با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
An integrated solution of software and hardware for environmental monitoring
راه حل یکپارچه نرم افزاری و سخت افزاری برای نظارت محیطی-2022 With the expansion of the Internet of Things (IoT), several monitoring solutions are available
in the market. However, most solutions use proprietary software, which is costly and do not
provide online monitoring, hampering data access and hindering preventive actions. This article
presents LimnoStation, a low-cost integrated hardware and software solution that employs IoT
concepts with LoRaWan, whose main objective is to monitor environmental and oceanographic
data from surface and submerged sensors, which can be accessed online and has low-power
consumption. Long-distance transmission tests were performed analyzing battery consumption
and readings taken by the LimnoStation sensors. The results show that the average error of
sensor readings was 0.51%, with a battery life of more than 2900 days and costing about 100
times less compared to commercial sensors. The evaluation of the LimnoStation showed that it
is viable not only for academic use, but also as a replacement for presenting lower cost, high
reliability, greater integration, and more functionality than most solutions found on the market.
Keywords: IoT | LoRaWan | LoRa | Environmental monitoring |
مقاله انگلیسی |
2 |
Automatic underground space security monitoring based on BIM
نظارت بر امنیت خودکار فضای زیرزمینی بر اساس BIM-2020 Traditional underground space safety monitoring is ineffective as data continuity is weak, systematic and
random errors are prominent, data quantification is difficult, data stability is scarce (especially in bad weather),
and it is difficult to guarantee human safety. In this study, BIM technology and multi-data wireless sensor
network transmission protocol, cloud computing platform are introduced into engineering monitoring, real-time
online monitoring equipment, cloud computing platform and other hardware and software are developed, and
corresponding online monitoring system for structural safety is developed to realize online monitoring and early
diagnosis of underground space safety. First, the shape of the underground space, the surrounding environment,
and various monitoring points are modeled using BIM. Then, the monitoring data collected from sensors at
the engineering site are transmitted to the cloud via wireless transmission. Data information management
is then realized via cloud computing, and an actual state-change trend and security assessment is provided.
Finally, 4D technology (i.e., 3D model + time axis) that leverages a deformation chromatographic nephogram
is used to facilitate managers to view deformation and safety of their underground spaces. To overcome past
shortcomings, this system supports the management of basic engineering project data and storage of historical
data. Furthermore, the system continuously reflects the fine response of each monitoring item under various
working conditions all day, which has significant theoretical value and application. Keywords: BIM technology | Deformation monitoring | Automation information | Management model |
مقاله انگلیسی |
3 |
foxBMS - free and open BMS platform focused on functional safety and AI
foxBMS - پلت فرم رایگان و باز BMS با تمرکز بر ایمنی عملکردی و هوش مصنوعی-2020 The last years have shown a strong market demand for lithium-ion battery systems with higher energy
densities, longer lifetimes, and lower costs, but at the same time without compromising safety. To help
developers, engineers and researchers worldwide, Fraunhofer IISB has established the free and open
source Battery Management System (BMS) development platform ”foxBMS”. The foxBMS platform consists
of a modular hardware and software architecture and a complete software development toolchain. Based
on the experience providing foxBMS-based solutions to customers and the research community, the next
generation of foxBMS is strongly focused on functional safety standards. The hardware architecture and
the hardware components themselves help to ensure that functional safety standards are met. Additionally,
foxBMS supports a workflow for implementing Artificial Intelligence (AI)-based battery state estimators for
the BMS. Using foxBMS as a data generator within this workflow a Neural Network (NN) based on a Long
Short-Term Memory (LSTM) is trained offline to estimate the state of charge (SOC) based on the current
and voltage measurement input. The simulation results, obtained with the trained NN running online on
the device, are shown in this paper. |
مقاله انگلیسی |
4 |
Smart vehicle forensics: Challenges and case study
وسیله نقلیه هوشمند پزشکی قانونی: چالش ها و مطالعه موردی-2020 Vehicles are fast becoming another important source of digital evidence in a criminal investigation.
