to video). Under the assumption of translationally augmented data, Free Convolutional Networks learn translationally invariant representations that yield an approximate form of weight-sharing.
Keywords: Deep learning | Convolutional neural networks | Weight-sharing | Biologically plausible architectures
مقاله انگلیسی
42 Exploring the multi-level processes of legitimacy in transnational social enterprises
بررسی فرایندهای چند سطحی حقانیت در بنگاههای اجتماعی فراملی-2020
Transnational entrepreneurship has emerged as a form of migrants participation in the social, economic, and political lives of both their countries of origin and of residence. Leveraging in- creasing evidence about migrants involvement in transnational social enterprises, we examine the multi-level processes through which organizational legitimacy is molded by transnational entrepreneurs to reflect country-level institutional settings, and how organizational-level legitimacy affects entrepreneurs social status. We longitudinally examine the multi-level processes of legitimation in a transnational social enterprise operated by Ghanaian migrants across Italy and Ghana. We analyze secondary and ethnographic data for two years, observing how transnational social enterprises harvest moral and pragmatic legitimacy from the institutional contexts in which they operate. We study how entrepreneurs construe their social status through pragmatic legitimacy obtained from their transnational ventures, and their institutional environments in- spired by micro- and meso legitimacy reconfigurations. We discuss theoretical implications for social and transnational entrepreneurship and practical contributions for policy-making.
Keywords: Legitimacy | Entrepreneurship | Social entrepreneurship | Transnational entrepreneurship | Migrants | Ethnography | Ghana | Italy
مقاله انگلیسی
43 Analysis of samples of explosives excavated from the Baltic Sea floor
تجزیه و تحلیل نمونه های مواد منفجره کشف شده از کف دریای بالتیک-2020
After World War II, conventional and chemical ammunition containing mainly secondary and primary explosives was dumped in the sea. Explosives have medium toxicity to aquatic organisms, earthworms and indigenous soil microorganisms. Therefore, environmental monitoring is required, especially for dumped munitions. The main aspect of this work was to analyse the samples of lumps and sediments taken from the Baltic seabed. These samples were potentially explosives. The main goal of the study was to identify the type and composition of studied materials. In order to determine the chemical composition of samples of explosives, we used as follows: GC–MS/MS, LC-HRMS and NMR. Additionally, to determine the energetic properties we performed microcalorimetric-thermogravimetric analysis. Based on the obtained results, the composition of this explosive was TNT (41%), RDX (53%), aluminium powder (5%), and degradation products (below 1%). The resulting composition indicates that the analysed material can be classified in the ‘‘torpex” family, widely used during World War II. Regarding the results of the microcalorimetric analysis, we can conclude that excavated fragments of explosives are in very good condition and they still can detonate after being initiated. Therefore, there is a threat that they could be used for criminal or terrorist purposes.
Keywords: Environmental samples | Explosives and their degradation products | Chromatographic analysis | Mass spectrometry | Nuclear magnetic resonance spectroscopy
مقاله انگلیسی
44 Identification of animal individuals using deep learning: A case study of giant panda
شناسایی فردی حیوانی با استفاده از یادگیری عمیق: یک مطالعه موردی از پاندا غول پیکر-2020
Giant panda (Ailuropoda melanoleuca) is an iconic species of conservation. However, long-term monitoring of wild giant pandas has been a challenge, largely due to the lack of appropriate method for the identification of target panda individuals. Although there are some traditional methods, such as distance-bamboo stem fragments methods, molecular biological method, and manual visual identification, they all have some limitations that can restrict their application. Therefore, it is urgent to explore a reliable and efficient approach to identify giant panda individuals. Here, we applied the deep learning technology and developed a novel face-identification model based on convolutional neural network to identify giant panda individuals. The model was able to identify 95% of giant panda individuals in the validation dataset. In all simulated field situations where the quality of photo data was degraded, the model still accurately identified more than 90% of panda individuals. The identification accuracy of our model is robust to brightness, small rotation, and cleanness of photos, although large rotation angle (> 20°) of photos has significant influence on the identification accuracy of the model (P < 0.01). Our model can be applied in future studies of giant panda such as long-term monitoring, big data analysis for behavior and be adapted for individual identification of other wildlife species.
