دانلود و نمایش مقالات مرتبط با Hardware and software::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Hardware and software

تعداد مقالات یافته شده: 23
ردیف عنوان نوع
1 An integrated solution of software and hardware for environmental monitoring
راه حل یکپارچه نرم افزاری و سخت افزاری برای نظارت محیطی-2022
With the expansion of the Internet of Things (IoT), several monitoring solutions are available in the market. However, most solutions use proprietary software, which is costly and do not provide online monitoring, hampering data access and hindering preventive actions. This article presents LimnoStation, a low-cost integrated hardware and software solution that employs IoT concepts with LoRaWan, whose main objective is to monitor environmental and oceanographic data from surface and submerged sensors, which can be accessed online and has low-power consumption. Long-distance transmission tests were performed analyzing battery consumption and readings taken by the LimnoStation sensors. The results show that the average error of sensor readings was 0.51%, with a battery life of more than 2900 days and costing about 100 times less compared to commercial sensors. The evaluation of the LimnoStation showed that it is viable not only for academic use, but also as a replacement for presenting lower cost, high reliability, greater integration, and more functionality than most solutions found on the market.
Keywords: IoT | LoRaWan | LoRa | Environmental monitoring
مقاله انگلیسی
2 Automatic underground space security monitoring based on BIM
نظارت بر امنیت خودکار فضای زیرزمینی بر اساس BIM-2020
Traditional underground space safety monitoring is ineffective as data continuity is weak, systematic and random errors are prominent, data quantification is difficult, data stability is scarce (especially in bad weather), and it is difficult to guarantee human safety. In this study, BIM technology and multi-data wireless sensor network transmission protocol, cloud computing platform are introduced into engineering monitoring, real-time online monitoring equipment, cloud computing platform and other hardware and software are developed, and corresponding online monitoring system for structural safety is developed to realize online monitoring and early diagnosis of underground space safety. First, the shape of the underground space, the surrounding environment, and various monitoring points are modeled using BIM. Then, the monitoring data collected from sensors at the engineering site are transmitted to the cloud via wireless transmission. Data information management is then realized via cloud computing, and an actual state-change trend and security assessment is provided. Finally, 4D technology (i.e., 3D model + time axis) that leverages a deformation chromatographic nephogram is used to facilitate managers to view deformation and safety of their underground spaces. To overcome past shortcomings, this system supports the management of basic engineering project data and storage of historical data. Furthermore, the system continuously reflects the fine response of each monitoring item under various working conditions all day, which has significant theoretical value and application.
Keywords: BIM technology | Deformation monitoring | Automation information | Management model
مقاله انگلیسی
3 foxBMS - free and open BMS platform focused on functional safety and AI
foxBMS - پلت فرم رایگان و باز BMS با تمرکز بر ایمنی عملکردی و هوش مصنوعی-2020
The last years have shown a strong market demand for lithium-ion battery systems with higher energy densities, longer lifetimes, and lower costs, but at the same time without compromising safety. To help developers, engineers and researchers worldwide, Fraunhofer IISB has established the free and open source Battery Management System (BMS) development platform ”foxBMS”. The foxBMS platform consists of a modular hardware and software architecture and a complete software development toolchain. Based on the experience providing foxBMS-based solutions to customers and the research community, the next generation of foxBMS is strongly focused on functional safety standards. The hardware architecture and the hardware components themselves help to ensure that functional safety standards are met. Additionally, foxBMS supports a workflow for implementing Artificial Intelligence (AI)-based battery state estimators for the BMS. Using foxBMS as a data generator within this workflow a Neural Network (NN) based on a Long Short-Term Memory (LSTM) is trained offline to estimate the state of charge (SOC) based on the current and voltage measurement input. The simulation results, obtained with the trained NN running online on the device, are shown in this paper.
مقاله انگلیسی
4 Smart vehicle forensics: Challenges and case study
وسیله نقلیه هوشمند پزشکی قانونی: چالش ها و مطالعه موردی-2020
Vehicles are fast becoming another important source of digital evidence in a criminal investigation. Traditionally, when a vehicle is involved in a crime scene (e.g. drink driving) or a terrorist attack, the investigators focus on the acquisition of DNA, fingerprints and other identifying materials that are usually non digital in nature. However, modern-day cars, particularly smart or driverless cars, store a wealth of digital information, such as recent destinations, favorite locations, routes, and personal data (e.g. call logs, contact lists, SMS messages, pictures, and videos). In this paper, we describe some of the challenges associated with vehicle data forensics, which is an understudied area. Next, we present our case studies on forensic acquisition and data analysis of an entertainment system on a Volkswagen car. We also discuss potential hardware and software solutions that can be used to acquire forensic artifacts from such vehicles. Finally, we describe and analyze the mobile data traffic from an Audi car, a VW car and a BMW car.