Traditionally, when a vehicle is involved in a crime scene (e.g. drink driving) or a terrorist attack, the
investigators focus on the acquisition of DNA, fingerprints and other identifying materials that are usually
non digital in nature. However, modern-day cars, particularly smart or driverless cars, store a wealth
of digital information, such as recent destinations, favorite locations, routes, and personal data (e.g. call
logs, contact lists, SMS messages, pictures, and videos). In this paper, we describe some of the challenges
associated with vehicle data forensics, which is an understudied area. Next, we present our case studies
on forensic acquisition and data analysis of an entertainment system on a Volkswagen car. We also
discuss potential hardware and software solutions that can be used to acquire forensic artifacts from such
vehicles. Finally, we describe and analyze the mobile data traffic from an Audi car, a VW car and a BMW
car. Keywords: Vehicle system forensics | Data acquisition | Volkswagen car forensics | RNS-510 forensics |
مقاله انگلیسی |
5 |
A unified ecological framework for studying effects of digital places on well-being
یک چارچوب زیست محیطی یکپارچه برای مطالعه تأثیر مکان های دیجیتال بر بهزیستی-2019 Social media has greatly expanded opportunities to study place and well-being through the availability of human
expressions tagged with physical location. Such research often uses social media content to study how specific
places in the offline world influence well-being without acknowledging that digital platforms (e.g., Twitter,
Facebook, Youtube, Yelp) are designed in unique ways that structure certain types of interactions in online and
offline worlds, which can influence place-making and well-being. To expand our understanding of the mechanisms
that influence social media expressions about well-being, we describe an ecological framework of
person-place interactions that asks, “at what broad levels of interaction with digital platforms and physical
environments do effects on well-being manifest?” The person is at the centre of the ecological framework to
recognize how people define and organize both digital and physical communities and interactions. The relevance
of interactions in physical environments depends on the built and natural characteristics encountered across
modes of activity (e.g., domestic, work, study). Here, social interactions are stratified into the meso-social (e.g.,
local social norms) and micro-social (e.g., personal conversations) levels. The relevance of interactions in digital
platforms is contingent on specific hardware and software elements. Social interactions at the meso-social level
include platform norms and passive use of social media, such as observing the expressions of others, whereas
interactions at the micro-level include more active uses, like direct messaging. Digital platforms are accessed in a
physical location, and physical locations are partly experienced through online interactions; therefore, interactions
between these environments are also acknowledged. We conclude by discussing the strengths and limitations
of applying the framework to studies of place and well-being. Keywords: Place | Well-being | Social media | Conceptual framework | Social interaction |
مقاله انگلیسی |
6 |
Assessing the quantum-resistant cryptographic agility of routing and switching IT network infrastructure in a large-size financial organization
ارزیابی چابکی رمزنگاری مقاوم به کوانتومی در مسیریابی و تعویض زیرساخت های شبکه IT در یک سازمان مالی با اندازه بزرگ-2019 This paper provides exploratory research by determining the impact of quantum computing threat on modern routing and switching infrastructure components of IT network infrastructure in a large-size fi- nancial organization. We determine whether common routing and switching IT network infrastructure, including its hardware and software components, have enough cryptographic agility to accommodate the change of cryptographic algorithms to the ones that do not exhibit vulnerability to quantum computing and to the ones that are compliant with National Security Agency (NSA) Suite B set of protocols. We pinpoint upstream or downstream impacts of a change in the encryption algorithms across various IT network infrastructure components in terms of effort required to accomplish this transition. This study is among the first studies that investigate quantum-resistance cryptographic from the hard- ware perspectives of routing and switching technologies using diffusion of innovation theory. The study integrates enterprise governance to meet the challenges presented by quantum-computing with a focus on cryptographic agility. We offer an enterprise architecture framework for assessing the dependencies, costs, and benefits of IT infrastructure migration plan to meet the future challenges of quantum-resistant cryptographic. The analysis in this research can be used by IT managers to pre-plan for an upgrade of routing and switching infrastructure, assist in estimating the effort s required to perform these upgrades, and assist in selecting a vendor of routing and switching equipment from the perspective of cryptographic agility. With today’s supercomputers, a computational task involved in breaking modern asymmetric cryptographic algorithms would be infeasible due to the required computational complexity. However, with progress in the devel- opment of quantum computing technology, firms are facing an increasing risk of potential security threats to existing encrypted data and secured transmission channels as the processing power of quantum com- puters continue to increase. Keywords: Quantum-resistance | Cryptography | Routing and switching | Enterprise architecture | IT governance |
مقاله انگلیسی |
7 |
Design and leakage assessment of side channel attack resistant binary edwards Elliptic Curve digital signature algorithm architectures
