با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
31 |
Advance Sharing of Quantum Shares for Classical Secrets
اشتراک گذاری پیش فروش سهام کوانتومی برای اسرار کلاسیک-2022 Secret sharing schemes for classical secrets can be classified into classical secret sharing
schemes and quantum secret sharing schemes. Classical secret sharing has been known to be able to distribute
some shares before a given secret. On the other hand, quantum mechanics extends the capabilities of secret
sharing beyond those of classical secret sharing. We propose quantum secret sharing with the capabilities in
designing of access structures more flexibly and realizing higher efficiency beyond those of classical secret
sharing, that can distribute some shares before a given secret. keywords: Advance sharing | quantum secret sharing | quantum stabilizer code | Reed-Solomon code. |
مقاله انگلیسی |
32 |
An efficient radio-frequency spectrum utilization technique for cognitive radio networks
یک تکنیک کارآمد استفاده از طیف فرکانس رادیویی برای شبکههای رادیویی شناختی-2022 Cognitive radio (CR) is a rising technology that unlocks the doors for radio spectrum scarcity
problem, which is of great concern nowadays among the researchers at various levels. CR
enables to unlicensed users or secondary users (SUs) to access the primary channels when
licenced users or primary users (PUs) are not using these channels. Two fundamental access
methods namely overlay and underlay are very popular in utilizing the free available channels
or the white spaces. Various hybrid access methods have been proposed and recommended by
many researchers to further enhance the radio spectrum utilization. Of course hybrid access
methods are the better ways to deal this spectrum scarcity problem, but a comprehensive
and directed effort is required to optimize the modality of these methods. This work proposes
a Markov chain based hybrid access method named as Hybrid Spectrum Utilization Technique
(HSUT), which tries to maximize the radio spectrum utilization by enhancing the PU’s detection
probability. This work also analyzes the performance of the HSUT and results obtained through
OMNeT++ simulator are very encouraging. At last, this work also compares the performance of
the HSUT with the overlay, underlay, Hybrid-P1 (Dhurandher et al., 2021), and the Hybrid-P2
(Dhurandher et al., 2021) access methods.
keywords: Cognitive radio | White spaces | Hybrid access | Markov chain | OMNeT++ |
مقاله انگلیسی |
33 |
An integrated solution of software and hardware for environmental monitoring
راه حل یکپارچه نرم افزاری و سخت افزاری برای نظارت محیطی-2022 With the expansion of the Internet of Things (IoT), several monitoring solutions are available
in the market. However, most solutions use proprietary software, which is costly and do not
provide online monitoring, hampering data access and hindering preventive actions. This article
presents LimnoStation, a low-cost integrated hardware and software solution that employs IoT
concepts with LoRaWan, whose main objective is to monitor environmental and oceanographic
data from surface and submerged sensors, which can be accessed online and has low-power
consumption. Long-distance transmission tests were performed analyzing battery consumption
and readings taken by the LimnoStation sensors. The results show that the average error of
sensor readings was 0.51%, with a battery life of more than 2900 days and costing about 100
times less compared to commercial sensors. The evaluation of the LimnoStation showed that it
is viable not only for academic use, but also as a replacement for presenting lower cost, high
reliability, greater integration, and more functionality than most solutions found on the market.
Keywords: IoT | LoRaWan | LoRa | Environmental monitoring |
مقاله انگلیسی |
34 |
An investigation of the transmission success in Lorawan enabled IoT-HAPS communication
An investigation of the transmission success in Lorawan enabled IoT-HAPS communication-2022 As the communication and aviation technology expand, High altitude platform stations (HAPS)
are increasingly gaining a wider usage area in modern Internet of Things (IoT) deployments. One
of the areas in which HAPS can be effectively utilized is the wide area deployment of sensors
that require a costly data acquisition effort in terms of transportation and communication access.
Aerial communication using a low-energy technology such as LoRa can provide significant
advantages in such scenarios. Our work models and simulates LoRAWAN communication in
utilizing HAPS in data acquisition over a large distribution span of IoT devices/sensors. We
conduct experiments on various different scenarios including changing number of devices,
span area, HAPS speed and LoRa duty cycle to draw conclusions about how each of these
parameters affect communication quality. Results of the simulation are used in regression
analysis of equation factors to calculate the expected transmission performance under different
experimental setups. Our results (and simulation code) can be used to reason about certain
properties of IoT deployment (such as sensor count, sensor distribution area, HAPS speed, etc.)
before the real deployment is done in LoRaWAN enabled IoT-HAPS communication.
