دانلود و نمایش مقالات مرتبط با Access::صفحه 4
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Access

تعداد مقالات یافته شده: 1213
ردیف عنوان نوع
31 Advance Sharing of Quantum Shares for Classical Secrets
اشتراک گذاری پیش فروش سهام کوانتومی برای اسرار کلاسیک-2022
Secret sharing schemes for classical secrets can be classified into classical secret sharing schemes and quantum secret sharing schemes. Classical secret sharing has been known to be able to distribute some shares before a given secret. On the other hand, quantum mechanics extends the capabilities of secret sharing beyond those of classical secret sharing. We propose quantum secret sharing with the capabilities in designing of access structures more flexibly and realizing higher efficiency beyond those of classical secret sharing, that can distribute some shares before a given secret.
keywords: Advance sharing | quantum secret sharing | quantum stabilizer code | Reed-Solomon code.
مقاله انگلیسی
32 An efficient radio-frequency spectrum utilization technique for cognitive radio networks
یک تکنیک کارآمد استفاده از طیف فرکانس رادیویی برای شبکه‌های رادیویی شناختی-2022
Cognitive radio (CR) is a rising technology that unlocks the doors for radio spectrum scarcity problem, which is of great concern nowadays among the researchers at various levels. CR enables to unlicensed users or secondary users (SUs) to access the primary channels when licenced users or primary users (PUs) are not using these channels. Two fundamental access methods namely overlay and underlay are very popular in utilizing the free available channels or the white spaces. Various hybrid access methods have been proposed and recommended by many researchers to further enhance the radio spectrum utilization. Of course hybrid access methods are the better ways to deal this spectrum scarcity problem, but a comprehensive and directed effort is required to optimize the modality of these methods. This work proposes a Markov chain based hybrid access method named as Hybrid Spectrum Utilization Technique (HSUT), which tries to maximize the radio spectrum utilization by enhancing the PU’s detection probability. This work also analyzes the performance of the HSUT and results obtained through OMNeT++ simulator are very encouraging. At last, this work also compares the performance of the HSUT with the overlay, underlay, Hybrid-P1 (Dhurandher et al., 2021), and the Hybrid-P2 (Dhurandher et al., 2021) access methods.
keywords: Cognitive radio | White spaces | Hybrid access | Markov chain | OMNeT++
مقاله انگلیسی
33 An integrated solution of software and hardware for environmental monitoring
راه حل یکپارچه نرم افزاری و سخت افزاری برای نظارت محیطی-2022
With the expansion of the Internet of Things (IoT), several monitoring solutions are available in the market. However, most solutions use proprietary software, which is costly and do not provide online monitoring, hampering data access and hindering preventive actions. This article presents LimnoStation, a low-cost integrated hardware and software solution that employs IoT concepts with LoRaWan, whose main objective is to monitor environmental and oceanographic data from surface and submerged sensors, which can be accessed online and has low-power consumption. Long-distance transmission tests were performed analyzing battery consumption and readings taken by the LimnoStation sensors. The results show that the average error of sensor readings was 0.51%, with a battery life of more than 2900 days and costing about 100 times less compared to commercial sensors. The evaluation of the LimnoStation showed that it is viable not only for academic use, but also as a replacement for presenting lower cost, high reliability, greater integration, and more functionality than most solutions found on the market.
Keywords: IoT | LoRaWan | LoRa | Environmental monitoring
مقاله انگلیسی
34 An investigation of the transmission success in Lorawan enabled IoT-HAPS communication
An investigation of the transmission success in Lorawan enabled IoT-HAPS communication-2022
As the communication and aviation technology expand, High altitude platform stations (HAPS) are increasingly gaining a wider usage area in modern Internet of Things (IoT) deployments. One of the areas in which HAPS can be effectively utilized is the wide area deployment of sensors that require a costly data acquisition effort in terms of transportation and communication access. Aerial communication using a low-energy technology such as LoRa can provide significant advantages in such scenarios. Our work models and simulates LoRAWAN communication in utilizing HAPS in data acquisition over a large distribution span of IoT devices/sensors. We conduct experiments on various different scenarios including changing number of devices, span area, HAPS speed and LoRa duty cycle to draw conclusions about how each of these parameters affect communication quality. Results of the simulation are used in regression analysis of equation factors to calculate the expected transmission performance under different experimental setups. Our results (and simulation code) can be used to reason about certain properties of IoT deployment (such as sensor count, sensor distribution area, HAPS speed, etc.) before the real deployment is done in LoRaWAN enabled IoT-HAPS communication.
