دانلود و نمایش مقالات مرتبط با Contrast::صفحه 10
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Contrast

تعداد مقالات یافته شده: 438
ردیف عنوان نوع
91 Are early stage investors biased against women?
Are early stage investors biased against women?-2020
We study whether early stage investors have gender biases using a proprietary data set from AngelList that allows us to observe private interactions between investors and fundraising startups. We find that male investors express less interest in female entrepreneurs compared to observably similar male entrepreneurs. In contrast, female investors express more interest in female entrepreneurs. These findings do not appear to be driven by within-gender screening/monitoring advantages or gender differences in risk preferences. Moreover, the male-led startups that male investors express interest in do not outperform the female-led startups they express interest in—they underperform. Overall, the evidence is consistent with gender biases.
Keywords: ender gap | Entrepreneurship | Angel investors | Bias
مقاله انگلیسی
92 Evaluation of AIS and MAVLINK Protocol Performance
ارزیابی عملکرد پروتکل AIS و MAVLINK-2020
Nowadays maritime data communications are mainly performed by satellite and radio media. But these media have limits on economics or data rate. Future ships at sea would need broad and stable maritime data communication system like that of land. Today, AIS (Automatic Identification System) and Mavlink (Micro Air Vehicle Link) is one of the exist system that can be used to support those activities. AIS is a system that tracks the ships position automatically, control the ships condition and collision avoidance in all ports. Mavlink is a protocol for communication with unmanned vehicle as in charge to build the link connection, Provide logic procedure for information transfer, and link connection. This research carried out the protocol performance comparison between AIS and mavlink to contrast performance of receiver on ship under 30 GT (Gross Tonnage). The researcher did not conduct directly research in the field due to the trial result of distance has maximum at 103 while in the field needs greater distance mavlink Protocol will work on transmission condition of half duplex. The physical layer and data link layer on protocol can be divided into several status condition. It means the condition is to define the condition of radio communication link for multi link. The test result of transmission distance variation demonstrated that the further distance transmission caused greater potential packet loss, the distance test at 90.8 m obtained packet loss at 11 packets while at 30.5 m transmission distance gained 1 packet loss. It can be concluded that the use of mavlink protocol can be used in custom compared to AIS protocol. Mavlink protocol in establishing the payload, can be arranged as its needed. While the AIS protocol is necessary to follow the predetermined standard. The establishment of payload protocol mavlink data can be arranged in payload at location bytes 1 until 32, the data bytes size highly determine the location determination on the payload.
Keyword: VMeS | AIS | Mavlink | Ad-Hoc
مقاله انگلیسی
93 Indigenous ontology, international law and the application of the Convention to the over-representation of Indigenous children in out of home care in Canada and Australia
هستی شناسی بومی ، حقوق بین الملل و اعمال کنوانسیون در نمایندگی بیش از حد کودکان بومی در مراقبت از خانه در کانادا و استرالیا-2020
This paper explores the efficacy of the United Nations Convention on the Rights of the Child (Convention, UN General Assembly, 1989) through the lens of the over-representation of First Nations children placed in out-of-home care in Canada and Aboriginal and Torres Strait Islander children in Australia. A general overview of Indigenous worldviews frames a discussion on the coherence of international human rights law and instruments, including the Convention, account for Indigenous Peoples’ ontologies. The authors argue that the United Nations Declaration on the Rights of Indigenous Peoples (UN General Assembly, 2007) and a new theoretical framework published by the Pan American Health Organization (2019) on health equity and inequity are useful tools to augment the Convention’s coherence with Indigenous ontologies. The paper discusses how the Convention can be applied to structural and systemic risks driving the over-representation of First Nations and Aboriginal and Torres Strait Islander children in out of home care in Canada and Australia. These two countries are included as First Nations and Aboriginal and Torres Strait Islander peoples in these countries have both had significant impact in advocating for their children despite experiencing similar barriers including contemporary colonialism. The advocacy work of the First Nations Child and Family Caring Society in Canada and the Victorian Aboriginal Child Care Agency in Victoria, Australia are discussed. The paper ends by outlining some of the challenges ahead that include the need to meaningfully recognize Indigenous self-determination and equitable funding and resources to enable the actualization of self-determination. Further research contrasting international human rights instruments with Indigenous ontologies could help inform possible amendments to international human rights treaties and general comments.
