دانلود و نمایش مقالات مرتبط با Facebook::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Facebook

تعداد مقالات یافته شده: 140
ردیف عنوان نوع
1 Formalizing and analyzing security ceremonies with heterogeneous devices in ANP and PDL
رسمیت و تجزیه و تحلیل مراسم امنیتی با دستگاههای ناهمگن در ANP و PDL-2021
In today’s security protocols (also called “security ceremonies” when humans play a key role), different nodes may have different capabilities: computers can encrypt and decrypt messages, whereas humans cannot; a biometric device can capture biometric information, whereas a random number generator used in e-banking cannot; and so on. Furthermore, even if a node has the decryption capability, it must also know the encryption key to decrypt a message. Actor-network procedures (ANPs) are a well-known formal model of heterogeneous security protocols by Meadows and Pavlovic, and their procedure derivation logic (PDL) supports the logical reasoning about ANPs. However, ANPs do not support explicitly specifying node capabilities, and PDL does not support reasoning explicitly about the knowledge of the participants at different points in time. In this paper, we extend ANPs to deal with heterogeneous devices by explicitly specifying the nodes’ capabilities, as well as by adding new types of events. We also modify PDL to take into account the knowledge of participants at different points in time, and extend PDL to reason both from a “bird’s- eye” view of the system, as well from a “node’s-eye” view. All this allows us to reason about secrecy and authentication in security protocols/ceremonies with different kinds of devices and human users. We illustrate the use of our modeling notation ANP-C and our logics PDL-CK and PDL-CKL to specify and reason about a number of scenarios involving different kinds of devices, including: scenarios for updating someone’s data in a smart card reader; an SSL/TLS ceremony involving a user, a smartphone with a fingerprint reader, anda remote computer/server; and scenarios involving the YubiKey authentication device used by companies such as Google, Facebook, and Bank of America. 2021 Elsevier Inc. All rights reserved.
Keywords: Formal methods | Security protocols | Security ceremonies | Actor-network procedures | Procedure derivation logic | Authentication devices
مقاله انگلیسی
2 Knowledge, beliefs and management of childhood fever among nurses and other health professionals: A cross-sectional survey
دانش، باورها و مدیریت تب دوران کودکی در پرستاران و سایر متخصصان بهداشت و درمان: یک مرور مقطعی-2021
Background: Fever phobia, the unfounded fear regarding the potential harms of fever in children, has been internationally documented among parents. This fear causes anxiety in parents and health professionals are regularly consulted for advice. Objectives: This study aimed to investigate the knowledge, beliefs and recommended treatments among Australian nurses, pharmacists, general practitioners and paediatricians in the management of febrile children. Design, setting and participants: This was an online cross-sectional survey of Australian nurses, pharmacists, general practitioners and paediatricians designed to evaluate the knowledge and preferred recommendations in the management of febrile children. Methods: The health professionals were recruited via Facebook. Demographic information, knowledge, beliefs and preferred treatments were collected through the online survey, and responses were compared across professions. Results: Of the 839 health professionals who completed the survey, 52.0% correctly identified a fever as 38 ◦C or above. Overall, 23.6% underestimated the temperature that constitutes a fever. Respondents reported concerns leaving fever untreated in children, with dehydration (65.1%), seizures (65.2%), serious illness (34.4%) and brain damage (29.9%) the most common concerns. Pharmacists were more likely to hold these concerns. The beliefs that reducing a child’s fever with medication will reduce the risk of harm (34.7%) and prevent febrile convulsions (51.1%) were prevalent among respondents. These beliefs were more common among pharmacists. Pharmacists were also more likely to recommend parents monitor a child’s temperature (48.5%) and give medication to reduce fever (64.6%). Conclusions: Australian nurses, pharmacists, general practitioners and paediatricians reported many mis- conceptions surrounding the definition of fever, the potential harms of fever and its management, which may perpetuate parental fears. These misconceptions were most common among pharmacists. Continuing profes- sional development is essential to ease unfounded concerns and ensure the safe and judicious care of febrile children.