keywords: High altitude platform station communication | LoRaWAN communication | Wide-area sensor network | IoT deployment simulation | Communication quality estimation |
مقاله انگلیسی |
35 |
Authenticated Secure Quantum-Based Communication Scheme in Internet-of-Drones Deployment
طرح ارتباطی مبتنی بر کوانتومی ایمن در استقرار اینترنت پهپادها-2022 The rapid advance of manufacturing Unmanned Aerial Vehicles (UAVs, aka drones) has led
to a rise in the use of their civilian and commercial applications. The access of these drones to controlled
airspace can be efficiently coordinated through particular layered network architecture, often referred to
as the Internet-of-Drones (IoD). The nature of IoD, which is deployed in an open-access environment,
brings significant safety and security concerns. Classical cryptosystems such as elliptic curve cryptography,
Rivest-Shamir-Adleman, and Diffie-Hellman are essential building blocks to secure communication in the
IoD. However, with the rapid development of quantum computing, it will be easy to break public-key
cryptosystems using efficient quantum algorithms like Shor’s algorithm. Thus, building quantum-safe
solutions to enhance IoD security has become imperative. Fortunately, quantum technologies can provide
unconditional security solutions to protect data and communications in the IoD environment. This paper
proposes a quantum-based scheme to prevent unauthorized drones from accessing a specific flight zone
and authenticates the identities and shared secret messages of involved entities. To do so, we used a quantum
channel to encode the private information based on a pre-shared key and a random key generated in a session.
The involved entities also perform mutual authentication and share a secret key. We also provide the security
proofs and analysis of the proposed scheme that indicates its resistance to well-known attacks.
INDEX TERMS- Authentication | internet-of-drones | quantum-based communication | quantum cryptography. |
مقاله انگلیسی |
36 |
Capability token selection algorithms to implement lightweight protocols
قابلیت الگوریتم های انتخاب نشانه برای پیاده سازی پروتکل های سبک وزن-2022 The IoT (Internet of Things) is now one of the most significant infrastructure and has to be
secure against malicious accesses. Especially, it is critical to make devices secure in the IoT.
In the CBAC (Capability-Based Access Control) model adopted to the IoT, device owners issue
subjects capability tokens, i.e. a set of access rights on objects in devices. Objects in devices
are data resource manipulated by subjects. Data are exchanged among subjects and objects
through manipulating objects. Here, if subjects attempt to manipulate objects in accordance with
the capability tokens issued, the subjects can get data which the subjects are not authorized
to get, i.e. illegal information flow and late information flow occur. In our previous studies,
protocols are implemented to prevent both illegal and late types of information flows from
occurring. Here, operations implying such information flows are interrupted. However, the
request processing time gets longer as the number of capability tokens used increases. In this
paper, an MRCTSD (Minimum Required Capability Token Selection for Devices) algorithm is
newly proposed to reduce the number of capability tokens used. In the evaluation, it is shown
that the request processing times and the numbers of capability tokens used in the lightweight
protocols realized with the MRCTSD algorithm are shorter and smaller than the conventional
protocols, respectively.
keywords: CBAC (Capability-Based Access Control) model | Capability token selection algorithm | CoAP (Constrained Application Protocol) | Information flow control | IoT (Internet of Things) | Lightweight protocol |
مقاله انگلیسی |
37 |
A Distributed Learning Scheme for Variational Quantum Algorithms
یک طرح یادگیری توزیع شده برای الگوریتم های کوانتومی متغیر-2022 Variational quantum algorithms (VQAs) are prime contenders to gain computational advantages over classical algorithms using near-term quantum machines. As such, many endeavors have been made
to accelerate the optimization of modern VQAs in past years. To further improve the capability of VQAs,
here, we propose a quantum distributed optimization scheme (dubbed as QUDIO), whose back ends support
both real quantum devices and various quantum simulators. Unlike traditional VQAs subsuming a single
quantum chip or simulator, QUDIO collaborates with multiple quantum machines or simulators to complete
learning tasks. In doing so, the required wall-clock time for optimization can be continuously reduced by
increasing the accessible computational resources when ignoring the communication and synchronization
time. Moreover, through the lens of optimization theory, we unveil the potential factors that could affect
the convergence of QUDIO. In addition, we systematically understand the ability of QUDIO to reduce
wall-clock time via two standard benchmarks, which are hand-written image classification and the ground
energy estimation of the dihydrogen. Our proposal facilitates the development of advanced VQAs to narrow
the gap between the state of the art and applications with the quantum advantage.
INDEX TERMS: Distributed optimization | quantum computing | quantum Hamiltonians | quantum machine learning. |
مقاله انگلیسی |
38 |
Dfinder — An efficient differencing algorithm for incremental programming of constrained IoT devices
Dfinder - یک الگوریتم افتراق کارآمد برای برنامهریزی تدریجی دستگاههای محدود شده اینترنت اشیاء-2022 Internet of Things (IoT) proliferation has been remarkably, interconnecting a vast number of
devices for the support of complex data-driven applications in a variety of domains. The ability
to remotely update these devices is of paramount importance, as it allows the integration of
additional functionality into their firmware, the resolution of code errors, the fixing of security
vulnerabilities, or even their complete re-purpose, without physically accessing them. Such
Over-the-Air Programming (OTAP) solutions require the reduction of the required transmitted
data during a network update, in order to minimize devices’ energy consumption due to the
communication overhead.