keywords: High altitude platform station communication | LoRaWAN communication | Wide-area sensor network | IoT deployment simulation | Communication quality estimation
مقاله انگلیسی
35 Authenticated Secure Quantum-Based Communication Scheme in Internet-of-Drones Deployment
طرح ارتباطی مبتنی بر کوانتومی ایمن در استقرار اینترنت پهپادها-2022
The rapid advance of manufacturing Unmanned Aerial Vehicles (UAVs, aka drones) has led to a rise in the use of their civilian and commercial applications. The access of these drones to controlled airspace can be efficiently coordinated through particular layered network architecture, often referred to as the Internet-of-Drones (IoD). The nature of IoD, which is deployed in an open-access environment, brings significant safety and security concerns. Classical cryptosystems such as elliptic curve cryptography, Rivest-Shamir-Adleman, and Diffie-Hellman are essential building blocks to secure communication in the IoD. However, with the rapid development of quantum computing, it will be easy to break public-key cryptosystems using efficient quantum algorithms like Shor’s algorithm. Thus, building quantum-safe solutions to enhance IoD security has become imperative. Fortunately, quantum technologies can provide unconditional security solutions to protect data and communications in the IoD environment. This paper proposes a quantum-based scheme to prevent unauthorized drones from accessing a specific flight zone and authenticates the identities and shared secret messages of involved entities. To do so, we used a quantum channel to encode the private information based on a pre-shared key and a random key generated in a session. The involved entities also perform mutual authentication and share a secret key. We also provide the security proofs and analysis of the proposed scheme that indicates its resistance to well-known attacks.
INDEX TERMS- Authentication | internet-of-drones | quantum-based communication | quantum cryptography.
مقاله انگلیسی
36 Capability token selection algorithms to implement lightweight protocols
قابلیت الگوریتم های انتخاب نشانه برای پیاده سازی پروتکل های سبک وزن-2022
The IoT (Internet of Things) is now one of the most significant infrastructure and has to be secure against malicious accesses. Especially, it is critical to make devices secure in the IoT. In the CBAC (Capability-Based Access Control) model adopted to the IoT, device owners issue subjects capability tokens, i.e. a set of access rights on objects in devices. Objects in devices are data resource manipulated by subjects. Data are exchanged among subjects and objects through manipulating objects. Here, if subjects attempt to manipulate objects in accordance with the capability tokens issued, the subjects can get data which the subjects are not authorized to get, i.e. illegal information flow and late information flow occur. In our previous studies, protocols are implemented to prevent both illegal and late types of information flows from occurring. Here, operations implying such information flows are interrupted. However, the request processing time gets longer as the number of capability tokens used increases. In this paper, an MRCTSD (Minimum Required Capability Token Selection for Devices) algorithm is newly proposed to reduce the number of capability tokens used. In the evaluation, it is shown that the request processing times and the numbers of capability tokens used in the lightweight protocols realized with the MRCTSD algorithm are shorter and smaller than the conventional protocols, respectively.
keywords: CBAC (Capability-Based Access Control) model | Capability token selection algorithm | CoAP (Constrained Application Protocol) | Information flow control | IoT (Internet of Things) | Lightweight protocol
مقاله انگلیسی
37 A Distributed Learning Scheme for Variational Quantum Algorithms
یک طرح یادگیری توزیع شده برای الگوریتم های کوانتومی متغیر-2022
Variational quantum algorithms (VQAs) are prime contenders to gain computational advantages over classical algorithms using near-term quantum machines. As such, many endeavors have been made to accelerate the optimization of modern VQAs in past years. To further improve the capability of VQAs, here, we propose a quantum distributed optimization scheme (dubbed as QUDIO), whose back ends support both real quantum devices and various quantum simulators. Unlike traditional VQAs subsuming a single quantum chip or simulator, QUDIO collaborates with multiple quantum machines or simulators to complete learning tasks. In doing so, the required wall-clock time for optimization can be continuously reduced by increasing the accessible computational resources when ignoring the communication and synchronization time. Moreover, through the lens of optimization theory, we unveil the potential factors that could affect the convergence of QUDIO. In addition, we systematically understand the ability of QUDIO to reduce wall-clock time via two standard benchmarks, which are hand-written image classification and the ground energy estimation of the dihydrogen. Our proposal facilitates the development of advanced VQAs to narrow the gap between the state of the art and applications with the quantum advantage.
INDEX TERMS: Distributed optimization | quantum computing | quantum Hamiltonians | quantum machine learning.
مقاله انگلیسی
38 Dfinder — An efficient differencing algorithm for incremental programming of constrained IoT devices
Dfinder - یک الگوریتم افتراق کارآمد برای برنامه‌ریزی تدریجی دستگاه‌های محدود شده اینترنت اشیاء-2022
Internet of Things (IoT) proliferation has been remarkably, interconnecting a vast number of devices for the support of complex data-driven applications in a variety of domains. The ability to remotely update these devices is of paramount importance, as it allows the integration of additional functionality into their firmware, the resolution of code errors, the fixing of security vulnerabilities, or even their complete re-purpose, without physically accessing them. Such Over-the-Air Programming (OTAP) solutions require the reduction of the required transmitted data during a network update, in order to minimize devices’ energy consumption due to the communication overhead.