keywords: تب | کودک | پرستاران | داروسازان | پزشکان عمومی | مرورها و پرسشنامه ها | Fever | Child | Nurses | Pharmacists | General practitioners | Paediatricans | Surveys and questionnaires
مقاله انگلیسی
3 Diurnal emotions, valence and the coronavirus lockdown analysis in public spaces
احساسات روزانه ، ظرفیت و تجزیه و تحلیل قرنطینه کرونا در فضاهای عمومی-2021
A large-scale analysis of diurnal and seasonal mood cycles in global social networks has been performed successfully over the past ten years using Twitter, Facebook and blogs. This study describes the application of remote biometric technologies to such investigations on a large scale for the first time. The performance of this research was under real conditions producing results that conform to natural human diurnal and seasonal rhythm patterns. The derived results of this, 208 million data research on diurnal emotions, valence and facial temperature correlate with the results of an analogical Twitter research performed worldwide (UK, Australia, US, Canada, Latin America, North America, Europe, Oceania, and Asia). It is established that diurnal valence and sadness were correlated with one another both prior to and during the period of the coronavirus crisis, and that there are statistically significant relationships between the values of diurnal happiness, sadness, valence and facial temperature and the numbers of their data. Results from the simulation and formal comparisons appear in this article. Additionally the analyses on the COVID-19 screening, diagnosing, monitoring and analyzing by applying biometric and AI technologies are described in Housing COVID-19 Video Neuroanalytics.
Keywords: Diurnal emotions | Valence and facial temperature | COVID-19 | Public spaces | Remote biometric technologies | Large-scale data analysis | Worldwide comparisons
مقاله انگلیسی
4 Hiding Private Information in Images From AI
پنهان کردن اطلاعات خصوصی در تصاویر از هوش مصنوعی-2020
Privacy protection attracts increasing concerns these days. People tend to believe that large social platforms will comply with the agreement to protect their privacy. However, photos uploaded by people are usually not treated to achieve privacy protection. For example, Facebook, the world’s largest social platform, was found leaking photos of millions of users to commercial organizations for big data analytics. A common analytical tool used by these commercial organizations is the Deep Neural Network (DNN). Today’s DNN can accurately identify people’s appearance, body shape, hobbies and even more sensitive personal information, such as addresses, phone numbers, emails, bank cards and so on. To enable people to enjoy sharing photos without worrying about their privacy, we propose an algorithm that allows users to selectively protect their privacy while preserving the contextual information contained in images. The results show that the proposed algorithm can select and perturb private objects to be protected among multiple optional objects so that the DNN can only identify non-private objects in images.
Index Terms: privacy | object detection | deep learning
مقاله انگلیسی
5 بازاریابی کارآفرینی موثر بر فیس بوک- مطالعه طولی
سال انتشار: 2020 - تعداد صفحات فایل pdf انگلیسی: 9 - تعداد صفحات فایل doc فارسی: 20
رسانه های اجتماعی فرصت های بی شماری برای راهبردهای بازاریابی کارآفرینی فراهم می سازند که از قدرت جامعه استفاده می کنند به ویژه هنگامی که آنها با رویکردهای سنتی همانند تایید فرد معروف ترکیب شوند. دسترسی، تکرار و سرعت ارتباط در رسانه های اجتماعی مزیت ایده آل برای عوامل بازاریابی کارآفرینی فراهم می سازد. به هر حال میزان سرعت تغییر ممکن است تاثیرات بررسی ها در بازاریابی های کارآفرینی بر رسانه های اجتماعی را با تهدید مواجه سازد و آنها چندان پایدار واقع نشوند. با مدل سازی معادله ساختاری تاثیر بلند مدت تایید فرد معروف در فیس بوک را بر قصد خرید در بین 234 عضو فیس بوک در دو طراحی طولی آزمودیم. معتقدیم که واسطه این رابطه وجهه نام تجاری حامی و تمایز نام تجاری می باشد. این مطالعه ابتدا به بررسی تاثیرات بلند مدت بازاریابی کارآفرینی بر رسانه های اجتماعی می پردازد. اثرگذاری و مفاهیم یافته های خود را بر تحقیقات و فعالیت ها مطرح می کنیم.
