دانلود و نمایش مقالات مرتبط با Benefits::صفحه 1
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Benefits

تعداد مقالات یافته شده: 797
ردیف عنوان نوع
1 Tracking the northern seasonal cap retreat of mars using computer vision
ردیابی عقب نشینی کلاهک فصلی شمالی مریخ با استفاده از بینایی کامپیوتر-2022
Using polar stereographic images from the Mars Color Imager (MARCI), we use Python to autonomously track the Northern Polar Seasonal Cap (NPSC) recession from Mars Years (MY) 29 to MY 35 between Ls = 10° and Ls = 70°. We outline the cap and find an ellipse of best fit. We then compare our results to previously published recession rates, that were manually tracked, and find them to be consistent. Our process benefits from being automated, which increases the speed of tracking and allows us to monitor the recession with higher Ls fidelity than past studies. We find that most MYs have a local minimum recession rate at Ls = ~32° and a local maximum at Ls = ~51°. We also find that MY 30 experiences a rapid latitude increasing event that involves ~1° Ls of a rapid increase and ~5° Ls of slower recession, which then increases above the interannual average rate. We interpret this to be the result of a major sublimation driven by off-polar winds. We also discover divergent effects in the recession and size of the NPSC following the MY 28 and MY 35 global dust storms. MY 29’s cap is significantly smaller and retreats slower than the multi-year average, whereas MY 35’s cap is slighter larger and retreats very close to the average. We hypothesize that the diverging behavior of the caps in post-storm years can be a result of the differences in the date of onset and the duration of the storms.
مقاله انگلیسی
2 Efficient Quantum State Preparation for the Cauchy Distribution Based on Piecewise Arithmetic
آماده سازی حالت کوانتومی کارآمد برای توزیع کوشی بر اساس حساب تکه ای-2022
The benefits of the quantum Monte Carlo algorithm heavily rely on the efficiency of the superposition state preparation. So far, most reported Monte Carlo algorithms use the Grover–Rudolph state preparation method, which is suitable for efficiently integrable distribution functions. Consequently, most reported works are based on log-concave distributions, such as normal distributions. However, non-log-concave distributions still have many uses, such as in financial modeling. Recently, a new method was proposed that does not need integration to calculate the rotation angle for state preparation. However, performing efficient state preparation is still difficult due to the high cost associated with high precision and low error in the calculation for the rotation angle. Many methods of quantum state preparation use polynomial Taylor approximations to reduce the computation cost. However, Taylor approximations do not work well with heavy-tailed distribution functions that are not bounded exponentially. In this article, we present a method of efficient state preparation for heavy-tailed distribution functions. Specifically, we present a quantum gate-level algorithm to prepare quantum superposition states based on the Cauchy distribution, which is a non-log-concave heavy-tailed distribution. Our procedure relies on a piecewise polynomial function instead of a single Taylor approximation to reduce computational cost and increase accuracy. The Cauchy distribution is an even function, so the proposed piecewise polynomial contains only a quadratic term and a constant term to maintain the simplest approximation of an even function. Numerical analysis shows that the required number of subdomains increases linearly as the approximation error decreases exponentially. Furthermore, the computation complexity of the proposed algorithm is independent of the number of subdomains in the quantum implementation of the piecewise function due to quantum parallelism. An example of the proposed algorithm based on a simulation conducted in Qiskit is presented to demonstrate its capability to perform state preparation based on the Cauchy distribution.
INDEX TERMS: Algorithms | gate operations | quantum computing.
مقاله انگلیسی
3 Mobile Control Plane Design for Quantum Satellite Backbones
طراحی هواپیمای کنترل سیار برای ستون فقرات ماهواره ای کوانتومی-2022
The interconnection of quantum computers through the so-called Quantum Internet is a very promising approach. The most critical issues concern the physical layer, considering that the creation of entanglement over long distances is still problematic. Given the difficulty that usually arises from fiber optics due to exponential losses, the introduction of intermediate quantum repeaters (QRs) allows mitigating the problem. A quantum satellite network based on QRs on satellites deployed over low Earth orbit could make it possible to overcome the constraints of terrestrial optical networks. Hence, the recent technological developments in terms of quantum satellite communications motivated our investigation on an ad hoc quantum satellite backbone design based on the software defined networking paradigm with a control plane directly integrated into the constellation itself. Our aim is to outline some guidelines by comparing several options. Specifically, the focus is to analyze different architectural solutions making some considerations on their feasibility, possible benefits, and costs. Finally, we performed some simulations on the architectures we considered the most promising, concluding that the integration of the control plane in the constellation itself is the most appropriate solution.
