دانلود و نمایش مقالات مرتبط با SERS::صفحه 1
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - SERS

تعداد مقالات یافته شده: 1090
ردیف عنوان نوع
1 Data Mining Strategies for Real-Time Control in New York City
استراتژی داده کاوی برای کنترل زمان واقعی در شهر نیویورک-2105
The Data Mining System (DMS) at New York City Department of Transportation (NYCDOT) mainly consists of four database systems for traffic and pedestrian/bicycle volumes, crash data, and signal timing plans as well as the Midtown in Motion (MIM) systems which are used as part of the NYCDOT Intelligent Transportation System (ITS) infrastructure. These database and control systems are operated by different units at NYCDOT as an independent database or operation system. New York City experiences heavy traffic volumes, pedestrians and cyclists in each Central Business District (CBD) area and along key arterial systems. There are consistent and urgent needs in New York City for real-time control to improve mobility and safety for all users of the street networks, and to provide a timely response and management of random incidents. Therefore, it is necessary to develop an integrated DMS for effective real-time control and active transportation management (ATM) in New York City. This paper will present new strategies for New York City suggesting the development of efficient and cost-effective DMS, involving: 1) use of new technology applications such as tablets and smartphone with Global Positioning System (GPS) and wireless communication features for data collection and reduction; 2) interface development among existing database and control systems; and 3) integrated DMS deployment with macroscopic and mesoscopic simulation models in Manhattan. This study paper also suggests a complete data mining process for real-time control with traditional static data, current real timing data from loop detectors, microwave sensors, and video cameras, and new real-time data using the GPS data. GPS data, including using taxi and bus GPS information, and smartphone applications can be obtained in all weather conditions and during anytime of the day. GPS data and smartphone application in NYCDOT DMS is discussed herein as a new concept. © 2014 The Authors. Published by Elsevier B.V. Selection and peer-review under responsibility of Elhadi M. Shakshu Keywords: Data Mining System (DMS), New York City, real-time control, active transportation management (ATM), GPS data
مقاله انگلیسی
2 Internet of Things-enabled Passive Contact Tracing in Smart Cities
ردیابی تماس غیرفعال با قابلیت اینترنت اشیا در شهرهای هوشمند-2022
Contact tracing has been proven an essential practice during pandemic outbreaks and is a critical non-pharmaceutical intervention to reduce mortality rates. While traditional con- tact tracing approaches are gradually being replaced by peer-to-peer smartphone-based systems, the new applications tend to ignore the Internet-of-Things (IoT) ecosystem that is steadily growing in smart city environments. This work presents a contact tracing frame- work that logs smart space users’ co-existence using IoT devices as reference anchors. The design is non-intrusive as it relies on passive wireless interactions between each user’s carried equipment (e.g., smartphone, wearable, proximity card) with an IoT device by uti- lizing received signal strength indicators (RSSI). The proposed framework can log the iden- tities for the interacting pair, their estimated distance, and the overlapping time duration. Also, we propose a machine learning-based infection risk classification method to char- acterize each interaction that relies on RSSI-based attributes and contact details. Finally, the proposed contact tracing framework’s performance is evaluated through a real-world case study of actual wireless interactions between users and IoT devices through Bluetooth Low Energy advertising. The results demonstrate the system’s capability to accurately cap- ture contact between mobile users and assess their infection risk provided adequate model training over time. © 2021 Elsevier B.V. All rights reserved.
