با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
IoT architecture for continuous long term monitoring: Parkinson’s Disease case study
معماری اینترنت اشیا برای نظارت طولانی مدت مداوم: مطالعه موردی بیماری پارکینسون-2022 In recent years, technological advancements and the strengthening of the Internet of Things
concepts have led to significant improvements in the technology infrastructures for remote
monitoring. This includes telemedicine which is the ensemble of technologies and tools involved
in medical services, from consultations, to diagnosis, prescriptions, treatment and patient
monitoring, all done remotely via an Internet connection.
Developing a telemedicine framework capable of monitoring patients over a continuous long-term monitoring window may encounter various issues related to the battery life of the device or the accuracy of the retrieved data. Moreover, it is crucial to develop an IoT architecture that is adaptable to various scenarios and the ongoing changes of the application scenario under analysis. In this work, we present an IoT architecture for continuous long-term monitoring of patients. Furthermore, as a real scenario case study, we adapt our IoT architecture for Parkinson’s Disease management, building up the PDRMA (Parkinson’s disease remote monitoring architecture). Performance analysis for optimal operation with respect to temperature and daily battery life is conducted. Finally, a multi-parameter app for the continuous monitoring of Parkinson’s patients is presented. keywords: IoT | Telemedicine | Continuous long term monitoring | Parkinson’s disease | e-Health |
مقاله انگلیسی |
2 |
IoT-based Prediction Models in the Environmental Context: A Systematic Literature Review
مدلهای پیشبینی مبتنی بر اینترنت اشیا در زمینه محیطی: مروری بر ادبیات سیستماتیک-2022 Undoubtedly, during the last years climate change has alerted the research community of the natural environment sector. Furthermore, the advent of Internet of Things (IoT) paradigm has enhanced the research activity in the environmental field offering low-cost sensors. Moreover, artificial
intelligence and more specifically, statistical and machine learning methodologies have proved their predictive power in many disciplines and various
real-world problems. As a result of the aforementioned, many scientists of
the environmental research field have performed prediction models exploiting
the strength of IoT data. Hence, insightful information could be extracted
from the review of these research works and for this reason, a Systematic
Literature Review (SLR) is introduced in the present manuscript in order to
summarize the recent studies of the field under specific rules and constraints.
From the SLR, 54 primary studies have been extracted during 2017-2021.
The analysis showed that many IoT-based prediction models have been applied the previous years in 10 different environmental issues, presenting in
the majority of the primary studies promising results.
keywords: Natural Environment | Internet of Things | Prediction Models | Systematic Literature Review |
مقاله انگلیسی |
3 |
Discriminating Quantum States in the Presence of a Deutschian CTC: A Simulation Analysis
حالت های کوانتومی متمایز در حضور CTC Deutschian: یک تحلیل شبیه سازی-2022 In an article published in 2009, Brun et al. proved that in the presence of a “Deutschian”
closed timelike curve, one can map K distinct nonorthogonal states (hereafter, input set) to the standard
orthonormal basis of a K-dimensional state space. To implement this result, the authors proposed a quantum
circuit that includes, among SWAP gates, a fixed set of controlled operators (boxes) and an algorithm for
determining the unitary transformations carried out by such boxes. To our knowledge, what is still missing
to complete the picture is an analysis evaluating the performance of the aforementioned circuit from an
engineering perspective. The objective of this article is, therefore, to address this gap through an in-depth
simulation analysis, which exploits the approach proposed by Brun et al. in 2017. This approach relies on
multiple copies of an input state, multiple iterations of the circuit until a fixed point is (almost) reached. The
performance analysis led us to a number of findings. First, the number of iterations is significantly high even
if the number of states to be discriminated against is small, such as 2 or 3. Second, we envision that such
a number may be shortened as there is plenty of room to improve the unitary transformation acting in the
aforementioned controlled boxes. Third, we also revealed a relationship between the number of iterations
required to get close to the fixed point and the Chernoff limit of the input set used: the higher the Chernoff
bound, the smaller the number of iterations. A comparison, although partial, with another quantum circuit
discriminating the nonorthogonal states, proposed by Nareddula et al. in 2018, is carried out and differences
are highlighted.
