با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
Intelligent authentication of 5G healthcare devices: A survey
احراز هویت هوشمند دستگاه های مراقبت بهداشتی 5G: یک مرور-2022 The dynamic nature of wireless links and the mobility of devices connected to the Internet of
Things (IoT) over fifth-generation (5G) networks (IoT-5G), on the one hand, empowers pervasive
healthcare applications. On the other hand, it allows eavesdroppers and other illegitimate
actors to access secret information. Due to the poor time efficiency and high computational
complexity of conventional cryptographic methods and the heterogeneous technologies used,
it is easy to compromise the authentication of lightweight wearable and healthcare devices.
Therefore, intelligent authentication, which relies on artificial intelligence (AI), and sufficient
network resources are extremely important for securing healthcare devices connected to IoT-
5G. This survey considers intelligent authentication and includes a comprehensive overview of
intelligent authentication mechanisms for securing IoT-5G devices deployed in the healthcare
domain. First, it presents a detailed, thoughtful, and state-of-the-art review of IoT-5G, healthcare
technologies, tools, applications, research trends, challenges, opportunities, and solutions. We
selected 20 technical articles from those surveyed based on their strong overlaps with IoT,
5G, healthcare, device authentication, and AI. Second, IoT-5G device authentication, radiofrequency fingerprinting, and mutual authentication are reviewed, characterized, clustered,
and classified. Third, the review envisions that AI can be used to integrate the attributes
of the physical layer and 5G networks to empower intelligent healthcare devices. Moreover,
methods for developing intelligent authentication models using AI are presented. Finally, the
future outlook and recommendations are introduced for IoT-5G healthcare applications, and
recommendations for further research are presented as well. The remarkable contributions and
relevance of this survey may assist the research community in understanding the research gaps
and the research opportunities relating to the intelligent authentication of IoT-5G healthcare
devices.
keywords: اینترنت اشیا (IoT) | امنیت اینترنت اشیا | احراز هویت دستگاه | هوش مصنوعی | امنیت مراقبت های بهداشتی | شبکه های 5g | InternetofThings(IoT) | InternetofThingssecurity | Deviceauthentication | Artificialintelligence | Healthcaresecurity | 5Gnetworks |
مقاله انگلیسی |
2 |
IoT anomaly detection methods and applications: A survey
روش ها و کاربردهای تشخیص ناهنجاری اینترنت اشیا: یک مرور-2022 Ongoing research on anomaly detection for the Internet of Things (IoT) is a rapidly expanding
field. This growth necessitates an examination of application trends and current gaps. The
vast majority of those publications are in areas such as network and infrastructure security,
sensor monitoring, smart home, and smart city applications and are extending into even more
sectors. Recent advancements in the field have increased the necessity to study the many IoT
anomaly detection applications. This paper begins with a summary of the detection methods
and applications, accompanied by a discussion of the categorization of IoT anomaly detection
algorithms. We then discuss the current publications to identify distinct application domains,
examining papers chosen based on our search criteria. The survey considers 64 papers among
recent publications published between January 2019 and July 2021. In recent publications, we
observed a shortage of IoT anomaly detection methodologies, for example, when dealing with
the integration of systems with various sensors, data and concept drifts, and data augmentation
where there is a shortage of Ground Truth data. Finally, we discuss the present such challenges
and offer new perspectives where further research is required.
keywords: Anomaly detection | Internet of Things | IoT | Review | Survey | Applications |
مقاله انگلیسی |
3 |
A survey on adversarial attacks in computer vision: Taxonomy, visualization and future directions
بررسی حملات خصمانه در بینایی کامپیوتر: طبقه بندی، تجسم و جهت گیری های آینده-2022 Deep learning has been widely applied in various fields such as computer vision, natural language pro-
cessing, and data mining. Although deep learning has achieved significant success in solving complex
problems, it has been shown that deep neural networks are vulnerable to adversarial attacks, result-
ing in models that fail to perform their tasks properly, which limits the application of deep learning
in security-critical areas. In this paper, we first review some of the classical and latest representative
adversarial attacks based on a reasonable taxonomy of adversarial attacks. Then, we construct a knowl-
edge graph based on the citation relationship relying on the software VOSviewer, visualize and analyze
the subject development in this field based on the information of 5923 articles from Scopus. In the
end, possible research directions for the development about adversarial attacks are proposed based on
the trends deduced by keywords detection analysis. All the data used for visualization are available at:
https://github.com/NanyunLengmu/Adversarial- Attack- Visualization . keywords: یادگیری عمیق | حمله خصمانه | حمله جعبه سیاه | حمله به جعبه سفید | نیرومندی | تجزیه و تحلیل تجسم | Deep learning | Adversarial attack | Black-box attack | White-box attack | Robustness | Visualization analysis |
مقاله انگلیسی |
4 |
Monitoring crop phenology with street-level imagery using computer vision
پایش فنولوژی محصول با تصاویر سطح خیابان با استفاده از بینایی ماشین-2022 Street-level imagery holds a significant potential to scale-up in-situ data collection. This is enabled by combining
the use of cheap high-quality cameras with recent advances in deep learning compute solutions to derive relevant
thematic information. We present a framework to collect and extract crop type and phenological information
from street level imagery using computer vision. Monitoring crop phenology is critical to assess gross primary
productivity and crop yield. During the 2018 growing season, high-definition pictures were captured with side-
looking action cameras in the Flevoland province of the Netherlands. Each month from March to October, a fixed
200-km route was surveyed collecting one picture per second resulting in a total of 400,000 geo-tagged pictures.
