با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
High-accuracy in the classification of butchery cut marks and crocodile tooth marks using machine learning methods and computer vision algorithms
دقت بالا در طبقه بندی علائم برش قصابی و علائم دندان تمساح با استفاده از روش های یادگیری ماشین و الگوریتم های بینایی کامپیوتری-2022 Some researchers using traditional taphonomic criteria (groove shape and presence/absence of microstriations) have cast some doubts about the potential equifinality presented by crocodile tooth marks and
stone tool butchery cut marks. Other researchers have argued that multivariate methods can efficiently
separate both types of marks. Differentiating both taphonomic agents is crucial for determining the earliest evidence of carcass processing by hominins. Here, we use an updated machine learning approach
(discarding artificially bootstrapping the original imbalanced samples) to show that microscopic features
shaped as categorical variables, corresponding to intrinsic properties of mark structure, can accurately
discriminate both types of bone modifications. We also implement new deep-learning methods that
objectively achieve the highest accuracy in differentiating cut marks from crocodile tooth scores (99%
of testing sets). The present study shows that there are precise ways of differentiating both taphonomic
agents, and this invites taphonomists to apply them to controversial paleontological and archaeological
specimens.
keywords: تافونومی | علائم برش | علائم دندان | فراگیری ماشین | یادگیری عمیق | شبکه های عصبی کانولوشنال | قصابی | Taphonomy | Cut marks | Tooth marks | Machine learning | Deep learning | Convolutional neural networks | Butchery |
مقاله انگلیسی |
2 |
توسعه معیاری برای بازاریابی کارآفرینانه: آشکارسازی چارچوب درونی آن و پیش بینی عملکرد
سال انتشار: 2020 - تعداد صفحات فایل pdf انگلیسی: 11 - تعداد صفحات فایل doc فارسی: 34 بازاریابی کارآفرینانه (EM) یک مفهوم بازاریابی برای شرکت هایی در نظر گرفته می شود که تلاش می کنند برنامه های بازاریابی کارآفرینانه، بازار محور و همچنین مشتری مدار را ایجاد کنند، که این برنامه ها در شرایط محدودیت های منابع بخوبی عمل کنند. با این وجود، حتی پس از گذشت سه دهه از پیدایش آن، محققان همچنان بر اعتبارسنجی ابعاد منحصربفرد مفهوم EM (چارچوب خارجی آن) تمرکز می کنند، اما نمی پرسند که نقطه مشترک این ابعاد چیست(چارچوب داخلی آن). این مقاله با استفاده از 1156 شرکت نمونه، یک معیار معتبر ایجاد می کند و تاثیر آن بر عملکرد شرکت را تحلیل می کند. نتایج نشان می دهند که EM شامل سه بعد بهم پیوسته می باشد: 1) تغییر محور، 2) خود گردان سازی، و 3) ریسک پذیر است که تاثیر مثبتی بر عملکرد شرکت دارند
واژگان کلیدی: بازاریابی کارآفرینانه | ایجاد معیار | جهت گیری کارآفرینانه | جهت گیری مشتری | بهره برداری از منابع | بازار محور
|
مقاله ترجمه شده |
3 |
Leveraging inter-industry spillovers through DIY laboratories: Entrepreneurship and innovation in the global bicycle industry
استفاده از سرریز بین صنایع از طریق آزمایشگاه های DIY: کارآفرینی و نوآوری در صنعت جهانی دوچرخه-2020 DIY laboratories have the potential to advance new technologies, products and services through the leveraging of
low-cost facilities by entrepreneurial individuals. We add to this emerging understanding of the DIY phenomenon by investigating the prevalence, operations and contextual factors that impact the use of DIY laboratories in
the bicycle industry. We find two contexts in which DIY laboratories are utilised to develop component-level
innovations: first, DIY laboratories are utilised as a low-cost way to enter an industry where the entrepreneur
lacks the necessary financial resources and rely upon bootstrapping to build their enterprise. Second, and more
frequently, DIY laboratories were used for the integration of diversified technical knowledge originating in other
industries. Our study highlights the important role that DIY laboratories may play in leveraging inter-industry
knowledge spillovers whereby DIY laboratories operate as incubators in the repurposing of diversified knowledge from high-technology sectors to lower-technology sectors to generate incremental innovation. Further, the
modular product architecture of the bicycle helped facilitate the co-opting of technical knowledge prevalent in
other industries by allowing entrepreneurs to focus their product development and subsequent commercialisation activities at the component level of the product artefact.
