با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
Tracking the northern seasonal cap retreat of mars using computer vision
ردیابی عقب نشینی کلاهک فصلی شمالی مریخ با استفاده از بینایی کامپیوتر-2022 Using polar stereographic images from the Mars Color Imager (MARCI), we use Python
to autonomously track the Northern Polar Seasonal Cap (NPSC) recession from Mars Years (MY)
29 to MY 35 between Ls = 10° and Ls = 70°. We outline the cap and find an ellipse of best fit. We
then compare our results to previously published recession rates, that were manually tracked,
and find them to be consistent. Our process benefits from being automated, which increases
the speed of tracking and allows us to monitor the recession with higher Ls fidelity than past
studies. We find that most MYs have a local minimum recession rate at Ls = ~32° and a local
maximum at Ls = ~51°. We also find that MY 30 experiences a rapid latitude increasing event
that involves ~1° Ls of a rapid increase and ~5° Ls of slower recession, which then increases
above the interannual average rate. We interpret this to be the result of a major sublimation
driven by off-polar winds. We also discover divergent effects in the recession and size of the
NPSC following the MY 28 and MY 35 global dust storms. MY 29’s cap is significantly smaller
and retreats slower than the multi-year average, whereas MY 35’s cap is slighter larger and
retreats very close to the average. We hypothesize that the diverging behavior of the caps in
post-storm years can be a result of the differences in the date of onset and the duration of the
storms.
|
مقاله انگلیسی |
2 |
Efficient Quantum State Preparation for the Cauchy Distribution Based on Piecewise Arithmetic
آماده سازی حالت کوانتومی کارآمد برای توزیع کوشی بر اساس حساب تکه ای-2022 The benefits of the quantum Monte Carlo algorithm heavily rely on the efficiency of the
superposition state preparation. So far, most reported Monte Carlo algorithms use the Grover–Rudolph state
preparation method, which is suitable for efficiently integrable distribution functions. Consequently, most reported works are based on log-concave distributions, such as normal distributions. However, non-log-concave
distributions still have many uses, such as in financial modeling. Recently, a new method was proposed
that does not need integration to calculate the rotation angle for state preparation. However, performing
efficient state preparation is still difficult due to the high cost associated with high precision and low error
in the calculation for the rotation angle. Many methods of quantum state preparation use polynomial Taylor
approximations to reduce the computation cost. However, Taylor approximations do not work well with
heavy-tailed distribution functions that are not bounded exponentially. In this article, we present a method
of efficient state preparation for heavy-tailed distribution functions. Specifically, we present a quantum
gate-level algorithm to prepare quantum superposition states based on the Cauchy distribution, which is a
non-log-concave heavy-tailed distribution. Our procedure relies on a piecewise polynomial function instead
of a single Taylor approximation to reduce computational cost and increase accuracy. The Cauchy distribution is an even function, so the proposed piecewise polynomial contains only a quadratic term and a constant
term to maintain the simplest approximation of an even function. Numerical analysis shows that the required
number of subdomains increases linearly as the approximation error decreases exponentially. Furthermore,
the computation complexity of the proposed algorithm is independent of the number of subdomains in the
quantum implementation of the piecewise function due to quantum parallelism. An example of the proposed
algorithm based on a simulation conducted in Qiskit is presented to demonstrate its capability to perform
state preparation based on the Cauchy distribution.
INDEX TERMS: Algorithms | gate operations | quantum computing. |
مقاله انگلیسی |
3 |
Mobile Control Plane Design for Quantum Satellite Backbones
طراحی هواپیمای کنترل سیار برای ستون فقرات ماهواره ای کوانتومی-2022 The interconnection of quantum computers
through the so-called Quantum Internet is a very
promising approach.
The most critical issues concern the physical
layer, considering that the creation of entanglement over long distances is still problematic.