At 220 specific parcel locations, detailed on the spot crop phenology observations were recorded for 17 crop
types (including bare soil, green manure, and tulips): bare soil, carrots, green manure, grassland, grass seeds,
maize, onion, potato, summer barley, sugar beet, spring cereals, spring wheat, tulips, vegetables, winter barley,
winter cereals and winter wheat. Furthermore, the time span included specific pre-emergence parcel stages, such
as differently cultivated bare soil for spring and summer crops as well as post-harvest cultivation practices, e.g.
green manuring and catch crops. Classification was done using TensorFlow with a well-known image recognition
model, based on transfer learning with convolutional neural network (MobileNet). A hypertuning methodology
was developed to obtain the best performing model among 160 models. This best model was applied on an
independent inference set discriminating crop type with a Macro F1 score of 88.1% and main phenological stage
at 86.9% at the parcel level. Potential and caveats of the approach along with practical considerations for
implementation and improvement are discussed. The proposed framework speeds up high quality in-situ data
collection and suggests avenues for massive data collection via automated classification using computer vision. keywords: Phenology | Plant recognition | Agriculture | Computer vision | Deep learning | Remote sensing | CNN | BBCH | Crop type | Street view imagery | Survey | In-situ | Earth observation | Parcel | In situ |
مقاله انگلیسی |
5 |
Semantic Riverscapes: Perception and evaluation of linear landscapes from oblique imagery using computer vision
مناظر معنایی رودخانه: درک و ارزیابی مناظر خطی از تصاویر مایل با استفاده از بینایی کامپیوتری-2022 Traditional approaches for visual perception and evaluation of river landscapes adopt on-site surveys or as-
sessments through photographs. The former is expensive, hindering large-scale analyses, and it is conducted only
on street-level or top-down imagery. The latter only reflects the subjective perception and also entails a laborious
process. Addressing these challenges, this study proposes an alternative: a novel workflow for visual analysis of
urban river landscapes by combining unmanned aerial vehicle (UAV) oblique photography with computer vision
(CV) and virtual reality (VR). The approach is demonstrated with an experiment on a section of the Grand Canal
in China where UAV oblique panoramic imagery has been processed using semantic segmentation for visual
evaluation with an index system we designed. Concurrent surveys, immersive and non-immersive VR, are used to
evaluate these photos, with a total of 111 participants expressing their perceptions across multiple dimensions.
Then, the relationship between the people’s subjective visual perception and the river landscape environment as
seen by computers has been established. The results suggest that using this approach, rivers and surrounding
landscapes can be analyzed automatically and efficiently, and the mean pixel accuracy (MPA) of the developed
model is 90%, which advances state of the art. The results of this study can benefit urban planners in formulating
riverside development policies, analyzing the perception of plans for a future scenario before an area is rede-
veloped, and the method can also aid relevant parties in having a macro understanding of the overall situation of
the river as a basis for follow-up research. Due to simplicity, accuracy and effectiveness, this workflow is
transferable and cost-effective for large-scale investigations of riverscapes and linear heritage. We openly release
Semantic Riverscapes—the dataset we collected and processed, bridging another gap in the field. keywords: ریورساید | باز کردن داده ها | GeoAI | بررسی های هوایی | هواپیماهای بدون سرنشین | واقعیت مجازی | Riverside | Open data | GeoAI | Aerial surveys | Drones | Virtual reality |
مقاله انگلیسی |
6 |
Survey on deep learning based computer vision for sonar imagery
مروری بر بینایی کامپیوتری مبتنی بر یادگیری عمیق برای تصاویر سونار-2022 Research on the automatic analysis of sonar images has focused on classical, i.e. non deep learning based,
approaches for a long time. Over the past 15 years, however, the application of deep learning in this research
field has constantly grown. This paper gives a broad overview of past and current research involving deep
learning for feature extraction, classification, detection and segmentation of sidescan and synthetic aperture
sonar imagery. Most research in this field has been directed towards the investigation of convolutional neural
networks (CNN) for feature extraction and classification tasks, with the result that even small CNNs with up
to four layers outperform conventional methods.