keywords:
مقاله انگلیسی
4 Quantum computing in power systems
محاسبات کوانتومی در سیستم های قدرت-2022
Electric power systems provide the backbone of modern industrial societies. Enabling scalable grid analytics is the keystone to successfully operating large transmission and distribution systems. However, today’ s power systems are suffering from everincreasing computational burdens in sustaining the expanding communities and deep integration of renewable energy resources, as well as managing huge volumes of data accordingly. These unprecedented challenges call for transformative analytics to support the resilient operations of power systems. Recently, the explosive growth of quantum computing techniques has ignited new hopes of revolutionizing power system computations. Quantum computing harnesses quantum mechanisms to solve traditionally intractable computational problems, which may lead to ultra-scalable and efficient power grid analytics. This paper reviews the newly emerging application of quantum computing techniques in power systems. We present a comprehensive overview of existing quantum-engineered power analytics from different operation perspectives, including static analysis, transient analysis, stochastic analysis, optimization, stability, and control. We thoroughly discuss the related quantum algorithms, their benefits and limitations, hardware implementations, and recommended practices. We also review the quantum networking techniques to ensure secure communication of power systems in the quantum era. Finally, we discuss challenges and future research directions. This paper will hopefully stimulate increasing attention to the development of quantum-engineered smart grids.
keywords: Quantum computing | power system | variational quantum algorithms | quantum optimization | quantum machine learning | quantum security.
مقاله انگلیسی
5 آموزش آسیب شناسی از راه دور تحت همه گیری COVID-19: برداشت های دانشجویان پزشکی
سال انتشار: 2022 - تعداد صفحات فایل pdf انگلیسی: 4 - تعداد صفحات فایل doc فارسی: 12
زمینه: همه‌گیری COVID-19 آموزش سنتی را مجبور کرده است که دوباره ساختار یافته و به صورت آنلاین ارائه شود. هدف: تجزیه و تحلیل ادراک دانشجویان پزشکی در مورد مزایا و مشکلات آموزش از راه دور پاتولوژی در طول همه گیری COVID-19.
طراحی: یک مطالعه مقطعی با یک نظرسنجی آنلاین برای دانشجویان سال سوم و چهارم فارغ‌التحصیلی پزشکی، که در آموزش از راه دور پاتولوژی در طول همه‌گیری COVID-19 شرکت کردند، انجام شد. روش‌های تدریس آنلاین شامل فعالیت‌های همزمان با سخنرانی‌های تعاملی زنده، بحث‌های مبتنی بر مورد و فعالیت‌های ناهمزمان با سخنرانی‌های ضبط‌شده، آموزش‌ها و متون موجود در پلت فرم آموزش آنلاین است. ادراک دانشجویان در مورد آموزش از راه دور آسیب شناسی از طریق نظرسنجی آنلاین مورد ارزیابی قرار گرفت.
یافته‌ها: 90 دانشجو (47%) از 190 شرکت‌کننده پرسشنامه را تکمیل کردند که 45 نفر مرد و 52 نفر در سال سوم فارغ‌التحصیلی پزشکی بودند. شرایط درک شده ای که یادگیری آسیب شناسی را تسهیل می کرد شامل استفاده از پلت فرم آموزش آنلاین و انعطاف پذیری زمانی برای مطالعه بود. دانشجویان سخنرانی های زنده تعاملی را برتر از سخنرانی های سنتی سنتی می دانستند. شرایط درک شده ای که مانع اجرای آموزش آنلاین شد، شامل دشواری جداسازی مطالعه از فعالیت های خانگی، بی انگیزگی و بدتر شدن کیفیت زندگی به دلیل دوری فیزیکی از همکاران و اساتید بود. به طور کلی، آموزش از راه دور آسیب شناسی توسط 80٪ از دانشجویان ارزش مثبت داشت.
