با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
Formalizing and analyzing security ceremonies with heterogeneous devices in ANP and PDL
رسمیت و تجزیه و تحلیل مراسم امنیتی با دستگاههای ناهمگن در ANP و PDL-2021 In today’s security protocols (also called “security ceremonies” when humans play a key role), different nodes may have different capabilities: computers can encrypt and decrypt messages, whereas humans cannot; a biometric device can capture biometric information, whereas a random number generator used in e-banking cannot; and so on. Furthermore, even if a node has the decryption capability, it must also know the encryption key to decrypt a message. Actor-network procedures (ANPs) are a well-known formal model of heterogeneous security protocols by Meadows and Pavlovic, and their procedure derivation logic (PDL) supports the logical reasoning about ANPs. However, ANPs do not support explicitly specifying node capabilities, and PDL does not support reasoning explicitly about the knowledge of the participants at different points in time. In this paper, we extend ANPs to deal with heterogeneous devices by explicitly specifying the nodes’ capabilities, as well as by adding new types of events. We also modify PDL to take into account the knowledge of participants at different points in time, and extend PDL to reason both from a “bird’s- eye” view of the system, as well from a “node’s-eye” view. All this allows us to reason about secrecy and authentication in security protocols/ceremonies with different kinds of devices and human users. We illustrate the use of our modeling notation ANP-C and our logics PDL-CK and PDL-CKL to specify and reason about a number of scenarios involving different kinds of devices, including: scenarios for updating someone’s data in a smart card reader; an SSL/TLS ceremony involving a user, a smartphone with a fingerprint reader, anda remote computer/server; and scenarios involving the YubiKey authentication device used by companies such as Google, Facebook, and Bank of America. 2021 Elsevier Inc. All rights reserved. Keywords: Formal methods | Security protocols | Security ceremonies | Actor-network procedures | Procedure derivation logic | Authentication devices |
مقاله انگلیسی |
2 |
Knowledge, beliefs and management of childhood fever among nurses and other health professionals: A cross-sectional survey
دانش، باورها و مدیریت تب دوران کودکی در پرستاران و سایر متخصصان بهداشت و درمان: یک مرور مقطعی-2021 Background: Fever phobia, the unfounded fear regarding the potential harms of fever in children, has been
internationally documented among parents. This fear causes anxiety in parents and health professionals are
regularly consulted for advice.
Objectives: This study aimed to investigate the knowledge, beliefs and recommended treatments among
Australian nurses, pharmacists, general practitioners and paediatricians in the management of febrile children.
Design, setting and participants: This was an online cross-sectional survey of Australian nurses, pharmacists,
general practitioners and paediatricians designed to evaluate the knowledge and preferred recommendations in
the management of febrile children.
Methods: The health professionals were recruited via Facebook. Demographic information, knowledge, beliefs
and preferred treatments were collected through the online survey, and responses were compared across
professions.
Results: Of the 839 health professionals who completed the survey, 52.0% correctly identified a fever as 38 ◦C or
above. Overall, 23.6% underestimated the temperature that constitutes a fever. Respondents reported concerns
leaving fever untreated in children, with dehydration (65.1%), seizures (65.2%), serious illness (34.4%) and
brain damage (29.9%) the most common concerns. Pharmacists were more likely to hold these concerns. The
beliefs that reducing a child’s fever with medication will reduce the risk of harm (34.7%) and prevent febrile
convulsions (51.1%) were prevalent among respondents. These beliefs were more common among pharmacists.
Pharmacists were also more likely to recommend parents monitor a child’s temperature (48.5%) and give
medication to reduce fever (64.6%).