keywords: بلوتوث کم انرژی | ردیابی تماس | اینترنت اشیا | طبقه بندی خطر عفونت | Bluetooth Low Energy | Contact Tracing | Internet of Things | Infection Risk Classification
مقاله انگلیسی
3 DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage
DOPIV: برون سپاری داده مبتنی بر هویت امن پس از کوانتومی با تأیید صحت عمومی در فضای ذخیره سازی ابری-2022
Public verification enables cloud users to employ a third party auditor (TPA) to check the data integrity. However, recent breakthrough results on quantum computers indicate that applying quantum computers in clouds would be realized. A majority of existing public verification schemes are based on conventional hardness assumptions, which are vulnerable to adversaries equipped with quantum computers in the near future. Moreover, new security issues need to be solved when an original data owner is restricted or cannot access the remote cloud server flexibly. In this paper, we propose an efficient identity-based data outsourcing with public integrity verification scheme (DOPIV) in cloud storage. DOPIV is designed on lattice-based cryptography, which achieves post-quantum security. DOPIV enables an original data owner to delegate a proxy to generate the signatures of data and outsource them to the cloud server. Any TPA can perform data integrity verification efficiently on behalf of the original data owner, without retrieving the entire data set. Additionally, DOPIV possesses the advantages of being identity-based systems, avoiding complex certificate management procedures. We provide security proofs of DOPIV in the random oracle model, and conduct a comprehensive performance evaluation to show that DOPIV is more practical in post-quantum secure cloud storage systems.
Index Terms: Cloud storage | public verification | lattice-based cryptography | identity-based data outsourcing | post-quantum security
مقاله انگلیسی
4 Effects of Dynamical Decoupling and Pulse-Level Optimizations on IBM Quantum Computers
اثرات جداسازی دینامیکی و بهینه سازی سطح پالس بر روی کامپیوترهای کوانتومی IBM-2022
Currently available quantum computers are prone to errors. Circuit optimization and error mitigation methods are needed to design quantum circuits to achieve better fidelity when executed on NISQ hardware. Dynamical decoupling (DD) is generally used to suppress the decoherence error, and different DD strategies have been proposed. Moreover, the circuit fidelity can be improved by pulse-level optimization, such as creating hardware-native pulse-efficient gates. This article implements all the popular DD sequences and evaluates their performances on IBM quantum chips with different characteristics for various wellknown quantum applications. Also, we investigate combining DD with the pulse-level optimization method and apply them to QAOA to solve the max-cut problem. Based on the experimental results, we find that DD can be a benefit for only certain types of quantum algorithms, while the combination of DD and pulse-level optimization methods always has a positive impact. Finally, we provide several guidelines for users to learn how to use these noise mitigation methods to build circuits for quantum applications with high fidelity on IBM quantum computers.
INDEX TERMS: Error mitigation | noisy intermediate-scale quantum (NISQ) hardware.
مقاله انگلیسی
5 High-Stability Cryogenic System for Quantum Computing With Compact Packaged Ion Traps
سیستم برودتی با پایداری بالا برای محاسبات کوانتومی با تله های یونی بسته بندی شده فشرده-2022
Cryogenic environments benefit ion trapping experiments by offering lower motional heating rates, collision energies, and an ultrahigh vacuum (UHV) environment for maintaining long ion chains for extended periods of time. Mechanical vibrations caused by compressors in closed-cycle cryostats can introduce relative motion between the ion and the wavefronts of lasers used to manipulate the ions. Here, we present a novel ion trapping system where a commercial low-vibration closed-cycle cryostat is used in a custom monolithic enclosure. We measure mechanical vibrations of the sample stage using an optical interferometer, and observe a root-mean-square relative displacement of 2.4 nm and a peak-to-peak displacement of 17 nm between free-space beams and the trapping location. We packaged a surface ion trap in a cryopackage assembly that enables easy handling while creating a UHV environment for the ions. The trap cryopackage contains activated carbon getter material for enhanced sorption pumping near the trapping location, and source material for ablation loading. Using 171Yb+ as our ion, we estimate the operating pressure of the trap as a function of package temperature using phase transitions of zig-zag ion chains as a probe. We measured the radial mode heating rate of a single ion to be 13 quanta/s on average. The Ramsey coherence measurements yield 330-ms coherence time for counter-propagating Raman carrier transitions using a 355-nm mode-locked pulse laser, demonstrating the high optical stability.