طراحی و ارزیابی نشت کانالهای جانبی معماری الگوریتم امضای دیجیتالی edwards Elliptic منحنی مقاوم در برابر حمله کانال-2019 Considering that Elliptic Curve Digital Signature Algorithm (ECDSA) implementations need to be efficient, flexible and Side Channel Attack (SCA) resistant, in this paper, a design approach and architecture for ECDSA and the underlined scalar multiplication operation is proposed for GF (2 k ), satisfying the above three directives. To achieve that, in the paper, Binary Edwards Curves (BECs) are adopted as an alter- native to traditional Weierstrass Elliptic Curves (ECs) for GF (2 k ) since they offer intrinsic SCA resistance against simple attacks due to their uniformity, operation regularity and completeness. To achieve high performance and flexibility, we propose a hardware/software ECDSA codesign approach where scalar mul- tiplication is implemented in hardware and integrated in the ECDSA functionality through appropriate drivers of an ECDSA software stack. To increase BEC scalar multiplier performance and introduce SCA resistance we adopt and expand a parallelism design strategy/methodology where GF (2 k ) operations of a scalar multiplier round for both point operations performed in this round are reordered and assigned into parallelism layer in order to be executed concurrently. Within this strategy we include hardware and software based SCA countermeasures that rely on masking/randomization and hiding. While scalar randomization is realized by the ECDSA software stack in an easy way, in order to achieve resistance us- ing hardware means, we propose and introduce in every scalar multiplier round, within the parallelism layers, projective coordinates randomization of all the round’s output points. So, in our approach, con- sidering that with the proposed parallelism plan in every scalar multiplier round BEC point operations are performed in parallel and that the round’s output points are randomized with a different number in each round, we manage to achieve maximum SCA resistance. To validate this resistance, we introduce and realize a leakage assessment process on BEC scalar multipliers for the first time in research literature. This process is based on real measurements collected from a controlled SAKURA X environment with a GF (2 233 ) based scalar multiplier implementation. Using Welch’s t -test we investigate possible information leakage of the multiplier’s input point and scalar and after an extended analysis we find trivial leakage. Finally, we validate the ECDSA architecture and its scalar multiplier efficiency by implementing it on a Zynq 70 0 0 series FPGA Avnet Zedboard and collecting very promising, well balanced, results on speed and hardware resources in comparison with other works. Keywords: VLSI Design | Side channel attacks | Elliptic Curve cryptography | Hardware security |
مقاله انگلیسی |
8 |
Heart rate measurement and electrical pulse signal analysis for subjects span of 20–80 years
اندازه گیری ضربان قلب و تحلیل سیگنال پالس الکتریکی برای بازه افراد 20 تا 80 ساله-2018 The preliminary research constructs the heart beat or pulse measurement for medical science. The electrical pulse signal analysis that supports one significant clinical study. The research prototype focuses the pulse rate and analysis system which consist of hardware and software parts. The hardware uses the ATMEGA 2560 ADK R3 for processing the input optical sensors, output result to LCD, and record data into SD memory card. The software as embedded algorithm is designed for controlling the input/output parts. Research techniques are applied in term of analog to digital converter, I2C, and data grouping.
The 40 subjects are informed consent and measured with ethical research. Experimental result explains the subject behaviors with maximum/minimum pulse values, patterns, and similarity three groups. The distinctive point of medical and health science prototype is accuracy, durability, low power consumption, and cheaper price.
keywords: Heart beat |Electrical pulse analysis |ADK R3 micro-controller |Optical sensor |
مقاله انگلیسی |
9 |
Internet-of-Things and big data for smarter healthcare: From device to architecture, applications and analytics
اینترنت اشیا و داده های بزرگ برای مراقبت های بهداشتی دقیق: از دستگاه به معماری، برنامه های کاربردی و تجزیه و تحلیل-2018 The technology and healthcare industries have been deeply intertwined for quite some time. New opportunities, however, are now arising as a result
of fast-paced expansion in the areas of the Internet of Things (IoT) and Big Data. In addition, as people across the globe have begun to adopt wearable
biosensors, new applications for individualized eHealth and mHealth technologies have emerged. The upsides of these technologies are clear: they are
highly available, easily accessible, and simple to personalize; additionally they make it easy for providers to deliver individualized content cost-effectively,
at scale. At the same time, a number of hurdles currently stand in the way of truly reliable, adaptive, safe and efficient personal healthcare devices. Major
technological milestones will need to be reached in order to address and overcome those hurdles; and that will require closer collaboration between
hardware and software developers and medical personnel such as physicians, nurses, and healthcare workers. The purpose of this special issue is to
analyze the top concerns in IoT technologies that pertain to smart sensors for health care applications; particularly applications targeted at individualized
tele-health interventions with the goal of enabling healthier ways of life. These applications include wearable and body sensors, advanced pervasive
healthcare systems, and the Big Data analytics required to inform these devices.
|
مقاله انگلیسی |
10 |
Design and implementation of an omnidirectional vision system for robot perception
طراحی و پیاده سازی یک سیستم چشم انداز چند منظوره برای درک ربات-2017 Article history:Received 30 December 2015Revised 21 October 2016Accepted 20 November 2016Available online 7 December 2016Keywords:Robotics Mechatronic systemOmnidirectional vision Stereo visionTo meet the demand of surrounding detection of a humanoid robot, we developed an omnidirectional vision system for robot perception (OVROP) with 5 Degrees of Freedom (DOFs). OVROP has a modu- lar design and mainly consists of three parts: hardware, control architecture and visual processing part (omnidirectional vision and stereovision). As OVROP is equipped with universal hardware and software interfaces it can be applied to various types of robots. Our performance evaluation proves that OVROP can accurately detect and track an object with 360° field of view (FOV). Besides, undistorted omnidirectional perception of surroundings can be achieved through calibrations of both monocular and stereo cameras. Furthermore, our preliminary experimental results show that OVROP can perceive a desired object within 160 ms in most cases. As a result, OVROP can provide detailed information on surrounding environment for full-scope and real-time robot perception.© 2016 Elsevier Ltd. All rights reserved. Keywords: Robotics | Mechatronic system | Omnidirectional vision | Stereo vision |
مقاله انگلیسی |