Keywords: DIY laboratories | Knowledge spillover | Modularity | Exaptation |
مقاله انگلیسی |
4 |
Obtaining accurate estimated action values in categorical distributional reinforcement learning
بدست آوردن مقادیر دقیق عمل تخمینی در یادگیری تقویتی توزیعی دسته بندی شده-2020 Categorical Distributional Reinforcement Learning (CDRL) uses a categorical distribution with evenly
spaced outcomes to model the entire distribution of returns and produces state-of-the-art empirical
performance. However, using inappropriate bounds with CDRL may generate inaccurate estimated
action values, which affect the policy update step and the final performance. In CDRL, the bounds of
the distribution indicate the range of the action values that the agent can obtain in one task, without
considering the policy’s performance and state–action pairs. The action values that the agent obtains
are often far from the bounds, and this reduces the accuracy of the estimated action values. This
paper describes a method of obtaining more accurate estimated action values for CDRL using adaptive
bounds. This approach enables the bounds of the distribution to be adjusted automatically based on
the policy and state–action pairs. To achieve this, we save the weights of the critic network over a fixed
number of time steps, and then apply a bootstrapping method. In this way, we can obtain confidence
intervals for the upper and lower bound, and then use the upper and lower bound of these intervals as
the new bounds of the distribution. The new bounds are more appropriate for the agent and provide a
more accurate estimated action value. To further correct the estimated action values, a distributional
target policy is proposed as a smoothing method. Experiments show that our method outperforms
many state-of-the-art methods on the OpenAI gym tasks. Keywords: Distributional reinforcement learning | Estimated action value | Bootstrapping | Interval estimation |
مقاله انگلیسی |
5 |
Stochastic dispatch of energy storage in microgrids: An augmented reinforcement learning approach
ارسال تصادفی ذخیره انرژی در میکرو شبکه ها: یک رویکرد یادگیری تقویتی تقویت شده-2020 The dynamic dispatch (DD) of battery energy storage systems (BESSs) in microgrids integrated with volatile
energy resources is essentially a multiperiod stochastic optimization problem (MSOP). Because the life span of a
BESS is significantly affected by its charging and discharging behaviors, its lifecycle degradation costs should be
incorporated into the DD model of BESSs, which makes it non-convex. In general, this MSOP is intractable. To
solve this problem, we propose a reinforcement learning (RL) solution augmented with Monte-Carlo tree search
(MCTS) and domain knowledge expressed as dispatching rules. In this solution, the Q-learning with function
approximation is employed as the basic learning architecture that allows multistep bootstrapping and continuous
policy learning. To improve the computation efficiency of randomized multistep simulations, we employed
the MCTS to estimate the expected maximum action values. Moreover, we embedded a few dispatching
rules in RL as probabilistic logics to reduce infeasible action explorations, which can improve the quality of the
data-driven solution. Numerical test results show the proposed algorithm outperforms other baseline RL algorithms
in all cases tested. Keywords: Microgrid | Energy storage | Volatile energy resource | Dynamic dispatch | Reinforcement learning |
مقاله انگلیسی |
6 |
On a partial least squares regression model for asymmetric data with a chemical application in mining
مدل رگرسیون حداقل مربعات جزئی برای داده های نامتقارن با کاربرد شیمیایی در معدن-2019 In chemometrical applications, covariates in regression models are often correlated, causing a collinearity
problem that can be solved by partial least squares (PLS) regression. In addition, high dimensionality in the space
of covariates is also a problem with more parameters than cases, a phenomenon usually found in chemical spectral
data that can also be solved by PLS regression. The Birnbaum-Saunders distribution has theoretical justifications
for modeling chemical data. In this paper, a new methodology based on PLS regression models is proposed
considering a reparameterized Birnbaum-Saunders (RBS) distribution for the response, which is useful for
describing asymmetric data frequently found in chemical phenomena. We estimate the RBS-PLS model parameters
using the maximum likelihood method. A bootstrap approach is employed to obtain the optimal number of
PLS components. Quantile residuals and Cook and Mahalanobis type distances are utilized for detecting possible
anomalies in the modeling. We conduct perturbation studies to assess the performance of these diagnostic tools.
