با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
91 |
Are early stage investors biased against women?
Are early stage investors biased against women?-2020 We study whether early stage investors have gender biases using a proprietary data
set from AngelList that allows us to observe private interactions between investors and
fundraising startups. We find that male investors express less interest in female entrepreneurs compared to observably similar male entrepreneurs. In contrast, female investors express more interest in female entrepreneurs. These findings do not appear to
be driven by within-gender screening/monitoring advantages or gender differences in risk
preferences. Moreover, the male-led startups that male investors express interest in do not
outperform the female-led startups they express interest in—they underperform. Overall,
the evidence is consistent with gender biases. Keywords: ender gap | Entrepreneurship | Angel investors | Bias |
مقاله انگلیسی |
92 |
Evaluation of AIS and MAVLINK Protocol Performance
ارزیابی عملکرد پروتکل AIS و MAVLINK-2020 Nowadays maritime data communications are
mainly performed by satellite and radio media. But these media
have limits on economics or data rate. Future ships at sea would
need broad and stable maritime data communication system
like that of land. Today, AIS (Automatic Identification System)
and Mavlink (Micro Air Vehicle Link) is one of the exist system
that can be used to support those activities. AIS is a system that
tracks the ships position automatically, control the ships
condition and collision avoidance in all ports. Mavlink is a
protocol for communication with unmanned vehicle as in charge
to build the link connection, Provide logic procedure for
information transfer, and link connection. This research carried
out the protocol performance comparison between AIS and
mavlink to contrast performance of receiver on ship under 30
GT (Gross Tonnage). The researcher did not conduct directly
research in the field due to the trial result of distance has
maximum at 103 while in the field needs greater distance
mavlink Protocol will work on transmission condition of half
duplex. The physical layer and data link layer on protocol can
be divided into several status condition. It means the condition
is to define the condition of radio communication link for multi
link. The test result of transmission distance variation
demonstrated that the further distance transmission caused
greater potential packet loss, the distance test at 90.8 m obtained
packet loss at 11 packets while at 30.5 m transmission distance
gained 1 packet loss. It can be concluded that the use of mavlink
protocol can be used in custom compared to AIS protocol.
Mavlink protocol in establishing the payload, can be arranged
as its needed. While the AIS protocol is necessary to follow the
predetermined standard. The establishment of payload protocol
mavlink data can be arranged in payload at location bytes 1
until 32, the data bytes size highly determine the location
determination on the payload. Keyword: VMeS | AIS | Mavlink | Ad-Hoc |
مقاله انگلیسی |
93 |
Indigenous ontology, international law and the application of the Convention to the over-representation of Indigenous children in out of home care in Canada and Australia
هستی شناسی بومی ، حقوق بین الملل و اعمال کنوانسیون در نمایندگی بیش از حد کودکان بومی در مراقبت از خانه در کانادا و استرالیا-2020 This paper explores the efficacy of the United Nations Convention on the Rights of the Child
(Convention, UN General Assembly, 1989) through the lens of the over-representation of First
Nations children placed in out-of-home care in Canada and Aboriginal and Torres Strait Islander
children in Australia. A general overview of Indigenous worldviews frames a discussion on the
coherence of international human rights law and instruments, including the Convention, account
for Indigenous Peoples’ ontologies. The authors argue that the United Nations Declaration on the
Rights of Indigenous Peoples (UN General Assembly, 2007) and a new theoretical framework
published by the Pan American Health Organization (2019) on health equity and inequity are
useful tools to augment the Convention’s coherence with Indigenous ontologies.
The paper discusses how the Convention can be applied to structural and systemic risks
driving the over-representation of First Nations and Aboriginal and Torres Strait Islander children
in out of home care in Canada and Australia. These two countries are included as First Nations
and Aboriginal and Torres Strait Islander peoples in these countries have both had significant
impact in advocating for their children despite experiencing similar barriers including contemporary
colonialism. The advocacy work of the First Nations Child and Family Caring Society
in Canada and the Victorian Aboriginal Child Care Agency in Victoria, Australia are discussed.
The paper ends by outlining some of the challenges ahead that include the need to meaningfully
recognize Indigenous self-determination and equitable funding and resources to enable
the actualization of self-determination. Further research contrasting international human rights
instruments with Indigenous ontologies could help inform possible amendments to international
human rights treaties and general comments. Keywords: Indigenous | Child welfare | Structural risks | Equity | Human rights | Ontology |
مقاله انگلیسی |
94 |
Detection of fingerprints on porous papers and performance evaluation
تشخیص اثر انگشت روی مقالات متخلخل و ارزیابی عملکرد-2020 At crime scenes, fingerprints are often found on paper. The visualization of invisible fingerprints, so-called
latent fingerprints (LFPs), is critical in forensic investigation. Laser-induced fluorescence technology for
fingerprint detection has the advantages of sensibility, high-resolution, non-destructiveness and non-contact.