واژگان کلیدی: بازاریابی کارآفرینی | رسانه های اجتماعی | بازاریابی جامعه محور | اعتبار تایید فرد معروف | بازاریابی تاثیرگذار | مطالعه طولی
مقاله ترجمه شده
6 Smartphone platforms as privacy regulators
پلتفرم های گوشی های هوشمند به عنوان تنظیم کننده حریم خصوصی-2020
A series of recent developments highlight the increasingly important role of online platforms in impacting data privacy in today’s digital economy. Revelations and parliamentary hearings about privacy violations in Facebook’s app and service partner ecosystem, EU Court of Justice judgments on joint responsibility of platforms and platform users, and the rise of smartphone app ecosystems where app behaviour is governed by app distribution platforms and operating systems, all show that platform policies can make or break the enjoyment of privacy by users. In this article, we examine these developments and explore the question of what can and should be the role of platforms in protecting data privacy of their users. The article first distinguishes the different roles that platforms can have in ensuring respect for data privacy in relevant ecosystems. These roles include governing access to data, design of relevant interfaces and privacy mechanisms, setting of legal and technical standards, policing behaviour of the platform’s (business) users, coordinating responsibility for privacy issues between platform users and the platform, and direct and indirect enforcement of a platform’s data privacy standards on relevant players. At a higher level, platforms can also perform a role by translating different international regulatory requirements into platform policies, thereby facilitating compliance of apps in different regulatory environments. And in all of this, platforms are striking a balance between ensuring the respect for data privacy in data-driven environments on the one hand and optimization of the value and business opportunities connected to the platform and underlying data for users of the platform on the other hand.
After this analysis of platforms’ roles in protecting privacy, the article turns to the question of what should this role be and how to better integrate platforms in the current legal frameworks for data privacy in Europe and the US. The article will argue for a compromise between direct regulation of platforms and mere self-regulation, in arguing that platforms should be required to make official disclosures about their privacy-related policies and practices for their respective ecosystems. These disclosures should include statements about relevant conditions for access to data and the platform, the platform’s standards with respect to privacy and the way in which these standards ensure or facilitate compliance with existing legal frameworks by platform users, and statements with respect to the risks of abuse of different data sources and platform tools and actions taken to prevent or police such abuses. We argue that such integration of platforms in current regulatory frameworks is both feasible and desirable. It would make the role that platforms already have in practice more explicit. This would help to highlight best practices, create more accountability and could save significant regulatory and compliance resources in bringing relevant information together in one place. In addition, it could provide clarity for business users of platforms, who are now sometimes confronted with restrictive decisions by platforms in ways that lack transparency and oversight.
Keywords: Online platforms | Smartphones | Data protection | Privacy | Regulation | Disclosures
مقاله انگلیسی
7 Partisan selective engagement: Evidence from Facebook
تعامل انتخابی پارتیزان: شواهدی از فیس بوک-2020
This study investigates the effects of variation in “congeniality” of news on Facebook user engagement (likes, shares, and comments). We compile an original data set of Facebook posts by 84 German news outlets on politicians that were investigated for criminal offenses from January 2012 to June 2017. We also construct an index of each outlet’s media slant by comparing the language of the outlet with that of the main political parties, which allows us to measure the congeniality of the posts. We find that user engagement with congenial posts is higher than with uncongenial ones, especially in terms of likes. The within-outlet, within-topic design allows us to infer that the greater engagement with congenial news is likely driven by psychological and social factors, rather than a desire for accurate or otherwise instrumental information.
Keywords: Filter bubble | Media bias | Political immunity | Social media | Polarization
مقاله انگلیسی
8 Early warning system: From face recognition by surveillance cameras to social media analysis to detecting suspicious people
سیستم هشدار اولیه: از تشخیص چهره توسط دوربین های نظارتی گرفته تا تحلیل رسانه های اجتماعی برای تشخیص افراد مشکوک-2020
Surveillance security cameras are increasingly deployed in almost every location for monitoring purposes, including watching people and their actions for security purposes. For criminology, images collected from these cameras are usually used after an incident occurs to analyze who could be the people involved. While this usage of the cameras is important for a post crime action, there exists the need for real time monitoring to act as an early warning to prevent or avoid an incident before it occurs. In this paper, we describe the development and implementation of an early warning system that recognizes people automatically in a surveillance camera environment and then use data from various sources to identify these people and build their profile and network. The current literature is still missing a complete workflow from identifying people/criminals from a video surveillance to building a criminal information extraction framework and identifying those people and their interactions with others We train a feature extraction model for face recognition using convolutional neural networks to get a good recognition rate on the Chokepoint dataset collected using surveillance cameras. The system also provides the function to record people appearance in a location, such that unknown people passing through a scene excessive number of times (above a threshold decided by a security expert) will then be further analyzed to collect information about them. We implemented a queue based system to record people entrance. We try to avoid missing relevant individuals passing through as in some cases it is not possible to add every passing person to the queue which is maintained using some cache handling techniques. We collect and analyze information about unknown people by comparing their images from the cameras to a list of social media profiles collected from Facebook and intelligent services archives. After locating the profile of a person, traditional news and other social media platforms are crawled to collect and analyze more information about the identified person. The analyzed information is then presented to the analyst where a list of keywords and verb phrases are shown. We also construct the person’s network from individuals mentioned with him/her in the text. Further analysis will allow security experts to mark this person as a suspect or safe. This work shows that building a complete early warning system is feasible to tackle and identify criminals so that authorities can take the required actions on the spot.
