دانلود و نمایش مقالات مرتبط با Comfort::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Comfort

تعداد مقالات یافته شده: 121
ردیف عنوان نوع
1 iRestroom : A smart restroom cyberinfrastructure for elderly people
iRestroom: زیرساخت سایبری سرویس بهداشتی هوشمند برای افراد مسن-2022
According to a report by UN and WHO, by 2030 the number of senior people (age over 65) is projected to grow up to 1.4 billion, and which is nearly 16.5% of the global population. Seniors who live alone must have their health state closely monitored to avoid unexpected events (such as a fall). This study explains the underlying principles, methodology, and research that went into developing the concept, as well as the need for and scopes of a restroom cyberinfrastructure system, that we call as iRestroom to assess the frailty of elderly people for them to live a comfortable, independent, and secure life at home. The proposed restroom idea is based on the required situations, which are determined by user study, socio-cultural and technological trends, and user requirements. The iRestroom is designed as a multi-sensory place with interconnected devices where carriers of older persons can access interactive material and services throughout their everyday activities. The prototype is then tested at Texas A&M University-Kingsville. A Nave Bayes classifier is utilized to anticipate the locations of the sensors, which serves to provide a constantly updated reference for the data originating from numerous sensors and devices installed in different locations throughout the restroom. A small sample of pilot data was obtained, as well as pertinent web data. The Institutional Review Board (IRB) has approved all the methods.
keywords: اینترنت اشیا | حسگرها | نگهداری از سالمندان | سیستم های هوشمند | یادگیری ماشین | IoT | Sensors | Elder Care | Smart Systems | Machine Learning
مقاله انگلیسی
2 Head tremor in cervical dystonia: Quantifying severity with computer vision
لرزش سر در دیستونی دهانه رحم: کمی کردن شدت با دید کامپیوتری-2022
Background: Head tremor (HT) is a common feature of cervical dystonia (CD), usually quantified by subjective observation. Technological developments offer alternatives for measuring HT severity that are objective and amenable to automation. Objectives: Our objectives were to develop CMOR (Computational Motor Objective Rater; a computer vision- based software system) to quantify oscillatory and directional aspects of HT from video recordings during a clinical examination and to test its convergent validity with clinical rating scales. Methods: For 93 participants with isolated CD and HT enrolled by the Dystonia Coalition, we analyzed video recordings from an examination segment in which participants were instructed to let their head drift to its most comfortable dystonic position. We evaluated peak power, frequency, and directional dominance, and used Spearman’s correlation to measure the agreement between CMOR and clinical ratings. Results: Power averaged 0.90 (SD 1.80) deg2/Hz, and peak frequency 1.95 (SD 0.94) Hz. The dominant HT axis was pitch (antero/retrocollis) for 50%, roll (laterocollis) for 6%, and yaw (torticollis) for 44% of participants. One-sided t-tests showed substantial contributions from the secondary (t = 18.17, p < 0.0001) and tertiary (t = 12.89, p < 0.0001) HT axes. CMOR’s HT severity measure positively correlated with the HT item on the Toronto Western Spasmodic Torticollis Rating Scale-2 (Spearman’s rho = 0.54, p < 0.001). Conclusions: We demonstrate a new objective method to measure HT severity that requires only conventional video recordings, quantifies the complexities of HT in CD, and exhibits convergent validity with clinical severity ratings.
keywords: لرزش سر | ویدیو | بینایی کامپیوتر | درجه بندی شدت | TWSTRS | Head tremor | Video | Computer vision | Severity rating | TWSTRS
مقاله انگلیسی
3 A survey on blockchain, SDN and NFV for the smart-home security
مروری بر بلاک چین، SDN و NFV برای امنیت خانه های هوشمند-2022
Due to millions of loosely coupled devices, the smart-home security is gaining the attention of industry professionals, attackers, and academic researchers. The smart home is a typical home where many sensors, actuators, and IoT devices are used to automate home users’ daily activities. Although a smart home provides comfort, safety, and satisfaction to users, it opens up multiple challenging security issues when automating and offering intelligent services. Recent studies have investigated not only blockchain but SDN and NFV to address these challenges. We present a comprehensive survey on blockchain, SDN, and NFV for smart-home security. The paper also proposes a new architecture of the smart-home security. First, we describe the features of the smart home and its current security issues. Next, we outline the characteristics of blockchain, SDN, and NFV, including their contribution to improving the smart-home security. While SDN enhances the management and access control of the home network by providing a programmable controller to home nodes, NFV implements the functions of network appliances (e.g., network monitoring, firewall) as virtual machines and ensures the high availability of the network. Blockchain reinforces IoT data’s privacy, integrity, and security and improves the trust in transactions among untrusted IoT devices. Finally, we discuss open issues and challenges in the field and propose recommendations towards high-level security for the smart home.