نتیجه‌گیری: ابزارهای آنلاین اجازه می‌دهند تا محتوای پاتولوژی با موفقیت در طول همه‌گیری COVID-19 به دانش‌آموزان ارائه شود. این تجربه می تواند الگویی برای فعالیت های آموزشی آتی آسیب شناسی در آموزش علوم بهداشت باشد.
کلید واژه ها: پاتولوژی | آموزش از راه دور | کووید -19 | آموزش پزشکی
مقاله ترجمه شده
6 Quantum Software as a Service Through a Quantum API Gateway
نرم افزار کوانتومی به عنوان یک سرویس از طریق دروازه کوانتومی API-2022
As quantum computers mature, the complexity of quantum software increases. As we move from the initial standalone quantum algorithms toward complex solutions combining quantum algorithms with traditional software, new software engineering methods and abstractions are needed. Nowadays, quantum computers are usually offered in the cloud, under a pay-per-use model, leading to the adoption of the service-oriented good practices that dominate the cloud today. However, specific adaptations are needed to reap the benefits of service-oriented computing while dealing with quantum hardware limitations. In this article, we propose the Quantum API Gateway—an adaptation of the API Gateway pattern that takes into account the fact that quantum services cannot be deployed as traditional services. Instead, the Quantum API Gateway recommends the best quantum computer to run a specific quantum service at run time. As proof of concept, we provide an implementation of the Quantum API Gateway for the Amazon Braket platform.
مقاله انگلیسی
7 The “Cyber Security via Determinism” Paradigm for a Quantum Safe Zero Trust Deterministic Internet of Things (IoT)
پارادایم «امنیت سایبری از طریق جبرگرایی» برای اینترنت اشیا قطعی (IoT) ایمن صفر کوانتومی-2022
The next-generation Internet of Things (IoT) will control the critical infrastructure of the 21st century, including the Smart Power Grid and Smart Cities. It will also support Deterministic Communications, where ‘deterministic traffic flows’ (D-flows) receive strict Quality-of-Service (QoS) guarantees. A ‘Cybersecurity via Determinism’ paradigm for the next-generation ‘Industrial and Tactile Deterministic IoT’ is presented. A forwarding sub-layer of simple and secure ‘deterministic packet switches’ (D-switches) is introduced into layer-3. This sub-layer supports many deterministic Software Defined Wide Area Networks (SD-WANs), along with 3 new tools for improving cyber security: Access Control, Rate Control, and Isolation Control. A Software Defined Networking (SDN) control-plane configures each D-switch (ie FPGA) with multiple deterministic schedules to support D-flows. The SDN control-plane can embed millions of isolated Deterministic Virtual Private Networks (DVPNs) into layer 3. This paradigm offers several benefits: 1) All congestion, interference, and Distributed Denial-of-Service (DDOS) attacks are removed; 2) Buffer sizes in D-switches are reduced by 1000C times; 3) End-to-end IoT delays can be reduced to ultra-low latencies, i.e., the speed-of-light in fiber; 4) The D-switches do not require Gigabytes of memory to store large IP routing tables; 5) Hardware support is provided in layer 3 for the US NIST Zero Trust Architecture; 6) Packets within a DVPN can be entirely encrypted using Quantum Safe encryption, which is impervious to attacks by Quantum Computers using existing quantum algorithms; 7) The probability of an undetected cyberattack targeting a DVPN can be made arbitrarily small by using long Quantum Safe encryption keys; and 8) Savings can reach $10s of Billions per year, through reduced capital, energy and operational costs.
INDEX TERMS: Cyber security | deterministic, the Internet of Things (IoT) | quantum computing, zero trust | encryption | privacy | Software Defined Networking (SDN) | industrial internet of things (IIoT) | tactile Internet of Things | FPGA | Industry 4.0 | deterministic Internet of Things.