Conclusions: Australian nurses, pharmacists, general practitioners and paediatricians reported many mis-
conceptions surrounding the definition of fever, the potential harms of fever and its management, which may
perpetuate parental fears. These misconceptions were most common among pharmacists. Continuing profes-
sional development is essential to ease unfounded concerns and ensure the safe and judicious care of febrile
children. keywords: تب | کودک | پرستاران | داروسازان | پزشکان عمومی | مرورها و پرسشنامه ها | Fever | Child | Nurses | Pharmacists | General practitioners | Paediatricans | Surveys and questionnaires |
مقاله انگلیسی |
3 |
Diurnal emotions, valence and the coronavirus lockdown analysis in public spaces
احساسات روزانه ، ظرفیت و تجزیه و تحلیل قرنطینه کرونا در فضاهای عمومی-2021 A large-scale analysis of diurnal and seasonal mood cycles in global social networks has been performed successfully over the past ten years using Twitter, Facebook and blogs. This study describes the application of remote biometric technologies to such investigations on a large scale for the first time. The performance of this research was under real conditions producing results that conform to natural human diurnal and seasonal rhythm patterns. The derived results of this, 208 million data research on diurnal emotions, valence and facial temperature correlate with the results of an analogical Twitter research performed worldwide (UK, Australia, US, Canada, Latin America, North America, Europe, Oceania, and Asia). It is established that diurnal valence and sadness were correlated with one another both prior to and during the period of the coronavirus crisis, and that there are statistically significant relationships between the values of diurnal happiness, sadness, valence and facial temperature and the numbers of their data. Results from the simulation and formal comparisons appear in this article. Additionally the analyses on the COVID-19 screening, diagnosing, monitoring and analyzing by applying biometric and AI technologies are described in Housing COVID-19 Video Neuroanalytics. Keywords: Diurnal emotions | Valence and facial temperature | COVID-19 | Public spaces | Remote biometric technologies | Large-scale data analysis | Worldwide comparisons |
مقاله انگلیسی |
4 |
Hiding Private Information in Images From AI
پنهان کردن اطلاعات خصوصی در تصاویر از هوش مصنوعی-2020 Privacy protection attracts increasing concerns these
days. People tend to believe that large social platforms will
comply with the agreement to protect their privacy. However,
photos uploaded by people are usually not treated to achieve
privacy protection. For example, Facebook, the world’s largest
social platform, was found leaking photos of millions of users
to commercial organizations for big data analytics. A common
analytical tool used by these commercial organizations is the Deep
Neural Network (DNN). Today’s DNN can accurately identify
people’s appearance, body shape, hobbies and even more sensitive
personal information, such as addresses, phone numbers, emails,
bank cards and so on. To enable people to enjoy sharing
photos without worrying about their privacy, we propose an
algorithm that allows users to selectively protect their privacy
while preserving the contextual information contained in images.
The results show that the proposed algorithm can select and
perturb private objects to be protected among multiple optional
objects so that the DNN can only identify non-private objects in
images. Index Terms: privacy | object detection | deep learning |
مقاله انگلیسی |
5 |
بازاریابی کارآفرینی موثر بر فیس بوک- مطالعه طولی
سال انتشار: 2020 - تعداد صفحات فایل pdf انگلیسی: 9 - تعداد صفحات فایل doc فارسی: 20 رسانه های اجتماعی فرصت های بی شماری برای راهبردهای بازاریابی کارآفرینی فراهم می سازند که از قدرت جامعه استفاده می کنند به ویژه هنگامی که آنها با رویکردهای سنتی همانند تایید فرد معروف ترکیب شوند. دسترسی، تکرار و سرعت ارتباط در رسانه های اجتماعی مزیت ایده آل برای عوامل بازاریابی کارآفرینی فراهم می سازد. به هر حال میزان سرعت تغییر ممکن است تاثیرات بررسی ها در بازاریابی های کارآفرینی بر رسانه های اجتماعی را با تهدید مواجه سازد و آنها چندان پایدار واقع نشوند. با مدل سازی معادله ساختاری تاثیر بلند مدت تایید فرد معروف در فیس بوک را بر قصد خرید در بین 234 عضو فیس بوک در دو طراحی طولی آزمودیم. معتقدیم که واسطه این رابطه وجهه نام تجاری حامی و تمایز نام تجاری می باشد. این مطالعه ابتدا به بررسی تاثیرات بلند مدت بازاریابی کارآفرینی بر رسانه های اجتماعی می پردازد. اثرگذاری و مفاهیم یافته های خود را بر تحقیقات و فعالیت ها مطرح می کنیم.
واژگان کلیدی: بازاریابی کارآفرینی | رسانه های اجتماعی | بازاریابی جامعه محور | اعتبار تایید فرد معروف | بازاریابی تاثیرگذار | مطالعه طولی |
مقاله ترجمه شده |
6 |
Smartphone platforms as privacy regulators
پلتفرم های گوشی های هوشمند به عنوان تنظیم کننده حریم خصوصی-2020 A series of recent developments highlight the increasingly important role of online platforms in impacting data privacy in today’s digital economy. Revelations and parliamentary
hearings about privacy violations in Facebook’s app and service partner ecosystem, EU Court
of Justice judgments on joint responsibility of platforms and platform users, and the rise of
smartphone app ecosystems where app behaviour is governed by app distribution platforms
and operating systems, all show that platform policies can make or break the enjoyment of
privacy by users. In this article, we examine these developments and explore the question
of what can and should be the role of platforms in protecting data privacy of their users.