Keywords: Surveillance | Security camera | Monitoring | Early warning | Social media | Intelligence service
مقاله انگلیسی
9 Mining social media data to assess the risk of skin and soft tissue infections from allergen immunotherapy
استخراج داده های رسانه های اجتماعی برای ارزیابی خطر عفونت های پوستی و بافت نرم از سیستم ایمنی آلرژن-2019
Background: Allergen immunotherapy (AIT) treatment for allergic rhinitis and asthma is used by 2.6 million Americans annually. Clinical and sterility testing studies identify no risk of contamination or infection from extracts prepared using recommended aseptic techniques, but regulatory concerns persist. Social media can be used to investigate rare adverse effects not captured by traditional studies. Objective: We sought to investigate large social media databases for suggestion of AIT skin and soft tissue infection (SSTI) risk and compare this risk to a comparator procedure with a sterile pharmaceutical. Methods: We analyzed US-restricted data from more than 10 common text-based social media platforms including Facebook, Twitter, and Reddit between 2012 and 2016. We used natural language processing (NLP) to identify posts related to AIT and, separately, influenza vaccination (comparator procedure). NLP was followed by manual review to identify posts suggesting a possible SSTI associated with either AIT or influenza vaccination. SSTI frequencies with 95% CIs were compared. Results: We identified 25,126 AIT posts, which were matched by social media platform to 25,126 influenza vaccination–related posts. NLP identified 4088 (16.3%) AIT posts that required manual review, with 6 posts (0.02%; 95% CI, 0.005%-0.043%) indicative of possible AIT-related SSTI. NLP identified 2689 (10.7%) influenza posts that required manual review, with 7 posts (0.03%; 95% CI, 0.007%-0.048%) indicative of possible influenza vaccination–related SSTI. Conclusions: Social media data suggest that SSTI from AITand influenza vaccination are equally rare events.Given that AIT’s SSTI risk appears comparable to the risk using a sterile pharmaceutical based on social media data, current aseptic technique procedures seem safe. (J Allergy Clin Immunol 2019;144:129-34.)
Key words: Informatics | NLP | infection | posts | allergen immunotherapy | preparation | aseptic | influenza | vaccination | safety | compounding | shot
مقاله انگلیسی
10 اعتیاد به شبکه های اجتماعی در روابط عاشقانه: آیا سن کاربر روی آسیب پذیری او دربرابر خیانت ناشی از شبکه های اجتماعی تاثیر دارد؟
سال انتشار: 2019 - تعداد صفحات فایل pdf انگلیسی: 4 - تعداد صفحات فایل doc فارسی: 18
استفاده اجباری از شبکه های اجتماعی انعکاس هایی را روی زندگی اجتماعی، روان شناختی، حرفه ای و فردی کاربر دارد. دسترس پذیری روشهای جایگزین عاشقانه تحت عنوان "دوستان" یک محیط بالغی را فراهم می کند که می تواند یک رابطه احساسی ویا جنسی را تسهیل کند. تعاملات آنلاین با دوستان مجازی توجه کاربران را جلب می کند و آنها را از وقت گذاشتن برای سایر امور مهم خود منحرف می کند که این کار منجر به ایجاد روابط زیان آور می شود. در این مطالعه ما رابطه بین اعتیاد به شبکه های اجتماعی و رفتارهای مرتبط با خیانت و بدعهدی را در یک نمونه ای از 365 شریک زندگی (242 زن، 123 مرد) بررسی کرده ایم. ما همچنین بررسی کرده ایم که آیا سن بر این ارتباط اثر می گذارد یا خیر. یافته ها بیانگر این هستند که اعتیاد به شبکه های اجتماعی رفتارهای مربوط به خیانت را پیش بینی می کند و سن این رابطه را وساطت می کند. این مطالعه همچنین دریافته است که سن با اعتیاد به شبکه های اجتماعی و رفتارهای خاینت و بدعهدی رابطه ای منفی دارد. روی دلالت ها و محدودیت های این مطالعه نیز بحث می شود.
مقاله ترجمه شده
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 11772 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 11772 :::::::: افراد آنلاین: 63