The purpose of this work is twofold. On one hand, due to the quick development of deep learning it serves as an introduction for researchers, either just starting their work in this specific field or working on classical methods for the past years, and helps them to learn about the recent achievements. On the other hand, our main goal is to guide further research in this field by identifying main research gaps to bridge. We propose to leverage the research in this field by combining available data into an open source dataset as well as carrying out comparative studies on developed deep learning methods. keywords: یادگیری عمیق | تصویربرداری سوناری | کامپیوتری | تشخیص خودکار هدف | Statusquoreview | Deeplearning | Sonarimagery | Computervision | Automatictargetrecognition | Statusquoreview |
مقاله انگلیسی |
7 |
A systematic review on computer vision-based parking lot management applied on public datasets
مرور سیستماتیک مدیریت پارکینگ مبتنی بر بینایی ماشین اعمال شده بر روی مجموعه داده های عمومی-2022 Computer vision-based parking lot management methods have been extensively researched upon owing to their
flexibility and cost-effectiveness. To evaluate such methods authors often employ publicly available parking lot
image datasets. In this study, we surveyed and compared robust publicly available image datasets specifically
crafted to test computer vision-based methods for parking lot management approaches and consequently
present a systematic and comprehensive review of existing works that employ such datasets. The literature
review identified relevant gaps that require further research, such as the requirement of dataset-independent
approaches and methods suitable for autonomous detection of position of parking spaces. In addition, we have
noticed that several important factors such as the presence of the same cars across consecutive images, have
been neglected in most studies, thereby rendering unrealistic assessment protocols. Furthermore, the analysis
of the datasets also revealed that certain features that should be present when developing new benchmarks,
such as the availability of video sequences and images taken in more diverse conditions, including nighttime
and snow, have not been incorporated.
keywords: Parking lot | Dataset | Benchmark | Machine learning | Image processing |
مقاله انگلیسی |
8 |
A graphics-based digital twin framework for computer vision-based post-earthquake structural inspection and evaluation using unmanned aerial vehicles
یک چارچوب دیجیتال دوقلوی مبتنی بر گرافیک برای بازرسی و ارزیابی ساختاری پس از زلزله مبتنی بر بینایی کامپیوتری با استفاده از وسایل نقلیه هوایی بدون سرنشین-2022 Rapid structural inspections and evaluations are critical after earthquakes. Computer vision-based methods have attracted the interest of researchers for their potential to be rapid, safe, and objective. To provide an end-to-end solution for computer vision-based post-earthquake inspection and evaluation of a specific as-built structure, the concepts of physics-based graphics model (PBGM) and digital twin (DT) are combined to develop a graphics-based digital twin (GBDT) framework. The GBDT framework comprises a finite element (FE) model and a computer graphics (CG) model whose state is informed by the FE analysis, representing the state of the structure before and after an earthquake. The CG model is first created making use of the FE model and the photographic survey of the structure, yielding the virtual counterpart of the as-built structure quickly and accurately. Then damage modelling approaches are proposed to predict the location and extent of structural and nonstructural damage under seismic loading, from which photographic representation of the predicted damage is realized in the CG model. The effectiveness of the GBDT framework is demonstrated using a five-story reinforced concrete benchmark building through the design and assessment of various UAV (Unmanned Aerial Vehicle) inspection trajectories for post-earthquake scenarios. The results demonstrate that the proposed GBDT framework has significant potential to enable rapid structural inspection and evaluation, ultimately leading to more efficient allocation of scarce resources in a post-earthquake setting.
