دانلود و نمایش مقالات مرتبط با SON::صفحه 1
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - SON

تعداد مقالات یافته شده: 3390
ردیف عنوان نوع
1 IoT architecture for continuous long term monitoring: Parkinson’s Disease case study
معماری اینترنت اشیا برای نظارت طولانی مدت مداوم: مطالعه موردی بیماری پارکینسون-2022
In recent years, technological advancements and the strengthening of the Internet of Things concepts have led to significant improvements in the technology infrastructures for remote monitoring. This includes telemedicine which is the ensemble of technologies and tools involved in medical services, from consultations, to diagnosis, prescriptions, treatment and patient monitoring, all done remotely via an Internet connection.
Developing a telemedicine framework capable of monitoring patients over a continuous long-term monitoring window may encounter various issues related to the battery life of the device or the accuracy of the retrieved data. Moreover, it is crucial to develop an IoT architecture that is adaptable to various scenarios and the ongoing changes of the application scenario under analysis.
In this work, we present an IoT architecture for continuous long-term monitoring of patients. Furthermore, as a real scenario case study, we adapt our IoT architecture for Parkinson’s Disease management, building up the PDRMA (Parkinson’s disease remote monitoring architecture). Performance analysis for optimal operation with respect to temperature and daily battery life is conducted. Finally, a multi-parameter app for the continuous monitoring of Parkinson’s patients is presented.
keywords: IoT | Telemedicine | Continuous long term monitoring | Parkinson’s disease | e-Health
مقاله انگلیسی
2 IoT-based Prediction Models in the Environmental Context: A Systematic Literature Review
مدل‌های پیش‌بینی مبتنی بر اینترنت اشیا در زمینه محیطی: مروری بر ادبیات سیستماتیک-2022
Undoubtedly, during the last years climate change has alerted the research community of the natural environment sector. Furthermore, the advent of Internet of Things (IoT) paradigm has enhanced the research activity in the environmental field offering low-cost sensors. Moreover, artificial intelligence and more specifically, statistical and machine learning methodologies have proved their predictive power in many disciplines and various real-world problems. As a result of the aforementioned, many scientists of the environmental research field have performed prediction models exploiting the strength of IoT data. Hence, insightful information could be extracted from the review of these research works and for this reason, a Systematic Literature Review (SLR) is introduced in the present manuscript in order to summarize the recent studies of the field under specific rules and constraints. From the SLR, 54 primary studies have been extracted during 2017-2021. The analysis showed that many IoT-based prediction models have been applied the previous years in 10 different environmental issues, presenting in the majority of the primary studies promising results.
keywords: Natural Environment | Internet of Things | Prediction Models | Systematic Literature Review
مقاله انگلیسی
3 Discriminating Quantum States in the Presence of a Deutschian CTC: A Simulation Analysis
حالت های کوانتومی متمایز در حضور CTC Deutschian: یک تحلیل شبیه سازی-2022
In an article published in 2009, Brun et al. proved that in the presence of a “Deutschian” closed timelike curve, one can map K distinct nonorthogonal states (hereafter, input set) to the standard orthonormal basis of a K-dimensional state space. To implement this result, the authors proposed a quantum circuit that includes, among SWAP gates, a fixed set of controlled operators (boxes) and an algorithm for determining the unitary transformations carried out by such boxes. To our knowledge, what is still missing to complete the picture is an analysis evaluating the performance of the aforementioned circuit from an engineering perspective. The objective of this article is, therefore, to address this gap through an in-depth simulation analysis, which exploits the approach proposed by Brun et al. in 2017. This approach relies on multiple copies of an input state, multiple iterations of the circuit until a fixed point is (almost) reached. The performance analysis led us to a number of findings. First, the number of iterations is significantly high even if the number of states to be discriminated against is small, such as 2 or 3. Second, we envision that such a number may be shortened as there is plenty of room to improve the unitary transformation acting in the aforementioned controlled boxes. Third, we also revealed a relationship between the number of iterations required to get close to the fixed point and the Chernoff limit of the input set used: the higher the Chernoff bound, the smaller the number of iterations. A comparison, although partial, with another quantum circuit discriminating the nonorthogonal states, proposed by Nareddula et al. in 2018, is carried out and differences are highlighted.
INDEX TERMS: Benchmarking and performance characterization | classical simulation of quantum systems.