Given the difficulty that usually arises from fiber
optics due to exponential losses, the introduction of intermediate quantum repeaters (QRs)
allows mitigating the problem. A quantum satellite network based on QRs on satellites deployed
over low Earth orbit could make it possible to
overcome the constraints of terrestrial optical
networks. Hence, the recent technological developments in terms of quantum satellite communications motivated our investigation on an ad
hoc quantum satellite backbone design based on
the software defined networking paradigm with a
control plane directly integrated into the constellation itself. Our aim is to outline some guidelines
by comparing several options. Specifically, the
focus is to analyze different architectural solutions
making some considerations on their feasibility,
possible benefits, and costs. Finally, we performed
some simulations on the architectures we considered the most promising, concluding that the integration of the control plane in the constellation
itself is the most appropriate solution.
keywords: |
مقاله انگلیسی |
4 |
Quantum computing in power systems
محاسبات کوانتومی در سیستم های قدرت-2022 Electric power systems provide the backbone of modern industrial societies. Enabling scalable grid analytics is the keystone to
successfully operating large transmission and distribution systems. However, today’ s power systems are suffering from everincreasing computational burdens in sustaining the expanding communities and deep integration of renewable energy resources,
as well as managing huge volumes of data accordingly. These unprecedented challenges call for transformative analytics to support
the resilient operations of power systems. Recently, the explosive growth of quantum computing techniques has ignited new hopes
of revolutionizing power system computations. Quantum computing harnesses quantum mechanisms to solve traditionally
intractable computational problems, which may lead to ultra-scalable and efficient power grid analytics. This paper reviews the
newly emerging application of quantum computing techniques in power systems. We present a comprehensive overview of existing
quantum-engineered power analytics from different operation perspectives, including static analysis, transient analysis, stochastic
analysis, optimization, stability, and control. We thoroughly discuss the related quantum algorithms, their benefits and limitations,
hardware implementations, and recommended practices. We also review the quantum networking techniques to ensure secure
communication of power systems in the quantum era. Finally, we discuss challenges and future research directions. This paper will
hopefully stimulate increasing attention to the development of quantum-engineered smart grids.
keywords: Quantum computing | power system | variational quantum algorithms | quantum optimization | quantum machine learning | quantum security. |
مقاله انگلیسی |
5 |
آموزش آسیب شناسی از راه دور تحت همه گیری COVID-19: برداشت های دانشجویان پزشکی
سال انتشار: 2022 - تعداد صفحات فایل pdf انگلیسی: 4 - تعداد صفحات فایل doc فارسی: 12 زمینه: همهگیری COVID-19 آموزش سنتی را مجبور کرده است که دوباره ساختار یافته و به صورت آنلاین ارائه شود. هدف: تجزیه و تحلیل ادراک دانشجویان پزشکی در مورد مزایا و مشکلات آموزش از راه دور پاتولوژی در طول همه گیری COVID-19.
طراحی: یک مطالعه مقطعی با یک نظرسنجی آنلاین برای دانشجویان سال سوم و چهارم فارغالتحصیلی پزشکی، که در آموزش از راه دور پاتولوژی در طول همهگیری COVID-19 شرکت کردند، انجام شد. روشهای تدریس آنلاین شامل فعالیتهای همزمان با سخنرانیهای تعاملی زنده، بحثهای مبتنی بر مورد و فعالیتهای ناهمزمان با سخنرانیهای ضبطشده، آموزشها و متون موجود در پلت فرم آموزش آنلاین است. ادراک دانشجویان در مورد آموزش از راه دور آسیب شناسی از طریق نظرسنجی آنلاین مورد ارزیابی قرار گرفت. یافتهها: 90 دانشجو (47%) از 190 شرکتکننده پرسشنامه را تکمیل کردند که 45 نفر مرد و 52 نفر در سال سوم فارغالتحصیلی پزشکی بودند. شرایط درک شده ای که یادگیری آسیب شناسی را تسهیل می کرد شامل استفاده از پلت فرم آموزش آنلاین و انعطاف پذیری زمانی برای مطالعه بود. دانشجویان سخنرانی های زنده تعاملی را برتر از سخنرانی های سنتی سنتی می دانستند. شرایط درک شده ای که مانع اجرای آموزش آنلاین شد، شامل دشواری جداسازی مطالعه از فعالیت های خانگی، بی انگیزگی و بدتر شدن کیفیت زندگی به دلیل دوری فیزیکی از همکاران و اساتید بود. به طور کلی، آموزش از راه دور آسیب شناسی توسط 80٪ از دانشجویان ارزش مثبت داشت. نتیجهگیری: ابزارهای آنلاین اجازه میدهند تا محتوای پاتولوژی با موفقیت در طول همهگیری COVID-19 به دانشآموزان ارائه شود. این تجربه می تواند الگویی برای فعالیت های آموزشی آتی آسیب شناسی در آموزش علوم بهداشت باشد. کلید واژه ها: پاتولوژی | آموزش از راه دور | کووید -19 | آموزش پزشکی |