Keywords: Vehicle system forensics | Data acquisition | Volkswagen car forensics | RNS-510 forensics
مقاله انگلیسی
5 A unified ecological framework for studying effects of digital places on well-being
یک چارچوب زیست محیطی یکپارچه برای مطالعه تأثیر مکان های دیجیتال بر بهزیستی-2019
Social media has greatly expanded opportunities to study place and well-being through the availability of human expressions tagged with physical location. Such research often uses social media content to study how specific places in the offline world influence well-being without acknowledging that digital platforms (e.g., Twitter, Facebook, Youtube, Yelp) are designed in unique ways that structure certain types of interactions in online and offline worlds, which can influence place-making and well-being. To expand our understanding of the mechanisms that influence social media expressions about well-being, we describe an ecological framework of person-place interactions that asks, “at what broad levels of interaction with digital platforms and physical environments do effects on well-being manifest?” The person is at the centre of the ecological framework to recognize how people define and organize both digital and physical communities and interactions. The relevance of interactions in physical environments depends on the built and natural characteristics encountered across modes of activity (e.g., domestic, work, study). Here, social interactions are stratified into the meso-social (e.g., local social norms) and micro-social (e.g., personal conversations) levels. The relevance of interactions in digital platforms is contingent on specific hardware and software elements. Social interactions at the meso-social level include platform norms and passive use of social media, such as observing the expressions of others, whereas interactions at the micro-level include more active uses, like direct messaging. Digital platforms are accessed in a physical location, and physical locations are partly experienced through online interactions; therefore, interactions between these environments are also acknowledged. We conclude by discussing the strengths and limitations of applying the framework to studies of place and well-being.
Keywords: Place | Well-being | Social media | Conceptual framework | Social interaction
مقاله انگلیسی
6 Assessing the quantum-resistant cryptographic agility of routing and switching IT network infrastructure in a large-size financial organization
ارزیابی چابکی رمزنگاری مقاوم به کوانتومی در مسیریابی و تعویض زیرساخت های شبکه IT در یک سازمان مالی با اندازه بزرگ-2019
This paper provides exploratory research by determining the impact of quantum computing threat on modern routing and switching infrastructure components of IT network infrastructure in a large-size fi- nancial organization. We determine whether common routing and switching IT network infrastructure, including its hardware and software components, have enough cryptographic agility to accommodate the change of cryptographic algorithms to the ones that do not exhibit vulnerability to quantum computing and to the ones that are compliant with National Security Agency (NSA) Suite B set of protocols. We pinpoint upstream or downstream impacts of a change in the encryption algorithms across various IT network infrastructure components in terms of effort required to accomplish this transition. This study is among the first studies that investigate quantum-resistance cryptographic from the hard- ware perspectives of routing and switching technologies using diffusion of innovation theory. The study integrates enterprise governance to meet the challenges presented by quantum-computing with a focus on cryptographic agility. We offer an enterprise architecture framework for assessing the dependencies, costs, and benefits of IT infrastructure migration plan to meet the future challenges of quantum-resistant cryptographic. The analysis in this research can be used by IT managers to pre-plan for an upgrade of routing and switching infrastructure, assist in estimating the effort s required to perform these upgrades, and assist in selecting a vendor of routing and switching equipment from the perspective of cryptographic agility. With today’s supercomputers, a computational task involved in breaking modern asymmetric cryptographic algorithms would be infeasible due to the required computational complexity. However, with progress in the devel- opment of quantum computing technology, firms are facing an increasing risk of potential security threats to existing encrypted data and secured transmission channels as the processing power of quantum com- puters continue to increase.
Keywords: Quantum-resistance | Cryptography | Routing and switching | Enterprise architecture | IT governance
مقاله انگلیسی
7 Design and leakage assessment of side channel attack resistant binary edwards Elliptic Curve digital signature algorithm architectures
طراحی و ارزیابی نشت کانالهای جانبی معماری الگوریتم امضای دیجیتالی edwards Elliptic منحنی مقاوم در برابر حمله کانال-2019
Considering that Elliptic Curve Digital Signature Algorithm (ECDSA) implementations need to be efficient, flexible and Side Channel Attack (SCA) resistant, in this paper, a design approach and architecture for ECDSA and the underlined scalar multiplication operation is proposed for GF (2 k ), satisfying the above three directives. To achieve that, in the paper, Binary Edwards Curves (BECs) are adopted as an alter- native to traditional Weierstrass Elliptic Curves (ECs) for GF (2 k ) since they offer intrinsic SCA resistance against simple attacks due to their uniformity, operation regularity and completeness. To achieve high performance and flexibility, we propose a hardware/software ECDSA codesign approach where scalar mul- tiplication is implemented in hardware and integrated in the ECDSA functionality through appropriate drivers of an ECDSA software stack. To increase BEC scalar multiplier performance and introduce SCA resistance we adopt and expand a parallelism design strategy/methodology where GF (2 k ) operations of a scalar multiplier round for both point operations performed in this round are reordered and assigned into parallelism layer in order to be executed concurrently. Within this strategy we include hardware and software based SCA countermeasures that rely on masking/randomization and hiding. While scalar randomization is realized by the ECDSA software stack in an easy way, in order to achieve resistance us- ing hardware means, we propose and introduce in every scalar multiplier round, within the parallelism layers, projective coordinates randomization of all the round’s output points. So, in our approach, con- sidering that with the proposed parallelism plan in every scalar multiplier round BEC point operations are performed in parallel and that the round’s output points are randomized with a different number in each round, we manage to achieve maximum SCA resistance. To validate this resistance, we introduce and realize a leakage assessment process on BEC scalar multipliers for the first time in research literature. This process is based on real measurements collected from a controlled SAKURA X environment with a GF (2 233 ) based scalar multiplier implementation. Using Welch’s t -test we investigate possible information leakage of the multiplier’s input point and scalar and after an extended analysis we find trivial leakage. Finally, we validate the ECDSA architecture and its scalar multiplier efficiency by implementing it on a Zynq 70 0 0 series FPGA Avnet Zedboard and collecting very promising, well balanced, results on speed and hardware resources in comparison with other works.