INDEX TERMS: Optomechanical design | quantum computing | trapped ions.
مقاله انگلیسی
6 Intelligent Reflecting Surface (IRS) Allocation Scheduling Method Using Combinatorial Optimization by Quantum Computing
روش زمان‌بندی تخصیص سطح بازتابنده هوشمند (IRS) با استفاده از بهینه‌سازی ترکیبی توسط محاسبات کوانتومی-2022
Intelligent Reflecting Surface (IRS) significantly improves the energy utilization efficiency in 6th generation cellular communication systems. Here, we consider a system with multiple IRS and users, with one user communicating via several IRSs. In such a system, the user to which an IRS is assigned for each unit time must be determined to realize efficient communication. The previous studies on the optimization of various parameters for IRS based wireless systems did not consider the optimization of such IRS allocation scheduling. Therefore, we propose an IRS allocation scheduling method that limits the number of users who allocate each IRS to one unit time and sets the reflection coefficients of the IRS specifically to the assigned user resulting in the maximum IRS array gain. Additionally, as the proposed method is a combinatorial optimization problem, we develop a quadratic unconstrained binary optimization formulation to solve this using quantum computing. This will lead to the optimization of the entire system at a high speed and low power consumption in the future. Using computer simulation, we clarified that the proposed method realizes a more efficient communication compared to the method where one IRS is simultaneously used by multiple users.
INDEX TERMS: Intelligent reflecting surface | IRS allocation scheduling | quantum computing | quantum annealing | combinatorial optimization
مقاله انگلیسی
7 Parallel Time-Delay Reservoir Computing With Quantum Dot Lasers
محاسبات مخزن تاخیر زمانی موازی با لیزرهای کوانتومی-2022
A semiconductor laser with optical feedback and optical injection is an appealing scheme to construct the time-delay reservoir computing (TDRC) networks. Quantum dot (QD) lasers are compatible to the silicon platform, and hence is helpful to develop fully on-chip TDRCs. This work theoretically demonstrates a parallel TDRC based on a Fabry-Perot QD laser with multiple longitudinal modes. These modes act as connected physical neurons, which process the input signal in parallel. The interaction strength of the modes is characterized by the cross-gain saturation effect. We show that the neuron interaction strength affects the performance of various benchmark tasks, including the memory capacity, time series prediction, nonlinear channel equalization, and spoken digit recognition. In comparison with the one-channel TDRC with the same number of nodes, the parallel TDRC runs faster and its performance is improved on multiple benchmark tasks.
Index Terms: Reservoir computing | quantum dot lasers | optical neural network | optical feedback | optical injection
مقاله انگلیسی
8 الگوریتم ژنتیک چند هدفه و طرح معماری یادگیری عمیق مبتنی بر CNN برای تشخیص موثر spam
سال انتشار: 2022 - تعداد صفحات فایل pdf انگلیسی: 7 - تعداد صفحات فایل doc فارسی: 18
معمولا ایمیل به عنوان قدرتمندترین رسانه در شبکه‌های اجتماعی آنلاین در نظر گرفته می‌شود که امکان گفتگو و ارتباط آنلاین کاربران رسانه‌های اجتماعی آنلاین را با یکدیگر فراهم می کند، همچنین امکان اشتراک گذاری لینک هم وجود دارد. به ویژه، توییتر به عنوان محبوب ترین شبکه اجتماعی شناخته شده است که بهترین کانال ارتباطی برای به اشتراک گذاشتن اخبار، ایده ها، افکار، نظرات و عقاید فعلی کاربران خود با سایر کاربران رسانه های اجتماعی آنلاین است. علیرغم تلاش‌هایی که برای مبارزه با عملیات اسپم در شبکه اجتماعی آنلاین انجام شده است، اسپم توییتر دارای عملکرد جدیدی محدود به 140 کاراکتر است. این نه تنها علت اصلی آزار کاربران روزمره است، بلکه اکثر مسائل امنیتی رایانه نیز ناشی از آن است که میلیاردها دلار کاهش بهره وری هزینه را در پی دارد. در این مقاله، یک الگوریتم ژنتیک چندهدفه و یک طرح معماری یادگیری عمیق مبتنی بر CNN (MOGA-CNN-DLAS) برای فرآیند تشخیص اسپم غالب در توییتر پیشنهاد می‌کنیم. جزئیات تجربی و نتایج و بحث حاصل از MOGA-CNN-DLAS پیشنهادی از نظر دقت ، صحت، فراخوان، FScore، RMSE و MAE مورد ارزیابی قرار گرفتند. این ارزیابی با تغییر نسبت داده‌های آموزشی کاربردی از سه مجموعه داده واقعی، مانند مجموعه داده توییتر k100 و ASU انجام شد.