INDEX TERMS: Benchmarking and performance characterization | classical simulation of quantum systems. |
مقاله انگلیسی |
4 |
iRestroom : A smart restroom cyberinfrastructure for elderly people
iRestroom: زیرساخت سایبری سرویس بهداشتی هوشمند برای افراد مسن-2022 According to a report by UN and WHO, by 2030 the number of senior people (age over 65) is
projected to grow up to 1.4 billion, and which is nearly 16.5% of the global population. Seniors
who live alone must have their health state closely monitored to avoid unexpected events (such as
a fall). This study explains the underlying principles, methodology, and research that went into
developing the concept, as well as the need for and scopes of a restroom cyberinfrastructure
system, that we call as iRestroom to assess the frailty of elderly people for them to live a
comfortable, independent, and secure life at home. The proposed restroom idea is based on the
required situations, which are determined by user study, socio-cultural and technological trends,
and user requirements. The iRestroom is designed as a multi-sensory place with interconnected
devices where carriers of older persons can access interactive material and services throughout
their everyday activities. The prototype is then tested at Texas A&M University-Kingsville. A Nave
Bayes classifier is utilized to anticipate the locations of the sensors, which serves to provide a
constantly updated reference for the data originating from numerous sensors and devices installed
in different locations throughout the restroom. A small sample of pilot data was obtained, as well
as pertinent web data. The Institutional Review Board (IRB) has approved all the methods. keywords: اینترنت اشیا | حسگرها | نگهداری از سالمندان | سیستم های هوشمند | یادگیری ماشین | IoT | Sensors | Elder Care | Smart Systems | Machine Learning |
مقاله انگلیسی |
5 |
Moving towards intelligent telemedicine: Computer vision measurement of human movement
حرکت به سمت پزشکی از راه دور هوشمند: اندازه گیری بینایی کامپیوتری حرکت انسان-2022 Background: Telemedicine video consultations are rapidly increasing globally, accelerated by the COVID-
19 pandemic. This presents opportunities to use computer vision technologies to augment clinician visual
judgement because video cameras are so ubiquitous in personal devices and new techniques, such as
DeepLabCut (DLC) can precisely measure human movement from smartphone videos. However, the accuracy
of DLC to track human movements in videos obtained from laptop cameras, which have a much lower FPS, has
never been investigated; this is a critical gap because patients use laptops for most telemedicine consultations.
Objectives: To determine the validity and reliability of DLC applied to laptop videos to measure finger tapping,
a validated test of human movement.
Method: Sixteen adults completed finger-tapping tests at 0.5 Hz, 1 Hz, 2 Hz, 3 Hz and at maximal speed. Hand
movements were recorded simultaneously by a laptop camera at 30 frames per second (FPS) and by Optotrak,
a 3D motion analysis system at 250 FPS. Eight DLC neural network architectures (ResNet50, ResNet101,
ResNet152, MobileNetV1, MobileNetV2, EfficientNetB0, EfficientNetB3, EfficientNetB6) were applied to the
laptop video and extracted movement features were compared to the ground truth Optotrak motion tracking.
Results: Over 96% (529/552) of DLC measures were within +∕−0.5 Hz of the Optotrak measures. At tapping
frequencies >4 Hz, there was progressive decline in accuracy, attributed to motion blur associated with
the laptop camera’s low FPS. Computer vision methods hold potential for moving us towards intelligent
telemedicine by providing human movement analysis during consultations. However, further developments
are required to accurately measure the fastest movements.
keywords: پزشکی از راه دور | ضربه زدن با انگشت | موتور کنترل | کامپیوتری | Telemedicine | DeepLabCut | Finger tapping | Motor control | Computer vision |
مقاله انگلیسی |
6 |
The physical and mechanical properties for flexible biomass particles using computer vision
خواص فیزیکی و مکانیکی ذرات زیست توده انعطاف پذیر با استفاده از بینایی کامپیوتری-2022 The combustion and fluidization behavior of biomass depend on the physical properties (size, morphology, and
density) and mechanical performances (elastic modulus, Poisson’s ratio, tensile strength and failure strain), but
their quantitative models have rarely been focused in previous researchers. Hence, a static image measurement
for particle physical properties is studied. Combining the uniaxial tension and digital image correlation tech-
nology, the dynamic image measurement method for the mechanical properties is proposed. The results indicate
that the average roundness, rectangularity, and sphericity of present biomass particles are 0.2, 0.4, and 0.16,
respectively. The equivalent diameter and density obey the skewed normal distribution. The tensile strength and
failure stress are sensitive to stretching rate, fiber size and orientation. The distribution intervals of elastic
modulus and Poisson’s ratio are 30–600 MPa and 0.25–0.307, respectively. The stress–strain curves obtained
from imaging experiments agree well with the result of finite element method. This study provides the operating
parameters for the numerical simulation of particles in the fluidized bed and combustor. Furthermore, the
computer vision measurement method can be extended to the investigations of fossil fuels. keywords: ذرات زیست توده | مشخصات فیزیکی | اجرای مکانیکی | تست کشش | آزمایش تصویربرداری | بینایی کامپیوتر | Biomass particle | Physical properties | Mechanical performances | Tensile testing | Imaging experiment | Computer vision |
مقاله انگلیسی |
7 |
Efficient Hardware Implementation of Finite Field Arithmetic AB + C for Binary Ring-LWE Based Post-Quantum Cryptography
اجرای سخت افزار کارآمد محاسبات میدان محدود AB + C برای رمزنگاری پس کوانتومی مبتنی بر حلقه باینری-LWE-2022 Post-quantum cryptography (PQC) has gained significant attention from the community
recently as it is proven that the existing public-key cryptosystems are vulnerable to the attacks launched from
the well-developed quantum computers. The finite field arithmetic AB þ C, where A and C are integer polynomials and B is a binary polynomial, is the key component for the binary Ring-learning-with-errors (BRLWE)-
based encryption scheme (a low-complexity PQC suitable for emerging lightweight applications). In this paper,
we propose a novel hardware implementation of the finite field arithmetic AB þ C through three stages of interdependent efforts: (i) a rigorous mathematical formulation process is presented first; (ii) an efficient hardware
architecture is then presented with detailed description; (iii) a thorough implementation has also been given
along with the comparison. Overall, (i) the proposed basic structure (u ¼ 1) outperforms the existing designs,
e.g., it involves 55.9% less area-delay product (ADP) than [13] for n ¼ 512; (ii) the proposed design also offers
very efficient performance in time-complexity and can be used in many future applications.