In this paper, we present the design and evaluation of Dfinder, a differencing algorithm that operates at byte-level and is able to generate small patches based on delta encoding that makes feasible the transition from a current firmware version to a new one. The algorithm runs in ????(????????????????????) time and ????(????) space complexity, utilising enhanced suffix arrays and state-of-the-art construction techniques that enable the efficient detection of common segments between two firmware versions. Additionally, we propose an extension of the algorithm, which halves the storage requirements at the IoT device side (compared to other state-of-the-art approaches), so that devices with limited storage can also be efficiently re-programmed over-the-air. Moreover, we evaluate its performance, comparing it with other differencing algorithms, and by integrating it in a complete IoT OTAP system.
keywords: اینترنت اشیا | الگوریتم های افتراق | دلتا اسکریپت | به روز رسانی سیستم عامل | استفاده از حافظه | زمان اجرا | Internet of Things | Differencing algorithms | Delta script | Firmware update | Memory utilization | Execution time
مقاله انگلیسی
39 Building a Quantum Engineering Undergraduate Program
ساخت برنامه کارشناسی مهندسی کوانتومی-2022
Contribution: A roadmap is provided for building a quantum engineering education program to satisfy U.S. national and international workforce needs. Background: The rapidly growing quantum information science and engineering (QISE) industry will require both quantumaware and quantum-proficient engineers at the bachelor’s level. Research Question: What is the best way to provide a flexible framework that can be tailored for the full academic ecosystem? Methodology: A workshop of 480 QISE researchers from across academia, government, industry, and national laboratories was convened to draw on best practices; representative authors developed this roadmap. Findings: 1) For quantum-aware engineers, design of a first quantum engineering course, accessible to all STEM students, is described; 2) for the education and training of quantum-proficient engineers, both a quantum engineering minor accessible to all STEM majors, and a quantum track directly integrated into individual engineering majors are detailed, requiring only three to four newly developed courses complementing existing STEM classes; 3) a conceptual QISE course for implementation at any postsecondary institution, including community colleges and military schools, is delineated; 4) QISE presents extraordinary opportunities to work toward rectifying issues of inclusivity and equity that continue to be pervasive within engineering. A plan to do so is presented, as well as how quantum engineering education offers an excellent set of education research opportunities; and 5) a hands-on training plan on quantum hardware is outlined, a key component of any quantum engineering program, with a variety of technologies, including optics, atoms and ions, cryogenic and solid-state technologies, nanofabrication, and control and readout electronics.
Index Terms: Quantum engineering | quantum information science (QIS) | undergraduate education.
مقاله انگلیسی
40 HealthCloud: A system for monitoring health status of heart patients using machine learning and cloud computing
HealthCloud: سیستمی برای نظارت بر وضعیت سلامت بیماران قلبی با استفاده از یادگیری ماشین و محاسبات ابری-2022
In the context of the global health crisis of 2020, the tendency of many people to self-diagnose at home virtually, prior to any physical interaction with medical professionals, has been increased. Existing self-diagnosis systems include those accessible via the Internet, which involve entering one’s symptoms. Several other methods do exist, for example, people read medical blogs or notes, which are often wrongly interpreted by them and they arrive at a completely different assumption regarding the cause of their symptoms. In this paper, a system called HealthCloud is proposed, for monitoring health status of heart patients using machine learning and cloud computing. This study aims to offer the ‘best of both worlds’, by combining the information required for the person to understand the disease in sufficient detail, with an accurate prediction as to whether they may have (in this case) heart disease or not. The presence of heart disease is predicted using machine learning algorithms such as Support Vector Machine, K-Nearest Neighbours, Neural Networks, Logistic Regression and Gradient Boosting Trees. This paper evaluates these machine learning algorithms to obtain the most accurate model, in compliance with Quality of Service (QoS) parameters. The performance of these machine learning models is measured and compared using the metrics such as Accuracy, Sensitivity (Recall), Specificity, AUC scores, Execution Time, Latency, and Memory Usage. For better establishment of the results, these machine learning algorithms have been cross validated with 5-fold cross validation technique. With an accuracy rate of 85.96%, it has been found that Logistic Regression is the most responsive and accurate model amongst those models assessed. The Precision, Recall, Cross Validation mean and AUC Score for this model were 95.83%, 76.67%, 81.68% and 96% respectively. The algorithm and the mobile application were tested on Google Cloud Firebase with existing user inputs from the dataset, as well as with unseen new data. The use of this system can assist patients, both in reaching self-diagnosis decisions and in monitoring their health.
keywords: Machine learning | Smart healthcare | Heart disease prediction | Cloud computing
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 2397 :::::::: بازدید دیروز: 3084 :::::::: بازدید کل: 5481 :::::::: افراد آنلاین: 7