In this paper, we present the design and evaluation of Dfinder, a differencing algorithm that operates at byte-level and is able to generate small patches based on delta encoding that makes feasible the transition from a current firmware version to a new one. The algorithm runs in ????(????????????????????) time and ????(????) space complexity, utilising enhanced suffix arrays and state-of-the-art construction techniques that enable the efficient detection of common segments between two firmware versions. Additionally, we propose an extension of the algorithm, which halves the storage requirements at the IoT device side (compared to other state-of-the-art approaches), so that devices with limited storage can also be efficiently re-programmed over-the-air. Moreover, we evaluate its performance, comparing it with other differencing algorithms, and by integrating it in a complete IoT OTAP system. keywords: اینترنت اشیا | الگوریتم های افتراق | دلتا اسکریپت | به روز رسانی سیستم عامل | استفاده از حافظه | زمان اجرا | Internet of Things | Differencing algorithms | Delta script | Firmware update | Memory utilization | Execution time |
مقاله انگلیسی |
39 |
Building a Quantum Engineering Undergraduate Program
ساخت برنامه کارشناسی مهندسی کوانتومی-2022 Contribution: A roadmap is provided for building a
quantum engineering education program to satisfy U.S. national
and international workforce needs.
Background: The rapidly growing quantum information science and engineering (QISE) industry will require both quantumaware and quantum-proficient engineers at the bachelor’s level.
Research Question: What is the best way to provide a flexible
framework that can be tailored for the full academic ecosystem?
Methodology: A workshop of 480 QISE researchers from
across academia, government, industry, and national laboratories
was convened to draw on best practices; representative authors
developed this roadmap.
Findings: 1) For quantum-aware engineers, design of a
first quantum engineering course, accessible to all STEM students, is described; 2) for the education and training of
quantum-proficient engineers, both a quantum engineering minor accessible to all STEM majors, and a quantum track directly
integrated into individual engineering majors are detailed, requiring only three to four newly developed courses complementing
existing STEM classes; 3) a conceptual QISE course for implementation at any postsecondary institution, including community
colleges and military schools, is delineated; 4) QISE presents
extraordinary opportunities to work toward rectifying issues
of inclusivity and equity that continue to be pervasive within
engineering. A plan to do so is presented, as well as how quantum engineering education offers an excellent set of education
research opportunities; and 5) a hands-on training plan on quantum hardware is outlined, a key component of any quantum
engineering program, with a variety of technologies, including
optics, atoms and ions, cryogenic and solid-state technologies,
nanofabrication, and control and readout electronics.
Index Terms: Quantum engineering | quantum information science (QIS) | undergraduate education. |
مقاله انگلیسی |
40 |
HealthCloud: A system for monitoring health status of heart patients using machine learning and cloud computing
HealthCloud: سیستمی برای نظارت بر وضعیت سلامت بیماران قلبی با استفاده از یادگیری ماشین و محاسبات ابری-2022 In the context of the global health crisis of 2020, the tendency of many people to self-diagnose at
home virtually, prior to any physical interaction with medical professionals, has been increased.
Existing self-diagnosis systems include those accessible via the Internet, which involve entering
one’s symptoms. Several other methods do exist, for example, people read medical blogs or
notes, which are often wrongly interpreted by them and they arrive at a completely different
assumption regarding the cause of their symptoms. In this paper, a system called HealthCloud
is proposed, for monitoring health status of heart patients using machine learning and cloud
computing. This study aims to offer the ‘best of both worlds’, by combining the information
required for the person to understand the disease in sufficient detail, with an accurate prediction
as to whether they may have (in this case) heart disease or not. The presence of heart disease
is predicted using machine learning algorithms such as Support Vector Machine, K-Nearest
Neighbours, Neural Networks, Logistic Regression and Gradient Boosting Trees. This paper
evaluates these machine learning algorithms to obtain the most accurate model, in compliance
with Quality of Service (QoS) parameters. The performance of these machine learning models
is measured and compared using the metrics such as Accuracy, Sensitivity (Recall), Specificity,
AUC scores, Execution Time, Latency, and Memory Usage. For better establishment of the
results, these machine learning algorithms have been cross validated with 5-fold cross validation
technique. With an accuracy rate of 85.96%, it has been found that Logistic Regression is the
most responsive and accurate model amongst those models assessed. The Precision, Recall,
Cross Validation mean and AUC Score for this model were 95.83%, 76.67%, 81.68% and 96%
respectively. The algorithm and the mobile application were tested on Google Cloud Firebase
with existing user inputs from the dataset, as well as with unseen new data. The use of this
system can assist patients, both in reaching self-diagnosis decisions and in monitoring their
health.
keywords: Machine learning | Smart healthcare | Heart disease prediction | Cloud computing |
مقاله انگلیسی |