The article first distinguishes the different roles that platforms can have in ensuring respect
for data privacy in relevant ecosystems. These roles include governing access to data, design
of relevant interfaces and privacy mechanisms, setting of legal and technical standards,
policing behaviour of the platform’s (business) users, coordinating responsibility for privacy
issues between platform users and the platform, and direct and indirect enforcement of a
platform’s data privacy standards on relevant players. At a higher level, platforms can also
perform a role by translating different international regulatory requirements into platform
policies, thereby facilitating compliance of apps in different regulatory environments. And
in all of this, platforms are striking a balance between ensuring the respect for data privacy
in data-driven environments on the one hand and optimization of the value and business
opportunities connected to the platform and underlying data for users of the platform on
the other hand.
After this analysis of platforms’ roles in protecting privacy, the article turns to the question of what should this role be and how to better integrate platforms in the current legal frameworks for data privacy in Europe and the US. The article will argue for a compromise between direct regulation of platforms and mere self-regulation, in arguing that platforms should be required to make official disclosures about their privacy-related policies and practices for their respective ecosystems. These disclosures should include statements about relevant conditions for access to data and the platform, the platform’s standards with respect to privacy and the way in which these standards ensure or facilitate compliance with existing legal frameworks by platform users, and statements with respect to the risks of abuse of different data sources and platform tools and actions taken to prevent or police such abuses. We argue that such integration of platforms in current regulatory frameworks is both feasible and desirable. It would make the role that platforms already have in practice more explicit. This would help to highlight best practices, create more accountability and could save significant regulatory and compliance resources in bringing relevant information together in one place. In addition, it could provide clarity for business users of platforms, who are now sometimes confronted with restrictive decisions by platforms in ways that lack transparency and oversight. Keywords: Online platforms | Smartphones | Data protection | Privacy | Regulation | Disclosures |
مقاله انگلیسی |
7 |
Partisan selective engagement: Evidence from Facebook
تعامل انتخابی پارتیزان: شواهدی از فیس بوک-2020 This study investigates the effects of variation in “congeniality” of news on Facebook user
engagement (likes, shares, and comments). We compile an original data set of Facebook
posts by 84 German news outlets on politicians that were investigated for criminal offenses
from January 2012 to June 2017. We also construct an index of each outlet’s media
slant by comparing the language of the outlet with that of the main political parties,
which allows us to measure the congeniality of the posts. We find that user engagement
with congenial posts is higher than with uncongenial ones, especially in terms of likes.
The within-outlet, within-topic design allows us to infer that the greater engagement with
congenial news is likely driven by psychological and social factors, rather than a desire for
accurate or otherwise instrumental information. Keywords: Filter bubble | Media bias | Political immunity | Social media | Polarization |
مقاله انگلیسی |
8 |
Early warning system: From face recognition by surveillance cameras to social media analysis to detecting suspicious people
سیستم هشدار اولیه: از تشخیص چهره توسط دوربین های نظارتی گرفته تا تحلیل رسانه های اجتماعی برای تشخیص افراد مشکوک-2020 Surveillance security cameras are increasingly deployed in almost every location for
monitoring purposes, including watching people and their actions for security purposes.
For criminology, images collected from these cameras are usually used after an incident
occurs to analyze who could be the people involved. While this usage of the cameras
is important for a post crime action, there exists the need for real time monitoring to
act as an early warning to prevent or avoid an incident before it occurs. In this paper,
we describe the development and implementation of an early warning system that
recognizes people automatically in a surveillance camera environment and then use data
from various sources to identify these people and build their profile and network. The
current literature is still missing a complete workflow from identifying people/criminals
from a video surveillance to building a criminal information extraction framework and
identifying those people and their interactions with others We train a feature extraction
model for face recognition using convolutional neural networks to get a good recognition
rate on the Chokepoint dataset collected using surveillance cameras. The system also
provides the function to record people appearance in a location, such that unknown
people passing through a scene excessive number of times (above a threshold decided
by a security expert) will then be further analyzed to collect information about them.