In this paper, the characteristics of commonly used paper and the interaction between ultraviolet light and
porous paper are briefly analyzed firstly. Next the fingerprint detection device is introduced. Then the output
energy of the laser is optimized and a series of experiments are carried out. Local gray value stretching and
power enhancement algorithms are used to process the fingerprint fluorescence data, and the high contrast
fingerprint images are obtained. The experimental results show that the fingerprint substance and paper are
degraded in different degrees under the excitation of ultraviolet light, and the second or third detection can
improve the signal-to-noise ratio of detection. By the method of this paper, clear fingerprint images can be
obtained quickly, and more than 10 secondary fingerprint structures can be extracted from these fingerprint
images, which provides quantitative evidences for criminal investigation. Keywords: Laser-induced fluorescence technology | Fingerprint detection | Paper properties | Fingerprint characteristics | Image processing | Performance evaluation |
مقاله انگلیسی |
95 |
Multistability of switched neural networks with sigmoidal activation functions under state-dependent switching
قابلیت چند منظوره تغییر شبکه های عصبی با توابع فعال سازی سیگموئید تحت تعویض وابسته به حالت-2020 This paper presents theoretical results on the multistability of switched neural networks with commonly
used sigmoidal activation functions under state-dependent switching. The multistability analysis
with such an activation function is difficult because state–space partition is not as straightforward as
that with piecewise-linear activations. Sufficient conditions are derived for ascertaining the existence
and stability of multiple equilibria. It is shown that the number of stable equilibria of an n-neuron
switched neural networks is up to 3n under given conditions. In contrast to existing multistability
results with piecewise-linear activation functions, the results herein are also applicable to the equilibria
at switching points. Four examples are discussed to substantiate the theoretical results. Keywords: Multistability | Switched neural network | State-dependent | Sigmoidal activation function |
مقاله انگلیسی |
96 |
Development of people mass movement simulation framework based on reinforcement learning
توسعه چارچوب شبیه سازی حرکت جمعی مردم مبتنی بر یادگیری تقویتی-2020 Understanding individual and crowd dynamics in urban environments is critical for numerous
applications, such as urban planning, traffic forecasting, and location-based services. However,
researchers have developed travel demand models to accomplish this task with survey data that
are expensive and acquired at low frequencies. In contrast, emerging data collection methods
have enabled researchers to leverage machine learning techniques with a tremendous amount of
mobility data for analyzing and forecasting people’s behaviors. In this study, we developed a
reinforcement learning-based approach for modeling and simulation of people mass movement
using the global positioning system (GPS) data. Unlike traditional travel demand modeling approaches,
our method focuses on the problem of inferring the spatio-temporal preferences of
individuals from the observed trajectories, and is based on inverse reinforcement learning (IRL)
techniques. We applied the model to the data collected from a smartphone application and attempted
to replicate a large amount of the population’s daily movement by incorporating with
agent-based multi-modal traffic simulation technologies. The simulation results indicate that
agents can successfully learn and generate human-like travel activities. Furthermore, the proposed
model performance significantly outperforms the existing methods in synthetic urban
dynamics. Keywords: Travel demand modeling | Reinforcement learning | Mobility data | Citywide people mass movement simulation |
مقاله انگلیسی |
97 |
Dead ringers? Legal persons and the deceased in European data protection law
زنگ های مرده؟ اشخاص حقوقی و متوفی در قانون حفاظت از داده های اروپا-2020 Notwithstanding suggestions that the concrete treatment of legal and deceased person data
during European data protection’s development has been broadly comparable, this article
finds that stark divergences are in fact apparent. Justification for the inclusion of both categories has rested on a claimed linkage to living natural person interests. However, despite
early fusion, legal persons have been increasingly seen to have qualitatively different information entitlements compared to natural persons, thereby leaving European data protection with a very limited and indirect role here. In contrast, living natural persons and the
deceased have not been conceived as normatively dichotomous and since the 1990s there
has been growing interest both in establishing sui generis direct protection for deceased person data and also indirect inclusion through a link with living natural persons. Whilst the
case for some indirect inclusion is overwhelming, a broad approach to the inter-relational
nature of data risks further destabilizing the personal data concept even in relation to living persons alone. Given that jurisdictions representing almost half of the EEA’s population
now provide some direct protection and the challenges of managing digital data on death
continue to grow, the time may be ripe for a ‘soft’ recommendation on direct protection in
this area. Drawing on existing law and scholarship, such a recommendation could seek to
specify the role of both specific control rights and diffuse confidentiality obligations, the criteria for time-limits in each case and the need for a balance with other rights and interests
which recognises the significantly decreasing interest in protection over time.