مقاله انگلیسی
8 Topological-Graph Dependencies and Scaling Properties of a Heuristic Qubit-Assignment Algorithm
وابستگی‌های نمودار توپولوژیکی و ویژگی‌های مقیاس‌بندی الگوریتم تخصیص کیوبیت اکتشافی-2022
The qubit-mapping problem aims to assign and route qubits of a quantum circuit onto an noisy intermediate-scale quantum (NISQ) device in an optimized fashion, with respect to some cost function. Finding an optimal solution to this problem is known to scale exponentially in computational complexity; as such, it is imperative to investigate scalable qubit-mapping solutions for NISQ computation. In this work, a noise-aware heuristic qubit-assignment algorithm (which assigns initial placements for qubits in a quantum algorithm to qubits on an NISQ device, but does not route qubits during the quantum algorithm’s execution) is presented and compared against the optimal brute-force solution, as well as a trivial qubit assignment, with the aim to quantify the performance of our heuristic qubit-assignment algorithm. We find that for small, connected-graph algorithms, our heuristic-assignment algorithm faithfully lies in between the effective upper and lower bounds given by the brute-force and trivial qubit-assignment algorithms. Additionally, we find that the topological-graph properties of quantum algorithms with over six qubits play an important role in our heuristic qubit-assignment algorithm’s performance on NISQ devices. Finally, we investigate the scaling properties of our heuristic algorithm for quantum processors with up to 100 qubits; here, the algorithm was found to be scalable for quantum-algorithms that admit path-like graphs. Our findings show that as the size of the quantum processor in our simulation grows, so do the benefits from utilizing the heuristic qubitassignment algorithm, under particular constraints for our heuristic algorithm. This work, thus, characterizes the performance of a heuristic qubit-assignment algorithm with respect to the topological-graph and scaling properties of a quantum algorithm that one may wish to run on a given NISQ device.
INDEX TERMS: Quantum computing | qubit-mapping problem.
مقاله انگلیسی
9 Resource efficient AI: Exploring neural network pruning for task specialization
هوش مصنوعی کارآمد منابع: بررسی هرس شبکه عصبی برای تخصص در کار-2022
This paper explores the use of neural network pruning for transfer learning applications for more resource-efficient inference. The goal is to focus and optimize a neural network on a smaller specialized target task. With the advent of IoT, we have seen an immense increase in AI-based applications on mobile and embedded devices, such as wearables and other smart appliances. However, with the ever-increasing complexity and capabilities of machine learning algorithms, this push to the edge has led to new challenges due to the constraints imposed by the limited availability of resources on these devices. Some form of compression is needed to allow for stateof-the-art convolutional neural networks to run on edge devices. In this work, we adapt existing neural network pruning methods to allow them to specialize networks to only focus on a subset of what they were originally trained for. This is a transfer learning use-case where we optimize large pre-trained networks. This differs from standard optimization techniques by allowing the network to forget certain concepts and allow the network’s footprint to be even smaller. We compare different pruning criteria, including one from the field of Explainable AI (XAI), to determine which technique allows for the smallest possible network while maintaining high performance on the target task. Our results show the benefits of using network specialization when executing neural networks on embedded devices both with and without GPU acceleration.
keywords: فشرده سازی شبکه عصبی | یادگیری ماشین | هوش مصنوعی قابل توضیح | هرس شبکه عصبی | استنتاج لبه | Neural network compression | Machine learning | Explainable AI | Neural network pruning | Edge inference
مقاله انگلیسی
10 A survey of blockchain-based IoT eHealthcare: Applications, research issues, and challenges
بررسی مراقبت های بهداشتی الکترونیک اینترنت اشیاء مبتنی بر بلاک چین: برنامه های کاربردی، مسائل تحقیقاتی و چالش ها-2022
Blockchain (BC) technology has recently emerged as an essential component for different applications, including healthcare and IoT, because of its decentralized ledger, source provenance, and tamper-proof nature. The Internet of Things (IoT) and BC have enabled health systems to expand their scalability and maintain consistency on a decentralized platform. As a result, many researchers have developed BC-enabled IoT eHealth systems and explored the application of BC technology in diverse fields of eHealthcare. This paper conducts a comprehensive survey on the emerging applications of BC technology in healthcare. We summarize applications, research issues, security threats, research challenges, opportunities, and the future scope of BC technologies in the IoT-enabled healthcare system when BC is adopted to handle the privacy and storage of current and future medical records. Furthermore, we analyze the state-of-the-art BC works in the medical area, assessing their benefits-drawbacks, and guiding future researchers to overcome the limitations of the existing articles.
Keywords: Blockchain | IoT | Healthcare | EHR challenge | Medical area
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 5144 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 5144 :::::::: افراد آنلاین: 62