مقاله انگلیسی
4 iRestroom : A smart restroom cyberinfrastructure for elderly people
iRestroom: زیرساخت سایبری سرویس بهداشتی هوشمند برای افراد مسن-2022
According to a report by UN and WHO, by 2030 the number of senior people (age over 65) is projected to grow up to 1.4 billion, and which is nearly 16.5% of the global population. Seniors who live alone must have their health state closely monitored to avoid unexpected events (such as a fall). This study explains the underlying principles, methodology, and research that went into developing the concept, as well as the need for and scopes of a restroom cyberinfrastructure system, that we call as iRestroom to assess the frailty of elderly people for them to live a comfortable, independent, and secure life at home. The proposed restroom idea is based on the required situations, which are determined by user study, socio-cultural and technological trends, and user requirements. The iRestroom is designed as a multi-sensory place with interconnected devices where carriers of older persons can access interactive material and services throughout their everyday activities. The prototype is then tested at Texas A&M University-Kingsville. A Nave Bayes classifier is utilized to anticipate the locations of the sensors, which serves to provide a constantly updated reference for the data originating from numerous sensors and devices installed in different locations throughout the restroom. A small sample of pilot data was obtained, as well as pertinent web data. The Institutional Review Board (IRB) has approved all the methods.
keywords: اینترنت اشیا | حسگرها | نگهداری از سالمندان | سیستم های هوشمند | یادگیری ماشین | IoT | Sensors | Elder Care | Smart Systems | Machine Learning
مقاله انگلیسی
5 Moving towards intelligent telemedicine: Computer vision measurement of human movement
حرکت به سمت پزشکی از راه دور هوشمند: اندازه گیری بینایی کامپیوتری حرکت انسان-2022
Background: Telemedicine video consultations are rapidly increasing globally, accelerated by the COVID- 19 pandemic. This presents opportunities to use computer vision technologies to augment clinician visual judgement because video cameras are so ubiquitous in personal devices and new techniques, such as DeepLabCut (DLC) can precisely measure human movement from smartphone videos. However, the accuracy of DLC to track human movements in videos obtained from laptop cameras, which have a much lower FPS, has never been investigated; this is a critical gap because patients use laptops for most telemedicine consultations. Objectives: To determine the validity and reliability of DLC applied to laptop videos to measure finger tapping, a validated test of human movement. Method: Sixteen adults completed finger-tapping tests at 0.5 Hz, 1 Hz, 2 Hz, 3 Hz and at maximal speed. Hand movements were recorded simultaneously by a laptop camera at 30 frames per second (FPS) and by Optotrak, a 3D motion analysis system at 250 FPS. Eight DLC neural network architectures (ResNet50, ResNet101, ResNet152, MobileNetV1, MobileNetV2, EfficientNetB0, EfficientNetB3, EfficientNetB6) were applied to the laptop video and extracted movement features were compared to the ground truth Optotrak motion tracking. Results: Over 96% (529/552) of DLC measures were within +∕−0.5 Hz of the Optotrak measures. At tapping frequencies >4 Hz, there was progressive decline in accuracy, attributed to motion blur associated with the laptop camera’s low FPS. Computer vision methods hold potential for moving us towards intelligent telemedicine by providing human movement analysis during consultations. However, further developments are required to accurately measure the fastest movements.
keywords: پزشکی از راه دور | ضربه زدن با انگشت | موتور کنترل | کامپیوتری | Telemedicine | DeepLabCut | Finger tapping | Motor control | Computer vision
مقاله انگلیسی
6 The physical and mechanical properties for flexible biomass particles using computer vision
خواص فیزیکی و مکانیکی ذرات زیست توده انعطاف پذیر با استفاده از بینایی کامپیوتری-2022
The combustion and fluidization behavior of biomass depend on the physical properties (size, morphology, and density) and mechanical performances (elastic modulus, Poisson’s ratio, tensile strength and failure strain), but their quantitative models have rarely been focused in previous researchers. Hence, a static image measurement for particle physical properties is studied. Combining the uniaxial tension and digital image correlation tech- nology, the dynamic image measurement method for the mechanical properties is proposed. The results indicate that the average roundness, rectangularity, and sphericity of present biomass particles are 0.2, 0.4, and 0.16, respectively. The equivalent diameter and density obey the skewed normal distribution. The tensile strength and failure stress are sensitive to stretching rate, fiber size and orientation. The distribution intervals of elastic modulus and Poisson’s ratio are 30–600 MPa and 0.25–0.307, respectively. The stress–strain curves obtained from imaging experiments agree well with the result of finite element method. This study provides the operating parameters for the numerical simulation of particles in the fluidized bed and combustor. Furthermore, the computer vision measurement method can be extended to the investigations of fossil fuels.
keywords: ذرات زیست توده | مشخصات فیزیکی | اجرای مکانیکی | تست کشش | آزمایش تصویربرداری | بینایی کامپیوتر | Biomass particle | Physical properties | Mechanical performances | Tensile testing | Imaging experiment | Computer vision
مقاله انگلیسی
7 Efficient Hardware Implementation of Finite Field Arithmetic AB + C for Binary Ring-LWE Based Post-Quantum Cryptography
اجرای سخت افزار کارآمد محاسبات میدان محدود AB + C برای رمزنگاری پس کوانتومی مبتنی بر حلقه باینری-LWE-2022
Post-quantum cryptography (PQC) has gained significant attention from the community recently as it is proven that the existing public-key cryptosystems are vulnerable to the attacks launched from the well-developed quantum computers. The finite field arithmetic AB þ C, where A and C are integer polynomials and B is a binary polynomial, is the key component for the binary Ring-learning-with-errors (BRLWE)- based encryption scheme (a low-complexity PQC suitable for emerging lightweight applications). In this paper, we propose a novel hardware implementation of the finite field arithmetic AB þ C through three stages of interdependent efforts: (i) a rigorous mathematical formulation process is presented first; (ii) an efficient hardware architecture is then presented with detailed description; (iii) a thorough implementation has also been given along with the comparison. Overall, (i) the proposed basic structure (u ¼ 1) outperforms the existing designs, e.g., it involves 55.9% less area-delay product (ADP) than [13] for n ¼ 512; (ii) the proposed design also offers very efficient performance in time-complexity and can be used in many future applications.