Keywords: Smart homes | IoT | Privacy | Security | Trust | Blockchain | SDN | NFV
مقاله انگلیسی
4 Provably secure biometric-based client–server secure communication over unreliable networks
ارتباطات امن مشتری و سرور مبتنی بر بیومتریک به طور قابل اطمینان در شبکه های غیرقابل اعتماد-2021
Due to rapid advancement in internet technologies, remote client access has become much more comfortable than in previous days. The responsibility of the system does not limit even after providing access to resources. In every system, there is a possibility that an adversary may use the resources of the system without prior authentication. This will create interruption, and the clients of the system will ultimately be affected, so the system must provide some authentication mechanism. Therefore, an authentication scheme needs to be introduced, which provides security against different attacks. Consequently, in this article, we propose a reliable and secure three factor authentication scheme that prevents various security attacks. The provable security of the proposed scheme is proved through a widely used random oracle model. We implemented the cryptographic operations of proposed and related schemes on a desktop system having good specifications to get the experimental results. Moreover, the presented scheme is compared with the existing schemes to compare its performance. The performance evaluation shows that our scheme is lightweight and efficient in terms of computation and communication costs as compared to related competing schemes.
Keywords: Anonymity | Authentication | Impersonation attack | Session key | Smartcard
مقاله انگلیسی
5 Pain Management Knowledge of Nurses Working in Northwest Amhara Referral Hospitals in Ethiopia During 2018
مدیریت دانش درد پرستاران شاغل در بیمارستان های ارجاع شمال غربی آمین در اتیوپی در سال 2018-2021
Background: Pain is an unpleasant emotional and sensory experience that is associated with actual or potential tissue damage. Providing comfort and relief of pain of clients are the fundamental role of nurses in nursing practices. However, inadequate knowledge of appropriate pain management has been reported to be a major obstacle to implementing effective pain management by nurses.چ
Objective: The objective of this study was to assess knowledge of pain management techniques in nurses working in referral hospitals in northwest Ethiopia.
Methods: An institution-based, cross-sectional, interviewer-administered questionnaire study of the pain treatment knowledge of 411 nurses was conducted in 2018 in Northwest Referral Hospitals in Ethiopia. The sample size was allocated to each selected referral hospital. A systematic sampling technique was used to select study participants. The descriptive data were presented in frequency tables. Binary and multivariable logistic regression analyses were undertaken to identify associated factors to pain management knowledge of nurses. Variables with a P value < 0.05 were considered as a significant variable.
Results: Only 40.6% of nurses were judged to have had adequate knowledge regarding pain management. Number of years of training (adjusted odds ratio = 2.19; 95% CI, 1.39–3.44), prior pain education (adjusted odds ratio = 2.34; 95% CI, 1.45–3.8), and professional rank (adjusted odds ratio = 3.09; 95% CI, 1.37–6.96) were associated factors for pain management knowledge of nurses.
Conclusions: The level of many nurses’ knowledge of pain management techniques were inadequate. Lack of pain training in their institution, lack of pain education in their academic curriculum, and professional rank were predictors of these nurses’ pain management knowledge. Providing pain management training and employing higher service rank nurses are likely to result in increased nurses’ knowledge of proper pain management techniques.
keywords: Knowledge | Nursing | Northwest Ethiopia | Pain management
مقاله انگلیسی
6 Vision-related quality of life of Chinese children undergoing orthokeratology treatment compared to single vision spectacles
کیفیت زندگی مرتبط با بینایی کودکان چینی تحت درمان ارتوکراتولوژی در مقایسه با عینک های بینایی مجرد-2021
Objective: To measure and compare the vision-related quality of life between Chinese children wearing orthokeratology (ortho-k) lenses and single vision spectacles, to understand acceptance of ortho-k treatment by children in China.