Keywords: Indigenous | Child welfare | Structural risks | Equity | Human rights | Ontology
مقاله انگلیسی
94 Detection of fingerprints on porous papers and performance evaluation
تشخیص اثر انگشت روی مقالات متخلخل و ارزیابی عملکرد-2020
At crime scenes, fingerprints are often found on paper. The visualization of invisible fingerprints, so-called latent fingerprints (LFPs), is critical in forensic investigation. Laser-induced fluorescence technology for fingerprint detection has the advantages of sensibility, high-resolution, non-destructiveness and non-contact. In this paper, the characteristics of commonly used paper and the interaction between ultraviolet light and porous paper are briefly analyzed firstly. Next the fingerprint detection device is introduced. Then the output energy of the laser is optimized and a series of experiments are carried out. Local gray value stretching and power enhancement algorithms are used to process the fingerprint fluorescence data, and the high contrast fingerprint images are obtained. The experimental results show that the fingerprint substance and paper are degraded in different degrees under the excitation of ultraviolet light, and the second or third detection can improve the signal-to-noise ratio of detection. By the method of this paper, clear fingerprint images can be obtained quickly, and more than 10 secondary fingerprint structures can be extracted from these fingerprint images, which provides quantitative evidences for criminal investigation.
Keywords: Laser-induced fluorescence technology | Fingerprint detection | Paper properties | Fingerprint characteristics | Image processing | Performance evaluation
مقاله انگلیسی
95 Multistability of switched neural networks with sigmoidal activation functions under state-dependent switching
قابلیت چند منظوره تغییر شبکه های عصبی با توابع فعال سازی سیگموئید تحت تعویض وابسته به حالت-2020
This paper presents theoretical results on the multistability of switched neural networks with commonly used sigmoidal activation functions under state-dependent switching. The multistability analysis with such an activation function is difficult because state–space partition is not as straightforward as that with piecewise-linear activations. Sufficient conditions are derived for ascertaining the existence and stability of multiple equilibria. It is shown that the number of stable equilibria of an n-neuron switched neural networks is up to 3n under given conditions. In contrast to existing multistability results with piecewise-linear activation functions, the results herein are also applicable to the equilibria at switching points. Four examples are discussed to substantiate the theoretical results.
Keywords: Multistability | Switched neural network | State-dependent | Sigmoidal activation function
مقاله انگلیسی
96 Development of people mass movement simulation framework based on reinforcement learning
توسعه چارچوب شبیه سازی حرکت جمعی مردم مبتنی بر یادگیری تقویتی-2020
Understanding individual and crowd dynamics in urban environments is critical for numerous applications, such as urban planning, traffic forecasting, and location-based services. However, researchers have developed travel demand models to accomplish this task with survey data that are expensive and acquired at low frequencies. In contrast, emerging data collection methods have enabled researchers to leverage machine learning techniques with a tremendous amount of mobility data for analyzing and forecasting people’s behaviors. In this study, we developed a reinforcement learning-based approach for modeling and simulation of people mass movement using the global positioning system (GPS) data. Unlike traditional travel demand modeling approaches, our method focuses on the problem of inferring the spatio-temporal preferences of individuals from the observed trajectories, and is based on inverse reinforcement learning (IRL) techniques. We applied the model to the data collected from a smartphone application and attempted to replicate a large amount of the population’s daily movement by incorporating with agent-based multi-modal traffic simulation technologies. The simulation results indicate that agents can successfully learn and generate human-like travel activities. Furthermore, the proposed model performance significantly outperforms the existing methods in synthetic urban dynamics.
Keywords: Travel demand modeling | Reinforcement learning | Mobility data | Citywide people mass movement simulation
مقاله انگلیسی
97 Dead ringers? Legal persons and the deceased in European data protection law
زنگ های مرده؟ اشخاص حقوقی و متوفی در قانون حفاظت از داده های اروپا-2020
Notwithstanding suggestions that the concrete treatment of legal and deceased person data during European data protection’s development has been broadly comparable, this article finds that stark divergences are in fact apparent. Justification for the inclusion of both categories has rested on a claimed linkage to living natural person interests. However, despite early fusion, legal persons have been increasingly seen to have qualitatively different information entitlements compared to natural persons, thereby leaving European data protection with a very limited and indirect role here. In contrast, living natural persons and the deceased have not been conceived as normatively dichotomous and since the 1990s there has been growing interest both in establishing sui generis direct protection for deceased person data and also indirect inclusion through a link with living natural persons. Whilst the case for some indirect inclusion is overwhelming, a broad approach to the inter-relational nature of data risks further destabilizing the personal data concept even in relation to living persons alone. Given that jurisdictions representing almost half of the EEA’s population now provide some direct protection and the challenges of managing digital data on death continue to grow, the time may be ripe for a ‘soft’ recommendation on direct protection in this area. Drawing on existing law and scholarship, such a recommendation could seek to specify the role of both specific control rights and diffuse confidentiality obligations, the criteria for time-limits in each case and the need for a balance with other rights and interests which recognises the significantly decreasing interest in protection over time.