Keywords: Deep learning | convolutional neural network | Individual identification | Giant panda
مقاله انگلیسی
45 More than words! How narrative anchoring and enrichment help to balance differentiation and conformity of entrepreneurial products
بیش از کلمات! چگونه لنگر انداختن روایت و غنی سازی به تعادل بین تمایز و انطباق محصولات کارآفرینی کمک می کند-2020
Entrepreneurs face the challenge of having to conform to gain legitimacy, while at the same time differentiating themselves to gain competitive advantage. We show how entrepreneurs can craft an entrepreneurial narrative to succeed in this task among the user audiences empowered to evaluate their products. Building on theories of categorization, optimal distinctiveness, and cultural entrepreneurship, we propose that entrepreneurs should utilize the narratives semantic relations with cultural meanings of established products and categories. We measure these semantic relations using machine learning methods for natural language, applied to data on 2901 independent video game proposals compared to 11,651 established games. Our findings reveal that semantically anchoring a products narrative in the cultural meaning of claimed categories can help to leverage the benefits of differentiation, especially when spanning multiple, atypical categories. When a product focuses on few categories, semantically enriching a narrative with unclaimed categories cultural meaning makes them more favorable to additional, possibly fragmented audiences that would not have considered them otherwise. Our results point to a key theoretical role of cultural entrepreneurship in shaping audience evaluation of categorization and differentiation by entrepreneurial ventures. It provides guidelines for entrepreneurs for managing the trade-off between differentiation and adherence to established cultural norms.
Keywords: Cultural entrepreneurship | Distinctiveness | Narrative | Categories
مقاله انگلیسی
46 چارچوبی برای تحقیقات بازاریابی دیجیتال: بررسی چهار عصر فرهنگی بازاریابی دیجیتال
سال انتشار: 2020 - تعداد صفحات فایل pdf انگلیسی: 19 - تعداد صفحات فایل doc فارسی: 27
رشته بازاریابی دیجیتال با گسستگی فزاینده مواجه شده است؛ تکثیر زمینه های فرعی مختلف تحقیق مانع از تجمع دانش می گردد. این گسستگی به نظر می رسد متکی به پیچیدگی ذاتی اینترنت بوده و حاصل 50 سال تکامل است. هدف ما فراهم سازی چارچوب یکپارچه برای تحقیقات در بازاریابی دیجیتالی برگرفته از تحلیل تاریخی اینترنت است. با استفاده از نظریه تمرین و نظریه موسساتی، نوع جدید کار موسساتی را طراحی می کنیم. این چارچوب را برای تحلیل منابع ثانویه تاریخی به کار می بریم. چهار گروه فرهنگی در اینترنت (سیستم های مشارکتی، سیستم هایبازار سنتی، سیستم های تولید مشترک و سیستم بازار تولید مصرف) یافته و به توصیف اصول پویا نحوه ایجاد سیستم ها با همگون سازی مجموعه فرهنگی موجود می پردازیم. با فراهم سازی چارچوب فرهنگی نظریه ای که اصول پویا ایجاد چهار مجموعه فرهنگی، به ادبیات بازاریابی دیجیتال می افزاییم. به علاوه، سه مسیر تکامل بالقوه نمای دیجیتال را مطرح می کنیم. چارچوب ما ممکن است به مدیران کمک کند تا از راهبرد دیجیتالی خود سر درآورند و در سیستم های اینترنت مختلف جستجو کنند.
کلمات کلیدی: بازاریابی دیجیتال | روش تاریخی | فرهنگ های دیجیتال | نظریه نهادی | تئوری تمرین | چارچوب فرهنگی | آینده نگر
مقاله ترجمه شده
47 Security-preserving social data sharing methods in modern social big knowledge systems
روشهای به اشتراک گذاری داده های اجتماعی حفظ سیستم در سیستم های دانش اجتماعی بزرگ مدرن-2020
In recent decades, the development of social computing systems has realized the efficient information exchange between large groups of people. Nowadays, social computing sys- tems are rather complex platforms supported by not only traditional sociology theory but also computer science and big data based applications. With the increase of the social computing systems’ complexities, serious issues of social digital security and privacy have shown up since, in recent years, more and more social data leakage incidents are happen- ing. This fact is due to reasons on many different aspects since there are many sources threatening the security and privacy of the social data in such a complex social comput- ing system. In this paper, we improve the traditional social data protection schemes by combining the information fragmentation concepts with the distributed system architec- tures to build a novel social data protection scheme. We use social photo protection as the fundamental scenario and deploy our novel scheme to illustrate the improvement on the protection level with the protection analysis in detail. A security analysis of practically realizing such a scheme is also evaluated in this paper.