Methods: Subjects of Chinese origin, with myopia of -5.00 to -0.75 D, astigmatism < 1.50 D were recruited. All subjects had been wearing optical correction – ortho-k lenses or single vision spectacles (SVS), for the past 12–18 months and were aged between 8–12 years. The Pediatric Refractive Error Profile (PREP) questionnaire, translated to Chinese, was used to evaluate the perceptions of children wearing spectacles in overall vision, near vision, far vision, symptoms, appearance, satisfaction, activities, academic performance, handling of optical corrections, and peer perceptions. PREP questions, rephrased to address the same issues for ortho-k subjects who did not wear spectacles in the daytime, were used for ortho-k wearers (PREP-OK). The mean score of all items was calculated as the overall score. For ortho-k wearers, four additional questions on experience and frequency of symptoms: experiencing difficulty in falling asleep, ocular discomfort, itchy/burning/dry eyes, and foreign body sensation during ortho-k lens wear at night were asked and reported separately.
Results: Forty subjects (20 ortho-k, 20 SVS) completed the study. Overall vision, far vision, appearance, satisfaction, activities, and peer perception scores in the ortho-k group were significantly better than the SVS group (all P < 0.05). Handling of optical correction score in the ortho-k group was significantly worse than the SVS group (P = 0.04). No significant differences in near vision, symptoms in the daytime and academic performance were found between two groups (P > 0.05). With respect to symptoms during ortho-k lens wear at night, none of the subjects reported difficulty in falling asleep, but 30–40 % of subjects reported occasional ocular discomfort, itchy/burning/dry eyes, and foreign body sensation after lens insertion.
Conclusion: Although ortho-k may induce some ocular discomfort with lens wear during the night, these were infrequent and the benefits from ortho-k can compensate for the discomfort, leading to better vision-related quality of life in Chinese children, compared with those wearing SVS.
Keywords: Orthokeratology | Spectacles | Symptoms | Vision-related quality of life | Children
مقاله انگلیسی
7 The association of comfort and vision in soft toric contact lens wear
ارتباط راحتی و بینایی در استفاده از لنزهای تماسی نرم toric-2021
Purpose: This work set out to investigate if there was an association between subjective comfort and both subjective and measured vision during the use of contemporary daily disposable soft toric contact lenses.
Methods: Thirty-eight habitual soft contact lens wearers wore each of three daily disposable toric lenses for one week in a prospective, crossover, randomised, single-masked study. The following clinical measures were recorded at dispensing and follow-up visits: biomicroscopy scores, lens fitting (including rotation and rotational stability), high and low contrast visual acuity, subjective vision quality and subjective ocular surface comfort. Subjective scores were collected using 0–10 numerical grading scales. Comfort scores were analysed using a linear regression model with age, sex, visit, phase of crossover (‘phase’), lens type, lens rotation, lens rotational stability, visual acuity, cylinder power and subjective vision quality as factors of interest and then refined using backward stepwise regression.
Results: Thirty six participants (31.1 ± 13.5 years) completed the study. Comfort scores were found to be associated with subjective vision quality (F = 127.0 ; p < 0.0001), phase (F = 7.2; p = 0.001) and lens type (F = 4.9; p = 0.009). Greater comfort scores were observed with greater subjective vision quality scores. Visual acuity was not statistically significant in the model.
Conclusion: This work suggests that symptoms of ocular discomfort may be more intense if there is also perceived visual compromise in daily disposable soft toric lenses. There was a stronger positive correlation between comfort and subjective vision quality compared with comfort and measured visual acuity.