Keywords: Companies | Confidentiality | Personal data | Privacy | Testamentary interests | Reputation |
مقاله انگلیسی |
98 |
Managing complex engineering projects: What can we learn from the evolving digital footprint?
مدیریت پروژه های مهندسی پیچیده: از رد پای دیجیتال در حال تکامل چه می توان یاد گرفت؟-2020 The challenges of managing large complex engineering projects, such as those involving the design of infra- structure, aerospace and industrial systems; are widely acknowledged. While there exists a mature set of project management tools and methods, many of todays projects overrun in terms of both time and cost. Existing literature attributes these overruns to factors such as: unforeseen dependencies, a lack of understanding, late changes, poor communication, limited resource availability (inc. personnel), incomplete data and aspects of culture and planning. Fundamental to overcoming these factors belies the challenge of how management in- formation relating to them can be provided, and done so in a cost effective manner. Motivated by this challenge, recent research has demonstrated how management information can be automatically generated from the evolving digital footprint of an engineering project, which encompasses a broad range of data types and sources. In contrast to existing work that reports the generation, verification and application of methods for generating management information, this paper reviews all the reported methods to appraise the scope of management information that can be automatically generated from the digital footprint. In so doing, the paper presents a reference model for the generation of managerial information from the digital footprint, an appraisal of 27 methods, and a critical reflection of the scope and generalisability of data-driven project management methods. Key findings from the appraisal include the role of email in providing insights into potential issues, the role of computer models in automatically eliciting process and product dependencies, and the role of project documentation in assessing project norms. The critical reflection also raises issues such as privacy, highlights the enabling technologies, and presents opportunities for new Business Intelligence tools that are based on real-time monitoring and analysis of digital footprints. Keywords: Big Data | Project Management | Business Intelligence | Knowledge Workers |
مقاله انگلیسی |
99 |
Crime and income trajectories preceding lethal and non-lethal violence
جرائم و مسیرهای درآمد پیش از خشونت مرگبار و غیر کشنده-2020 Purpose: This study analyzes the pathways leading to violent offending. We examine whether the lethality of a
violent crime could be predicted based on individuals prior history of violent crime and income, and whether
the trajectories of lethal offenders are distinguishable from the pathways of non-lethal offenders.
Methods: We use a sample of police-reported violent crimes committed in Finland in 2010–2011 (N=26,303)
and contrast the pathways to homicide with the trajectories leading to petty assault, assault, aggravated assault,
and attempted homicide. Group-based trajectory modeling is applied for identifying individuals with similar
trajectories, and multilevel modeling is used for estimating the mean trajectories for offenders of differing severity.
Results: Results indicate that homicide offenders display a clear escalation in the frequency of violent offending
and a slight decrease in income prior to the offense, but the pathways to homicide largely resemble the pathways
to aggravated assault and attempted homicide.
Conclusions: The lethality of violent offending cannot be predicted from the offenders crime and income. The
greatest divide in the violence severity continuum is between offenders of assaults and offenders of aggravated
assaults, with the latter group largely resembling offenders of completed and attempted homicides. Keywords: Violence | Homicide | Trajectory | Criminal history | Social disadvantage |
مقاله انگلیسی |
100 |
Standardised modelling and optimisation of a system of interconnected energy hubs considering multiple energies—Electricity, gas, heating, and cooling
مدل سازی استاندارد و بهینه سازی سیستم هاب های انرژی بهم پیوسته با توجه به انرژی های متعدد برق ، گاز ، گرمایش و سرمایش-2020 The system of interconnected energy hubs (EHs) is a key multi-carrier energy system (MES) model. It is difficult,
however, to directly calculate the operational state of the model because of its highly dimensional nonlinear
characteristics. To resolve the foregoing problem, a standardised modelling and optimisation method for the
system of interconnected EH model is introduced in this paper. In this proposed method, one-dimensional and
multi-dimensional piecewise linear approximation methods are adopted to simplify non-convex natural gas
transmission functions, generator cost functions, and compressor function. Moreover, a multi-step linearisation
method is applied to EHs. The whole system can accordingly be reformulated as a mixed-integer linear programming
(MILP) problem. In contrast to the traditional model, the formulated MILP model is effortlessly implemented
in the optimisation of the MES with existing advanced optimisation techniques. Finally, the method is
verified using a modified three-hub interconnected system. The test results show that the method can save more
than 90% computational time with sufficient accuracy. The results also demonstrate that the unified dispatch
exploits different energy resources, and the applied energy storage devices can reduce the operational cost from
$319,840.267 to $316,382.685. Keywords: Multi-carrier energy systems | System of interconnected energy hubs | Energy storage | Energy management | Piecewise linear approximation method | Mixed-integer linear programming |
مقاله انگلیسی |