The proposed methodology is applied to real-world kaolinite data and compared to other competing models. This
provides a useful illustration of chemical analysis in the mining industry Keywords: Bootstrapping | Cook and Mahalanobis distances | Diagnostic analysis | GLM | Likelihood method | NIR spectral data | PCA | R software | Statistical residuals |
مقاله انگلیسی |
7 |
Architecture of security association establishment based on bootstrapping technologies for enabling secure IoT infrastructures
معماری ایجاد انجمن امنیتی مبتنی بر فن آوری خود راه برای فعال کردن زیرساخت های اینترنت اشیا امن-2019 The next generation of IoT scenarios must consider security aspects as a first class component. As a core
aspect, key management is crucial for the establishment of security associations between endpoints.
According to it, in this work we propose a novel architecture of security association establishment based
on bootstrapping technologies in order to manage the life-cycle of cryptographic keys in IoT. Based on
our previous work, we propose a key derivation process by using a lightweight bootstrapping mechanism
specifically designed for IoT. Then, the derived cryptographic material is used as an authentication
credential of the EDHOC protocol, which represents a standardization effort for key agreement in IoT.
EDHOC is an application layer alternative to the DTLS handshake, in order to provide end-to-end security
properties even in the presence of intermediate entities, such as proxies. Evaluation results prove the
feasibility of our approach, which represents one of the first efforts to consider application layer security
approaches for the IoT. Keywords: Internet of things | Security management | Bootstrapping | EDHOC |
مقاله انگلیسی |
8 |
Lightweight and escrow-less authenticated key agreement for the internet of things
قرارداد کلیدی معتبر سبک و بدون اعتبار برای اینترنت اشیاء -2017 Security is essential for wide wireless sensor network (WSN) deployments, such as the Internet of Things
(IoT). However, the resource-constrained nature of sensors severely restricts the cryptographic algorithms
and protocols that can be used in such platforms. Such restrictions apply especially to authenticated
key agreement (AKA) protocols for bootstrapping keys between authorized nodes: in traditional net
works, such schemes involve the transmission of quite large certificates and the execution of memory
and processing-intensive cryptographic algorithms, which are not suitable for WSNs. Whereas lightweight
WSN-oriented schemes also exist, most of them focus on small deployments where key-escrow is possible
(i.e., a fully trusted authority knows the private keys of all nodes). Aiming to identify AKA solutions suit
able for the IoT scenario, in this article we assess lightweight and escrow-free schemes, evaluating their
security and performance in terms of processing time and energy consumption in the TelosB platform.
Besides proving that some very efficient schemes are actually flawed, we show that the combination of
SMQV (strengthened-Menezes-Qu-Vanstone) with implicit certificates leads to a secure and lightweight
AKA scheme.
Keywords: Security | Authenticated key agreement | Sensor networks | Internet of things |
مقاله انگلیسی |
9 |
رهبری انتقالی در کارگروه خدمات مصرف کننده: مدل های رقابتی رضایت شغلی، تعهد تغییر و تضاد مشارکتی
سال انتشار: 2014 - تعداد صفحات فایل pdf انگلیسی: 18 - تعداد صفحات فایل doc فارسی: 27 این مقاله درباره اثرات رهبری انتقالی بر حل (مدیریت) تضاد مشارکتی از طریق ارزیابی مدل های مرتبط جایگزین مربوط به متعادل سازی نقش رضایت شغلی و تعهد تغییر بحث می کند. نمونه هایی از اطلاعات مربوط به کارکنان بخش خدمات مشتریان در کشور تایوان مورد ارزیابی واقع شده است. براساس تکنیک نمونه بوت استرپینگ ، یک مطالعه تجربی برای دستیابی به بهترین مدل تطبق انجام شده است. روند تحلیل مدل سلسه مراتبی تو در تو استفاده شده است که روش های متعادل سازی بوت استرپ، PRODCLIN2 و مقایسه مدل سازی معادلات ساختاری (SEM) را در بر می گیرد. این تحلیل پیشنهاد می دهد که رهبری که یکپارچگی (تعهد به تغییر) را ترویج می دهد و الهام و انگیزه (رضایت شغلی) را فراهم می کند، به روشی مناسب می تواند ابزارهایی را برای حل تضاد های مشارکتی و همکاری فراهم کند. |
مقاله ترجمه شده |