مقاله ترجمه شده |
6 |
Quantum Software as a Service Through a Quantum API Gateway
نرم افزار کوانتومی به عنوان یک سرویس از طریق دروازه کوانتومی API-2022 As quantum computers mature, the complexity of quantum software increases. As
we move from the initial standalone quantum algorithms toward complex solutions
combining quantum algorithms with traditional software, new software engineering
methods and abstractions are needed. Nowadays, quantum computers are usually
offered in the cloud, under a pay-per-use model, leading to the adoption of the
service-oriented good practices that dominate the cloud today. However, specific
adaptations are needed to reap the benefits of service-oriented computing while
dealing with quantum hardware limitations. In this article, we propose the Quantum
API Gateway—an adaptation of the API Gateway pattern that takes into account
the fact that quantum services cannot be deployed as traditional services. Instead,
the Quantum API Gateway recommends the best quantum computer to run a
specific quantum service at run time. As proof of concept, we provide an
implementation of the Quantum API Gateway for the Amazon Braket platform.
|
مقاله انگلیسی |
7 |
The “Cyber Security via Determinism” Paradigm for a Quantum Safe Zero Trust Deterministic Internet of Things (IoT)
پارادایم «امنیت سایبری از طریق جبرگرایی» برای اینترنت اشیا قطعی (IoT) ایمن صفر کوانتومی-2022 The next-generation Internet of Things (IoT) will control the critical infrastructure of the 21st
century, including the Smart Power Grid and Smart Cities. It will also support Deterministic Communications, where ‘deterministic traffic flows’ (D-flows) receive strict Quality-of-Service (QoS) guarantees.
A ‘Cybersecurity via Determinism’ paradigm for the next-generation ‘Industrial and Tactile Deterministic
IoT’ is presented. A forwarding sub-layer of simple and secure ‘deterministic packet switches’ (D-switches)
is introduced into layer-3. This sub-layer supports many deterministic Software Defined Wide Area Networks
(SD-WANs), along with 3 new tools for improving cyber security: Access Control, Rate Control, and
Isolation Control. A Software Defined Networking (SDN) control-plane configures each D-switch (ie FPGA)
with multiple deterministic schedules to support D-flows. The SDN control-plane can embed millions of
isolated Deterministic Virtual Private Networks (DVPNs) into layer 3. This paradigm offers several benefits:
1) All congestion, interference, and Distributed Denial-of-Service (DDOS) attacks are removed; 2) Buffer
sizes in D-switches are reduced by 1000C times; 3) End-to-end IoT delays can be reduced to ultra-low
latencies, i.e., the speed-of-light in fiber; 4) The D-switches do not require Gigabytes of memory to store
large IP routing tables; 5) Hardware support is provided in layer 3 for the US NIST Zero Trust Architecture;
6) Packets within a DVPN can be entirely encrypted using Quantum Safe encryption, which is impervious
to attacks by Quantum Computers using existing quantum algorithms; 7) The probability of an undetected
cyberattack targeting a DVPN can be made arbitrarily small by using long Quantum Safe encryption keys;
and 8) Savings can reach $10s of Billions per year, through reduced capital, energy and operational costs.
INDEX TERMS: Cyber security | deterministic, the Internet of Things (IoT) | quantum computing, zero trust | encryption | privacy | Software Defined Networking (SDN) | industrial internet of things (IIoT) | tactile Internet of Things | FPGA | Industry 4.0 | deterministic Internet of Things. |
مقاله انگلیسی |
8 |
Topological-Graph Dependencies and Scaling Properties of a Heuristic Qubit-Assignment Algorithm
وابستگیهای نمودار توپولوژیکی و ویژگیهای مقیاسبندی الگوریتم تخصیص کیوبیت اکتشافی-2022 The qubit-mapping problem aims to assign and route qubits of a quantum circuit onto an
noisy intermediate-scale quantum (NISQ) device in an optimized fashion, with respect to some cost function.