INDEX TERMS: Binary ring-learning-with-errors | finite field arithmetic | FPGA platform | hardware design | post-quantum cryptography |
مقاله انگلیسی |
8 |
Tracking the northern seasonal cap retreat of mars using computer vision
ردیابی عقب نشینی کلاهک فصلی شمالی مریخ با استفاده از بینایی کامپیوتر-2022 Using polar stereographic images from the Mars Color Imager (MARCI), we use Python
to autonomously track the Northern Polar Seasonal Cap (NPSC) recession from Mars Years (MY)
29 to MY 35 between Ls = 10° and Ls = 70°. We outline the cap and find an ellipse of best fit. We
then compare our results to previously published recession rates, that were manually tracked,
and find them to be consistent. Our process benefits from being automated, which increases
the speed of tracking and allows us to monitor the recession with higher Ls fidelity than past
studies. We find that most MYs have a local minimum recession rate at Ls = ~32° and a local
maximum at Ls = ~51°. We also find that MY 30 experiences a rapid latitude increasing event
that involves ~1° Ls of a rapid increase and ~5° Ls of slower recession, which then increases
above the interannual average rate. We interpret this to be the result of a major sublimation
driven by off-polar winds. We also discover divergent effects in the recession and size of the
NPSC following the MY 28 and MY 35 global dust storms. MY 29’s cap is significantly smaller
and retreats slower than the multi-year average, whereas MY 35’s cap is slighter larger and
retreats very close to the average. We hypothesize that the diverging behavior of the caps in
post-storm years can be a result of the differences in the date of onset and the duration of the
storms.
|
مقاله انگلیسی |
9 |
Entropic Proofs of Singleton Bounds for Quantum Error-Correcting Codes
اثبات های آنتروپیک کرانه های سینگلتون برای کدهای تصحیح خطای کوانتومی-2022 We show that a relatively simple reasoning using
von Neumann entropy inequalities yields a robust proof of the
quantum Singleton bound for quantum error-correcting codes
(QECC). For entanglement-assisted quantum error-correcting
codes (EAQECC) and catalytic codes (CQECC), a type of
generalized quantum Singleton bound [Brun et al., IEEE Trans.
Inf. Theory 60(6):3073–3089 (2014)] was believed to hold for
many years until recently one of us found a counterexample
[MG, Phys. Rev. A 103, 020601 (2021)]. Here, we rectify this state
of affairs by proving the correct generalized quantum Singleton
bound, extending the above-mentioned proof method for QECC;
we also prove information-theoretically tight bounds on the
entanglement-communication tradeoff for EAQECC. All of the
bounds relate block length n and code length k for given
minimum distance d and we show that they are robust, in the
sense that they hold with small perturbations for codes which
only correct most of the erasure errors of less than d letters.
In contrast to the classical case, the bounds take on qualitatively
different forms depending on whether the minimum distance
is smaller or larger than half the block length. We also provide a propagation rule: any pure QECC yields an EAQECC
with the same distance and dimension, but of shorter block
length.
Index Terms: Quantum codes | quantum entanglement | singleton bound. |
مقاله انگلیسی |
10 |
A survey on adversarial attacks in computer vision: Taxonomy, visualization and future directions
بررسی حملات خصمانه در بینایی کامپیوتر: طبقه بندی، تجسم و جهت گیری های آینده-2022 Deep learning has been widely applied in various fields such as computer vision, natural language pro-
cessing, and data mining. Although deep learning has achieved significant success in solving complex
problems, it has been shown that deep neural networks are vulnerable to adversarial attacks, result-
ing in models that fail to perform their tasks properly, which limits the application of deep learning
in security-critical areas. In this paper, we first review some of the classical and latest representative
adversarial attacks based on a reasonable taxonomy of adversarial attacks. Then, we construct a knowl-
edge graph based on the citation relationship relying on the software VOSviewer, visualize and analyze
the subject development in this field based on the information of 5923 articles from Scopus. In the
end, possible research directions for the development about adversarial attacks are proposed based on
the trends deduced by keywords detection analysis. All the data used for visualization are available at:
https://github.com/NanyunLengmu/Adversarial- Attack- Visualization . keywords: یادگیری عمیق | حمله خصمانه | حمله جعبه سیاه | حمله به جعبه سفید | نیرومندی | تجزیه و تحلیل تجسم | Deep learning | Adversarial attack | Black-box attack | White-box attack | Robustness | Visualization analysis |
مقاله انگلیسی |