Keywords: Comfort | Vision | Toric | Soft contact lens | Daily disposable
مقاله انگلیسی
8 Unrest index for estimating thermal comfort of poultry birds (Gallus gallus domesticus) using computer vision techniques
شاخص ناآرامی برای برآورد آسایش حرارتی پرندگان طیور (Gallus gallus domesticus) با استفاده از تکنیک های بینایی ماشین-2021
Behaviour can be used to infer animal welfare states. Poultry birds tend to move less under conditions of thermal stress; hence the hypothesis of this research is that this unrest behaviour can be used as an indicator of thermal comfort. The objective was to develop an Unrest Index for poultry bird’s sensitive to changes in this behaviour under different air temperature conditions. The proposed Unrest Index was based on the Hausdorff distance measure and was tested on recorded videos of laying hens and broilers breeders, obtained in different experiments. The index was efficient in detecting the unrest of poultry birds in different thermal conditions and, in conditions above thermoneutrality, the birds moved significantly less. The distribution Unrest Index of data for each thermal condition tested was shown to be asymmetric. However, there seems to be a tendency to reverse this asymmetry when the conditions are thermal comfort and heat stress. It is suggested that the Unrest Index can be used to estimate the thermal comfort of poultry birds and that further studies on the asymmetry of the index data should be carried out in order to identify of the thermoneutrality zone of birds in a non-invasive way. The Unrest Index and the computer vision techniques adopted to assess poultry thermal comfort automatically were efficient in demonstrating differences in bird agitation in distinct thermal stress conditions. The low computational effort and the mathematical simplicity of the model allows the Unrest Index to incorporate bird surveillance systems and estimate thermal comfort automatically.
Keywords: Animal behaviour | Hausdorff distance | Comfort index | Precision livestock farming | Image analysis
مقاله انگلیسی
9 Recent advances in biometrics-based user authentication for wearable devices: A contemporary survey
پیشرفت های اخیر در احراز هویت کاربر مبتنی بر بیومتریک برای دستگاه های پوشیدنی: یک مرور معاصر-2021
In recent years, wearable technology is interwoven with our everyday lives because of its commoditization and comfort. Security and privacy become a big concern as many user-sensitive data have been stored in such devices, such as personal emails and bank accounts. Traditional user authentication techniques like PIN entry are unfriendly and vulnerable to shoulder surfing attacks. To address these problems, a number of new authentication methods have been proposed. In this survey, we review and categorize recent advances in user authentication for wearable devices. We classify existing studies into physiological biometrics based and behavioral biometrics based methods. For each category, we review how signal processing techniques have been used to extract features in various wearable devices. Leveraging these extracted features, specifically designed classification methods can be used to realize user authentication. Finally, we review evaluation metrics for user authentication in wearable devices. Overall, in this survey, we systematically study assorted state-of-the-art user authentication methods for wearable devices, aiming to provide guidance and directions for future research in this area.
Keywords: Wearable devices | User authentication | Signal processing | Machine learning
مقاله انگلیسی
10 Dynamic keystroke pattern analysis and classifiers with competence for user recognition
تجزیه و تحلیل الگوی پویا و طبقه بندی با شایستگی برای تشخیص کاربر-2021
The classification of biometric data is always a difficult task because these data are often unstable and depends on behavioural condition of a person. Personal keystroke activity is difficult to imitate and can be used for identity authentication. In this article, we suggest that the analysis of keystroke dynamics can dramatically increase the level of security of a computer system without disturbing the user’s comfort. First, the user’s established behavioural profile is loaded and then this profile is continuously compared with the current use of the keyboard. If a user’s temporary behavioural profile differs from their established profile, then the access to the computer is blocked. If a current profile of the user is recognized as legitimate, then profile can be dynamically changed, which allows to adjust profiles according to users abilities. Security based on keystroke dynamics analysis depends primarily on the quality of recognizing changes in a user’s profile. Recognition is performed on the dynamic analysis of the feature vector recorded while using the keyboard. In the presented approach, we propose using classifiers with their competence selection, which significantly improves the recognition of users. To select the most appropriate classifiers, the competences of the classifiers in a pool are calculated and then, the most powerful classifiers are selected. Conducted experiments, supported by the proper statistical analysis, confirm the usefulness of the proposed strategy in authorized user and intruder recognition.© 2020 Elsevier B.V. All rights reserved.
Keywords: Biometrics | Authentication | Classifier competence | Pool of classifiers
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 6001 :::::::: بازدید دیروز: 3097 :::::::: بازدید کل: 40268 :::::::: افراد آنلاین: 54