Finding an optimal solution to this problem is known to scale exponentially in computational complexity; as
such, it is imperative to investigate scalable qubit-mapping solutions for NISQ computation. In this work, a
noise-aware heuristic qubit-assignment algorithm (which assigns initial placements for qubits in a quantum
algorithm to qubits on an NISQ device, but does not route qubits during the quantum algorithm’s execution)
is presented and compared against the optimal brute-force solution, as well as a trivial qubit assignment,
with the aim to quantify the performance of our heuristic qubit-assignment algorithm. We find that for small,
connected-graph algorithms, our heuristic-assignment algorithm faithfully lies in between the effective upper
and lower bounds given by the brute-force and trivial qubit-assignment algorithms. Additionally, we find that
the topological-graph properties of quantum algorithms with over six qubits play an important role in our
heuristic qubit-assignment algorithm’s performance on NISQ devices. Finally, we investigate the scaling
properties of our heuristic algorithm for quantum processors with up to 100 qubits; here, the algorithm
was found to be scalable for quantum-algorithms that admit path-like graphs. Our findings show that as the
size of the quantum processor in our simulation grows, so do the benefits from utilizing the heuristic qubitassignment algorithm, under particular constraints for our heuristic algorithm. This work, thus, characterizes
the performance of a heuristic qubit-assignment algorithm with respect to the topological-graph and scaling
properties of a quantum algorithm that one may wish to run on a given NISQ device.
INDEX TERMS: Quantum computing | qubit-mapping problem. |
مقاله انگلیسی |
9 |
Resource efficient AI: Exploring neural network pruning for task specialization
هوش مصنوعی کارآمد منابع: بررسی هرس شبکه عصبی برای تخصص در کار-2022 This paper explores the use of neural network pruning for transfer learning applications for more
resource-efficient inference. The goal is to focus and optimize a neural network on a smaller
specialized target task. With the advent of IoT, we have seen an immense increase in AI-based
applications on mobile and embedded devices, such as wearables and other smart appliances.
However, with the ever-increasing complexity and capabilities of machine learning algorithms,
this push to the edge has led to new challenges due to the constraints imposed by the limited
availability of resources on these devices. Some form of compression is needed to allow for stateof-the-art convolutional neural networks to run on edge devices. In this work, we adapt existing
neural network pruning methods to allow them to specialize networks to only focus on a subset
of what they were originally trained for. This is a transfer learning use-case where we optimize
large pre-trained networks. This differs from standard optimization techniques by allowing the
network to forget certain concepts and allow the network’s footprint to be even smaller. We
compare different pruning criteria, including one from the field of Explainable AI (XAI), to
determine which technique allows for the smallest possible network while maintaining high
performance on the target task. Our results show the benefits of using network specialization
when executing neural networks on embedded devices both with and without GPU acceleration.
keywords: فشرده سازی شبکه عصبی | یادگیری ماشین | هوش مصنوعی قابل توضیح | هرس شبکه عصبی | استنتاج لبه | Neural network compression | Machine learning | Explainable AI | Neural network pruning | Edge inference |
مقاله انگلیسی |
10 |
A survey of blockchain-based IoT eHealthcare: Applications, research issues, and challenges
بررسی مراقبت های بهداشتی الکترونیک اینترنت اشیاء مبتنی بر بلاک چین: برنامه های کاربردی، مسائل تحقیقاتی و چالش ها-2022 Blockchain (BC) technology has recently emerged as an essential component for different applications, including healthcare and IoT, because of its decentralized ledger, source provenance,
and tamper-proof nature. The Internet of Things (IoT) and BC have enabled health systems to
expand their scalability and maintain consistency on a decentralized platform. As a result, many
researchers have developed BC-enabled IoT eHealth systems and explored the application of
BC technology in diverse fields of eHealthcare. This paper conducts a comprehensive survey
on the emerging applications of BC technology in healthcare. We summarize applications,
research issues, security threats, research challenges, opportunities, and the future scope of BC
technologies in the IoT-enabled healthcare system when BC is adopted to handle the privacy
and storage of current and future medical records. Furthermore, we analyze the state-of-the-art
BC works in the medical area, assessing their benefits-drawbacks, and guiding future researchers
to overcome the limitations of the existing articles.
Keywords: Blockchain | IoT | Healthcare | EHR challenge | Medical area |
مقاله انگلیسی |