Keywords: Data security | Social computing | Big knowledge | Selective encryption
مقاله انگلیسی
48 A new pyramidal opponent color-shape model based video shot boundary detection
A new pyramidal opponent color-shape model based video shot boundary detection-2020
Video shot boundary detection (VSBD) is one of the most essential criteria for many intelligent video analysis-related applications, such as video retrieval, indexing, browsing, categorization and summarization. VSBD aims to segment big video data into meaningful fragments known as shots. This paper put forwards a new pyramidal opponent colour-shape (POCS) model which can detect abrupt transition (AT) and gradual transition (GT) simultaneously, even in the presence of illumination changes, huge object movement between frames, and fast camera motion. First, the content of frames in the video subjected to VSBD is represented by the proposed POCS model. Consequently, the temporal nature of the POCS model is subjected to a suitable segment (SS) selection procedure in order to minimize the complexity of VSBD method. The SS from the video frames is examined for transitions within it using a bagged-trees classifier (BTC) learned on a balanced training set via parallel processing. To prove the superiority of the proposed VSBD algorithm, it is evaluated on the TRECVID 2001, TRECVID2007 and VIDEOSEG2004 data sets for classifying the basic units of video according to no transition (NT), AT and GT. The experimental evaluation results in an F1-score of 95.13%, 98.13% and 97.11% on the TRECVID 2001, TRECVID2007 and VIDEOSEG2004 data sets, respectively.
Keywords: Shot Boundary Detection | Abrupt Transition | Gradual Transition | Opponent Color space | Ensemble Algorithm
مقاله انگلیسی
49 One law to rule them all? The reach of EU data protection law after the Google v CNIL case
یک قانون برای همه آنها حکومت کند؟ دسترسی به قانون حفاظت از داده اتحادیه اروپا پس از پرونده Google v CNIL-2020
Google v CNIL is, arguably, one of the landmark cases of EU data protection law and it has been an important development regarding its territorial reach. The judgment’s findings in this regard have been controversial and have led to much discussion about their legitimacy and potential repercussions. This paper examines two aspects of this case. First, it considers the holdings of this judgment regarding the global application of EU law in relation to international law and sovereignty. This article argues that though EU decision-makers might have a degree of ‘data imperialism’ in their thinking, this judgment is not at odds with neither international law nor sovereignty. Second, the paper examines the methodology of the Court and the role it accorded to the Charter of Fundamental Rights of the EU– an aspect that many commentators overlook. In this regard, I argue that the Court’s methodology was problematic and that it failed to duly consider the role of the Charter, thus fragmenting EU law.© 2021 Emmanuel Bougiakiotis. Published by Elsevier Ltd. All rights reserved.
Keywords: Data protection | Extraterritoriality | International law | Google | Data imperialism | Charter of fundamental rights
مقاله انگلیسی
50 A Framework for Digital Marketing Research: Investigating the Four Cultural Eras of Digital Marketing
چارچوبی برای تحقیقات بازاریابی دیجیتال: بررسی چهار دوره فرهنگی بازاریابی دیجیتال-2020
The digital marketing discipline is facing growing fragmentation; the proliferation of different subareas of research impedes the accumulation of knowledge. This fragmentation seems logically tied to the inherent complexity of the Internet, itself resulting from 50 years of evolution. Thus, our aim is to provide an integrative framework for research in digital marketing derived from the historical analysis of the Internet. Using practice theory and institutional theory, we outline a new type of institutional work: imprinting work. We apply this framework to the analysis of historical secondary sources. We find four cultural repertoires on the Internet (collaborative systems, traditional market systems, co-creation systems, and prosumption market systems) and describe the dynamics of imprinting work leading to their creation, showing how new systems are created by appropriating and assimilating existing cultural repertoires. We contribute to the digital marketing literature by providing a cultural framework and a theory explaining the dynamics of the creation of four cultural repertoires. Moreover, we outline three paths of potential evolution of the digital landscape. Our framework may help managers make sense of their digital strategy and navigate the various Internet systems.
Keywords: Digital marketing | Historical method | Digital cultures | Institutional theory | Practice theory | Cultural framework | Prospective
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 1 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 1 :::::::: افراد آنلاین: 53