INDEX TERMS: Binary ring-learning-with-errors | finite field arithmetic | FPGA platform | hardware design | post-quantum cryptography
مقاله انگلیسی
8 Tracking the northern seasonal cap retreat of mars using computer vision
ردیابی عقب نشینی کلاهک فصلی شمالی مریخ با استفاده از بینایی کامپیوتر-2022
Using polar stereographic images from the Mars Color Imager (MARCI), we use Python to autonomously track the Northern Polar Seasonal Cap (NPSC) recession from Mars Years (MY) 29 to MY 35 between Ls = 10° and Ls = 70°. We outline the cap and find an ellipse of best fit. We then compare our results to previously published recession rates, that were manually tracked, and find them to be consistent. Our process benefits from being automated, which increases the speed of tracking and allows us to monitor the recession with higher Ls fidelity than past studies. We find that most MYs have a local minimum recession rate at Ls = ~32° and a local maximum at Ls = ~51°. We also find that MY 30 experiences a rapid latitude increasing event that involves ~1° Ls of a rapid increase and ~5° Ls of slower recession, which then increases above the interannual average rate. We interpret this to be the result of a major sublimation driven by off-polar winds. We also discover divergent effects in the recession and size of the NPSC following the MY 28 and MY 35 global dust storms. MY 29’s cap is significantly smaller and retreats slower than the multi-year average, whereas MY 35’s cap is slighter larger and retreats very close to the average. We hypothesize that the diverging behavior of the caps in post-storm years can be a result of the differences in the date of onset and the duration of the storms.
مقاله انگلیسی
9 Entropic Proofs of Singleton Bounds for Quantum Error-Correcting Codes
اثبات های آنتروپیک کرانه های سینگلتون برای کدهای تصحیح خطای کوانتومی-2022
We show that a relatively simple reasoning using von Neumann entropy inequalities yields a robust proof of the quantum Singleton bound for quantum error-correcting codes (QECC). For entanglement-assisted quantum error-correcting codes (EAQECC) and catalytic codes (CQECC), a type of generalized quantum Singleton bound [Brun et al., IEEE Trans. Inf. Theory 60(6):3073–3089 (2014)] was believed to hold for many years until recently one of us found a counterexample [MG, Phys. Rev. A 103, 020601 (2021)]. Here, we rectify this state of affairs by proving the correct generalized quantum Singleton bound, extending the above-mentioned proof method for QECC; we also prove information-theoretically tight bounds on the entanglement-communication tradeoff for EAQECC. All of the bounds relate block length n and code length k for given minimum distance d and we show that they are robust, in the sense that they hold with small perturbations for codes which only correct most of the erasure errors of less than d letters. In contrast to the classical case, the bounds take on qualitatively different forms depending on whether the minimum distance is smaller or larger than half the block length. We also provide a propagation rule: any pure QECC yields an EAQECC with the same distance and dimension, but of shorter block length.
Index Terms: Quantum codes | quantum entanglement | singleton bound.
مقاله انگلیسی
10 A survey on adversarial attacks in computer vision: Taxonomy, visualization and future directions
بررسی حملات خصمانه در بینایی کامپیوتر: طبقه بندی، تجسم و جهت گیری های آینده-2022
Deep learning has been widely applied in various fields such as computer vision, natural language pro- cessing, and data mining. Although deep learning has achieved significant success in solving complex problems, it has been shown that deep neural networks are vulnerable to adversarial attacks, result- ing in models that fail to perform their tasks properly, which limits the application of deep learning in security-critical areas. In this paper, we first review some of the classical and latest representative adversarial attacks based on a reasonable taxonomy of adversarial attacks. Then, we construct a knowl- edge graph based on the citation relationship relying on the software VOSviewer, visualize and analyze the subject development in this field based on the information of 5923 articles from Scopus. In the end, possible research directions for the development about adversarial attacks are proposed based on the trends deduced by keywords detection analysis. All the data used for visualization are available at: https://github.com/NanyunLengmu/Adversarial- Attack- Visualization .
keywords: یادگیری عمیق | حمله خصمانه | حمله جعبه سیاه | حمله به جعبه سفید | نیرومندی | تجزیه و تحلیل تجسم | Deep learning | Adversarial attack | Black-box attack | White-box attack | Robustness | Visualization analysis
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 7552 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 7552 :::::::: افراد آنلاین: 76