keywords: بینایی کامپیوتر | مهندسی زلزله | دوقلو دیجیتال | ارزیابی پس از زلزله | دوقلو دیجیتال مبتنی بر گرافیک | مدل گرافیکی مبتنی بر فیزیک | Computer vision | Earthquake engineering | Digital twin | Post-earthquake assessment | Graphics-based digital twin | Physics-based graphics model |
مقاله انگلیسی |
9 |
عوامل تعیین کننده باز بودن کسب و کار در فرآیندهای نوآوری
سال انتشار: 2022 - تعداد صفحات فایل pdf انگلیسی: 6 - تعداد صفحات فایل doc فارسی: 13 مفهوم نوآوری باز نه تنها به عنوان یک موضوع مطالعه در دانشگاهیان، بلکه به عنوان چارچوبی برای توسعه مدل های جدید مدیریت کسب و کار به اهمیت ویژه ای دست یافته است. این مقاله به بررسی عوامل تعیین کننده یکی از ابعاد نوآوری باز مرتبط با استفاده از دانش خارجی برای توسعه فرآیندهای نوآوری تجاری می پردازد. تجزیه و تحلیل بر اساس ریز داده های توسعه و نوآوری فناوری بررسی EDIT 2015 - 2016 انجام شده توسط آژانس آماری کلمبیا (DANE) انجام شده است. برای این منظور، معیاری که میزان باز بودن شرکت را در رابطه با استفاده از منابع اطلاعاتی خارجی برای توسعه فعالیتهای نوآورانه نشان میدهد، معرفی شده است. متغیرهای مرتبط با قابلیتهای فنآوری شرکت، موانع نوآوری و استراتژی مناسببودن به عنوان عوامل تعیینکننده در نظر گرفته میشوند.
کلیدواژه ها: نوآوری باز | منابع اطلاعاتی | تحقیق و توسعه | استراتژی های مناسب سازی |
مقاله ترجمه شده |
10 |
آموزش آسیب شناسی از راه دور تحت همه گیری COVID-19: برداشت های دانشجویان پزشکی
سال انتشار: 2022 - تعداد صفحات فایل pdf انگلیسی: 4 - تعداد صفحات فایل doc فارسی: 12 زمینه: همهگیری COVID-19 آموزش سنتی را مجبور کرده است که دوباره ساختار یافته و به صورت آنلاین ارائه شود. هدف: تجزیه و تحلیل ادراک دانشجویان پزشکی در مورد مزایا و مشکلات آموزش از راه دور پاتولوژی در طول همه گیری COVID-19.
طراحی: یک مطالعه مقطعی با یک نظرسنجی آنلاین برای دانشجویان سال سوم و چهارم فارغالتحصیلی پزشکی، که در آموزش از راه دور پاتولوژی در طول همهگیری COVID-19 شرکت کردند، انجام شد. روشهای تدریس آنلاین شامل فعالیتهای همزمان با سخنرانیهای تعاملی زنده، بحثهای مبتنی بر مورد و فعالیتهای ناهمزمان با سخنرانیهای ضبطشده، آموزشها و متون موجود در پلت فرم آموزش آنلاین است. ادراک دانشجویان در مورد آموزش از راه دور آسیب شناسی از طریق نظرسنجی آنلاین مورد ارزیابی قرار گرفت. یافتهها: 90 دانشجو (47%) از 190 شرکتکننده پرسشنامه را تکمیل کردند که 45 نفر مرد و 52 نفر در سال سوم فارغالتحصیلی پزشکی بودند. شرایط درک شده ای که یادگیری آسیب شناسی را تسهیل می کرد شامل استفاده از پلت فرم آموزش آنلاین و انعطاف پذیری زمانی برای مطالعه بود. دانشجویان سخنرانی های زنده تعاملی را برتر از سخنرانی های سنتی سنتی می دانستند. شرایط درک شده ای که مانع اجرای آموزش آنلاین شد، شامل دشواری جداسازی مطالعه از فعالیت های خانگی، بی انگیزگی و بدتر شدن کیفیت زندگی به دلیل دوری فیزیکی از همکاران و اساتید بود. به طور کلی، آموزش از راه دور آسیب شناسی توسط 80٪ از دانشجویان ارزش مثبت داشت. نتیجهگیری: ابزارهای آنلاین اجازه میدهند تا محتوای پاتولوژی با موفقیت در طول همهگیری COVID-19 به دانشآموزان ارائه شود. این تجربه می تواند الگویی برای فعالیت های آموزشی آتی آسیب شناسی در آموزش علوم بهداشت باشد. کلید واژه ها: پاتولوژی | آموزش از راه دور | کووید -19 | آموزش پزشکی |
مقاله ترجمه شده |