Keywords: VLSI Design | Side channel attacks | Elliptic Curve cryptography | Hardware security
مقاله انگلیسی
8 Heart rate measurement and electrical pulse signal analysis for subjects span of 20–80 years
اندازه گیری ضربان قلب و تحلیل سیگنال پالس الکتریکی برای بازه افراد 20 تا 80 ساله-2018
The preliminary research constructs the heart beat or pulse measurement for medical science. The electrical pulse signal analysis that supports one significant clinical study. The research prototype focuses the pulse rate and analysis system which consist of hardware and software parts. The hardware uses the ATMEGA 2560 ADK R3 for processing the input optical sensors, output result to LCD, and record data into SD memory card. The software as embedded algorithm is designed for controlling the input/output parts. Research techniques are applied in term of analog to digital converter, I2C, and data grouping. The 40 subjects are informed consent and measured with ethical research. Experimental result explains the subject behaviors with maximum/minimum pulse values, patterns, and similarity three groups. The distinctive point of medical and health science prototype is accuracy, durability, low power consumption, and cheaper price.
keywords: Heart beat |Electrical pulse analysis |ADK R3 micro-controller |Optical sensor
مقاله انگلیسی
9 Internet-of-Things and big data for smarter healthcare: From device to architecture, applications and analytics
اینترنت اشیا و داده های بزرگ برای مراقبت های بهداشتی دقیق: از دستگاه به معماری، برنامه های کاربردی و تجزیه و تحلیل-2018
The technology and healthcare industries have been deeply intertwined for quite some time. New opportunities, however, are now arising as a result of fast-paced expansion in the areas of the Internet of Things (IoT) and Big Data. In addition, as people across the globe have begun to adopt wearable biosensors, new applications for individualized eHealth and mHealth technologies have emerged. The upsides of these technologies are clear: they are highly available, easily accessible, and simple to personalize; additionally they make it easy for providers to deliver individualized content cost-effectively, at scale. At the same time, a number of hurdles currently stand in the way of truly reliable, adaptive, safe and efficient personal healthcare devices. Major technological milestones will need to be reached in order to address and overcome those hurdles; and that will require closer collaboration between hardware and software developers and medical personnel such as physicians, nurses, and healthcare workers. The purpose of this special issue is to analyze the top concerns in IoT technologies that pertain to smart sensors for health care applications; particularly applications targeted at individualized tele-health interventions with the goal of enabling healthier ways of life. These applications include wearable and body sensors, advanced pervasive healthcare systems, and the Big Data analytics required to inform these devices.
مقاله انگلیسی
10 Design and implementation of an omnidirectional vision system for robot perception
طراحی و پیاده سازی یک سیستم چشم انداز چند منظوره برای درک ربات-2017
Article history:Received 30 December 2015Revised 21 October 2016Accepted 20 November 2016Available online 7 December 2016Keywords:Robotics Mechatronic systemOmnidirectional vision Stereo visionTo meet the demand of surrounding detection of a humanoid robot, we developed an omnidirectional vision system for robot perception (OVROP) with 5 Degrees of Freedom (DOFs). OVROP has a modu- lar design and mainly consists of three parts: hardware, control architecture and visual processing part (omnidirectional vision and stereovision). As OVROP is equipped with universal hardware and software interfaces it can be applied to various types of robots. Our performance evaluation proves that OVROP can accurately detect and track an object with 360° field of view (FOV). Besides, undistorted omnidirectional perception of surroundings can be achieved through calibrations of both monocular and stereo cameras. Furthermore, our preliminary experimental results show that OVROP can perceive a desired object within 160 ms in most cases. As a result, OVROP can provide detailed information on surrounding environment for full-scope and real-time robot perception.© 2016 Elsevier Ltd. All rights reserved.
Keywords: Robotics | Mechatronic system | Omnidirectional vision | Stereo vision
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 352 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 352 :::::::: افراد آنلاین: 71