We implemented a queue based system to record people entrance. We try to avoid
missing relevant individuals passing through as in some cases it is not possible to add
every passing person to the queue which is maintained using some cache handling
techniques. We collect and analyze information about unknown people by comparing
their images from the cameras to a list of social media profiles collected from Facebook
and intelligent services archives. After locating the profile of a person, traditional news
and other social media platforms are crawled to collect and analyze more information
about the identified person. The analyzed information is then presented to the analyst
where a list of keywords and verb phrases are shown. We also construct the person’s
network from individuals mentioned with him/her in the text. Further analysis will allow
security experts to mark this person as a suspect or safe. This work shows that building
a complete early warning system is feasible to tackle and identify criminals so that
authorities can take the required actions on the spot. Keywords: Surveillance | Security camera | Monitoring | Early warning | Social media | Intelligence service |
مقاله انگلیسی |
9 |
Mining social media data to assess the risk of skin and soft tissue infections from allergen immunotherapy
استخراج داده های رسانه های اجتماعی برای ارزیابی خطر عفونت های پوستی و بافت نرم از سیستم ایمنی آلرژن-2019 Background: Allergen immunotherapy (AIT) treatment for
allergic rhinitis and asthma is used by 2.6 million Americans
annually. Clinical and sterility testing studies identify no risk of
contamination or infection from extracts prepared using
recommended aseptic techniques, but regulatory concerns
persist. Social media can be used to investigate rare adverse
effects not captured by traditional studies.
Objective: We sought to investigate large social media databases
for suggestion of AIT skin and soft tissue infection (SSTI) risk
and compare this risk to a comparator procedure with a sterile
pharmaceutical.
Methods: We analyzed US-restricted data from more than 10
common text-based social media platforms including Facebook,
Twitter, and Reddit between 2012 and 2016. We used natural
language processing (NLP) to identify posts related to AIT and,
separately, influenza vaccination (comparator procedure). NLP
was followed by manual review to identify posts suggesting a
possible SSTI associated with either AIT or influenza
vaccination. SSTI frequencies with 95% CIs were compared.
Results: We identified 25,126 AIT posts, which were matched by
social media platform to 25,126 influenza vaccination–related
posts. NLP identified 4088 (16.3%) AIT posts that required
manual review, with 6 posts (0.02%; 95% CI, 0.005%-0.043%)
indicative of possible AIT-related SSTI. NLP identified 2689
(10.7%) influenza posts that required manual review, with 7
posts (0.03%; 95% CI, 0.007%-0.048%) indicative of possible
influenza vaccination–related SSTI.
Conclusions: Social media data suggest that SSTI from AITand
influenza vaccination are equally rare events.Given that AIT’s SSTI
risk appears comparable to the risk using a sterile pharmaceutical
based on social media data, current aseptic technique procedures
seem safe. (J Allergy Clin Immunol 2019;144:129-34.) Key words: Informatics | NLP | infection | posts | allergen immunotherapy | preparation | aseptic | influenza | vaccination | safety | compounding | shot |
مقاله انگلیسی |
10 |
اعتیاد به شبکه های اجتماعی در روابط عاشقانه: آیا سن کاربر روی آسیب پذیری او دربرابر خیانت ناشی از شبکه های اجتماعی تاثیر دارد؟
سال انتشار: 2019 - تعداد صفحات فایل pdf انگلیسی: 4 - تعداد صفحات فایل doc فارسی: 18 استفاده اجباری از شبکه های اجتماعی انعکاس هایی را روی زندگی اجتماعی، روان شناختی، حرفه ای و فردی کاربر دارد. دسترس پذیری روشهای جایگزین عاشقانه تحت عنوان "دوستان" یک محیط بالغی را فراهم می کند که می تواند یک رابطه احساسی ویا جنسی را تسهیل کند. تعاملات آنلاین با دوستان مجازی توجه کاربران را جلب می کند و آنها را از وقت گذاشتن برای سایر امور مهم خود منحرف می کند که این کار منجر به ایجاد روابط زیان آور می شود. در این مطالعه ما رابطه بین اعتیاد به شبکه های اجتماعی و رفتارهای مرتبط با خیانت و بدعهدی را در یک نمونه ای از 365 شریک زندگی (242 زن، 123 مرد) بررسی کرده ایم. ما همچنین بررسی کرده ایم که آیا سن بر این ارتباط اثر می گذارد یا خیر. یافته ها بیانگر این هستند که اعتیاد به شبکه های اجتماعی رفتارهای مربوط به خیانت را پیش بینی می کند و سن این رابطه را وساطت می کند. این مطالعه همچنین دریافته است که سن با اعتیاد به شبکه های اجتماعی و رفتارهای خاینت و بدعهدی رابطه ای منفی دارد. روی دلالت ها و محدودیت های این مطالعه نیز بحث می شود. |
مقاله ترجمه شده |