Keywords: Companies | Confidentiality | Personal data | Privacy | Testamentary interests | Reputation
مقاله انگلیسی
98 Managing complex engineering projects: What can we learn from the evolving digital footprint?
مدیریت پروژه های مهندسی پیچیده: از رد پای دیجیتال در حال تکامل چه می توان یاد گرفت؟-2020
The challenges of managing large complex engineering projects, such as those involving the design of infra- structure, aerospace and industrial systems; are widely acknowledged. While there exists a mature set of project management tools and methods, many of todays projects overrun in terms of both time and cost. Existing literature attributes these overruns to factors such as: unforeseen dependencies, a lack of understanding, late changes, poor communication, limited resource availability (inc. personnel), incomplete data and aspects of culture and planning. Fundamental to overcoming these factors belies the challenge of how management in- formation relating to them can be provided, and done so in a cost effective manner. Motivated by this challenge, recent research has demonstrated how management information can be automatically generated from the evolving digital footprint of an engineering project, which encompasses a broad range of data types and sources. In contrast to existing work that reports the generation, verification and application of methods for generating management information, this paper reviews all the reported methods to appraise the scope of management information that can be automatically generated from the digital footprint. In so doing, the paper presents a reference model for the generation of managerial information from the digital footprint, an appraisal of 27 methods, and a critical reflection of the scope and generalisability of data-driven project management methods. Key findings from the appraisal include the role of email in providing insights into potential issues, the role of computer models in automatically eliciting process and product dependencies, and the role of project documentation in assessing project norms. The critical reflection also raises issues such as privacy, highlights the enabling technologies, and presents opportunities for new Business Intelligence tools that are based on real-time monitoring and analysis of digital footprints.
Keywords: Big Data | Project Management | Business Intelligence | Knowledge Workers
مقاله انگلیسی
99 Crime and income trajectories preceding lethal and non-lethal violence
جرائم و مسیرهای درآمد پیش از خشونت مرگبار و غیر کشنده-2020
Purpose: This study analyzes the pathways leading to violent offending. We examine whether the lethality of a violent crime could be predicted based on individuals prior history of violent crime and income, and whether the trajectories of lethal offenders are distinguishable from the pathways of non-lethal offenders. Methods: We use a sample of police-reported violent crimes committed in Finland in 2010–2011 (N=26,303) and contrast the pathways to homicide with the trajectories leading to petty assault, assault, aggravated assault, and attempted homicide. Group-based trajectory modeling is applied for identifying individuals with similar trajectories, and multilevel modeling is used for estimating the mean trajectories for offenders of differing severity. Results: Results indicate that homicide offenders display a clear escalation in the frequency of violent offending and a slight decrease in income prior to the offense, but the pathways to homicide largely resemble the pathways to aggravated assault and attempted homicide. Conclusions: The lethality of violent offending cannot be predicted from the offenders crime and income. The greatest divide in the violence severity continuum is between offenders of assaults and offenders of aggravated assaults, with the latter group largely resembling offenders of completed and attempted homicides.
Keywords: Violence | Homicide | Trajectory | Criminal history | Social disadvantage
مقاله انگلیسی
100 Standardised modelling and optimisation of a system of interconnected energy hubs considering multiple energies—Electricity, gas, heating, and cooling
مدل سازی استاندارد و بهینه سازی سیستم هاب های انرژی بهم پیوسته با توجه به انرژی های متعدد برق ، گاز ، گرمایش و سرمایش-2020
The system of interconnected energy hubs (EHs) is a key multi-carrier energy system (MES) model. It is difficult, however, to directly calculate the operational state of the model because of its highly dimensional nonlinear characteristics. To resolve the foregoing problem, a standardised modelling and optimisation method for the system of interconnected EH model is introduced in this paper. In this proposed method, one-dimensional and multi-dimensional piecewise linear approximation methods are adopted to simplify non-convex natural gas transmission functions, generator cost functions, and compressor function. Moreover, a multi-step linearisation method is applied to EHs. The whole system can accordingly be reformulated as a mixed-integer linear programming (MILP) problem. In contrast to the traditional model, the formulated MILP model is effortlessly implemented in the optimisation of the MES with existing advanced optimisation techniques. Finally, the method is verified using a modified three-hub interconnected system. The test results show that the method can save more than 90% computational time with sufficient accuracy. The results also demonstrate that the unified dispatch exploits different energy resources, and the applied energy storage devices can reduce the operational cost from $319,840.267 to $316,382.685.
Keywords: Multi-carrier energy systems | System of interconnected energy hubs | Energy storage | Energy management | Piecewise linear approximation method | Mixed-integer linear programming
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 1090 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 1090 :::::::: افراد آنلاین: 67