کلمات کلیدی: اسپم توییتر | یادگیری عمیق | شبکه عصبی پیچشی یا همگشتی (CNN) | الگوریتم ژنتیک | آنالیز رسانه های اجتماعی | تشخیص موثر اسپم
مقاله ترجمه شده
9 Resource Management for Edge Intelligence (EI)-Assisted IoV Using Quantum-Inspired Reinforcement Learning
مدیریت منابع برای IoV به کمک هوش لبه (EI) با استفاده از یادگیری تقویتی الهام گرفته از پردازش کوانتومی-2022
Recent developments in the Internet of Vehicles (IoV) enable interconnected vehicles to support ubiquitous services. Various emerging service applications are promising to increase the Quality of Experience (QoE) of users. On-board computation tasks generated by these applications have heavily overloaded the resource-constrained vehicles, forcing it to offload on-board tasks to other edge intelligence (EI)-assisted servers. However, excessive task offloading can lead to severe competition for communication and computation resources among vehicles, thereby increasing the processing latency, energy consumption, and system cost. To address these problems, we investigate the transmission-awareness and computing-sense uplink resource management problem and formulate it as a time-varying Markov decision process. Considering the total delay, energy consumption, and cost, quantum-inspired reinforcement learning (QRL) is proposed to develop an intelligence-oriented edge offloading strategy. Specifically, the vehicle can flexibly choose the network access mode and offloading strategy through two different radio interfaces to offload tasks to multiaccess edge computing (MEC) servers through WiFi and cloud servers through 5G. The objective of this joint optimization is to maintain a self-adaptive balance between these two aspects. Simulation results show that the proposed algorithm can significantly reduce the transmission latency and computation delay.
Index Terms: Cloud computing | edge intelligence (EI) | Internet of Vehicles (IoV) | multiaccess edge computing (MEC) | quantum-inspired reinforcement learning (QRL)
مقاله انگلیسی
10 Secure Social Internet of Things Based on Post-Quantum Blockchain
اینترنت اجتماعی ایمن اشیا بر اساس بلاک چین پس کوانتومی-2022
With the advancement of the application of Internet of Things (IoTs), the IoT technology is combining with the social network, forming a new network with private object information as the media and social entertainment as the purpose. Social Internet of things (SIoTs) is a new application of IoT technology in social network. The current SIoT systems are centralized and the user’s security and privacy is not properly protected. In order to address the challenges in SIoTs, we propose a privacy protection system for the users. First, we propose a post-quantum ring signature. Second, we propose a blockchain system based on the ring signature. Compared with the traditional SIoTs, our system is based on post-quantum techniques, which is secure against both traditional computers and quantum computers. The results of the blockchain system show that it is very suitable for SIoTs.
Index Terms—Social Internet of Things (SIoTs) | Internet of Things (IoTs) | Blockchain | Post-Quantum Signature.
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 5129 :::::::: بازدید دیروز: 3097 :::::::: بازدید کل: 39396 :::::::: افراد آنلاین: 51