دانلود و نمایش مقالات مرتبط با Vocation::صفحه 1
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Vocation

تعداد مقالات یافته شده: 33
ردیف عنوان نوع
1 CREASE: Certificateless and REused-pseudonym based Authentication Scheme for Enabling security and privacy in VANETs
CREASE: طرح احراز هویت مبتنی بر نام مستعار بدون گواهی و استفاده مجدد برای فعال کردن امنیت و حریم خصوصی در VANET-2022
Due to the customers’ growing interest in using various intelligent and connected devices, we are surrounded by the Internet of Things (IoT). It is estimated that the number of IoT devices will exceed 60 billion by 2025. One of the primary reasons for such rapid growth is the Internet of Vehicles (IoV). Internet of Vehicles (IoV) has evolved into an emerging concept in intelligent transportation systems (ITS) that integrates VANETs and the IoT to enhance their capabilities. With the emergence of IoV and the interest shown by customers, Vehicular Ad hoc NETworks (VANETs) are likely to be widely deployed in the near future. However, for this to happen, wide participation of vehicle owners in VANET is needed. The primary concerns of vehicle owners to participate in VANET are privacy and security. In this paper, we present a Certificateless and REused-pseudonym based Authentication Scheme for Enabling security and privacy (CREASE) in VANETs. One of the ways to preserve the privacy of vehicles/drivers is to allow vehicles/drivers to use pseudo identities (pseudonyms) instead of their real identities (such as VIN number or driving license number) in all communications. The pseudonym used by a vehicle needs to be changed frequently to prevent the vehicle from being tracked. Our scheme uses Merkle Hash Tree and Modified Merkle Patricia Trie to efficiently store and manage the pseudonyms assigned to a vehicle. This enables a vehicle to pick and use a random pseudonym from a given set of pseudonyms assigned to it as well as change its pseudonym frequently and securely to ensure privacy. Unlike many of the existing schemes, our scheme does not use certificates and certificate revocation lists for authentication. Moreover, it allows vehicles to get a set of pseudonyms only once from the trusted authority. We present a formal proof of correctness of our scheme and also compare our scheme with some of the other contemporary schemes to show the effectiveness of our scheme.
Keywords: VANETs | Intelligent transportation systems | Authentication | Security | Privacy-preserving authentication
مقاله انگلیسی
2 Efficient biometric-based identity management on the Blockchain for smart industrial applications
مدیریت هویت مبتنی بر بیومتریک کارآمد در Blockchain برای کاربردهای صنعتی هوشمند-2021
In this work, we propose a new Blockchain-based Identity Management system for smart industry. First, we describe an efficient biometric-based anonymous credential scheme, which supports selective disclosure, suspension/thaw and revocation of credentials/entities. Our system provides non-transferability through a freshly computed hidden biometric attribute, which is generated using a secure fuzzy extractor during each authentication. This mechanism combined with offchain storage guarantees GDPR compliance, which is required for protecting user’s data. We define blinded (Brands) DLRep scheme to provide multi-show unlinkability, which is a lacking feature in Brands’ credential based systems. For larger organizations, we re-design the system by replacing the Merkle Tree with an accumulator to improve scalability. The new system enables auditing by adapting the standard Industrial IoT (IIoT) Identity Management Lifecycle to Blockchain. Finally, we show that the new proposal outperforms BASS, i.e. the most recent blockchain-based anonymous credential scheme designed for smart industry. The computational cost at the user-side (can be a weak IoT device) of our scheme is 8-times less than that of BASS. Thus, our system is more suitable for IIoT.© 2020 Elsevier B.V. All rights reserved.
Keywords: Identity management | Smart industry | Blockchain | Non-transferability | Biometrics | DLRep | Multi-show unlinkability | Selective disclosure | Accumulators
مقاله انگلیسی
3 Predicting the future from first person (egocentric) vision: A survey
پیش بینی آینده از دیدگاه اول شخص (خودمحور): یک مرور-2021
Egocentric videos can bring a lot of information about how humans perceive the world and interact with the environment, which can be beneficial for the analysis of human behaviour. The research in egocentric video analysis is developing rapidly thanks to the increasing availability of wearable devices and the opportunities offered by new large-scale egocentric datasets. As computer vision techniques continue to develop at an increasing pace, the tasks related to the prediction of future are starting to evolve from the need of understanding the present. Predicting future human activities, trajectories and interactions with objects is crucial in applications such as human–robot interaction, assistive wearable technologies for both industrial and daily living scenarios, entertainment and virtual or augmented reality. This survey summarizes the evolution of studies in the context of future prediction from egocentric vision making an overview of applications, devices, existing problems, commonly used datasets, models and input modalities. Our analysis highlights that methods for future prediction from egocentric vision can have a significant impact in a range of applications and that further research efforts should be devoted to the standardization of tasks and the proposal of datasets considering real-world scenarios such as the ones with an industrial vocation.
Keywords: First person vision | Egocentric vision | Future prediction | Anticipation
مقاله انگلیسی
4 A socio-legal deconstruction of homicide victims and perpetrators: Israeli femicide case law
ساختارشکنی اجتماعی و قانونی قربانیان قتل و عاملان: قانون پرونده قتل در اسرائیل-2020
This interpretive paper explores the ways in which criminal law is applied to femicide victims and perpetrators and how it socially constructs and legitimizes genderbased violence in the form of femicide (the killing of a woman), when applying the doctrine of provocation. In doing so the paper discusses the socio-cultural underpinnings of the criminal legal mitigation available for defendants who claim to have killed their wives while being provoked. Conceptualizing the critical deconstruction within gendered socio-cultural predispositions and ensuing criminal legal doctrine and social norms, the paper demonstrates the ways in which Israeli social norms, attitudes and beliefs towards sexual jealousy, matrimony, loss of control, morality, gender and homicide – are entangled and intertwined in the structure and function of Israeli criminal law. The paper offers a critical analysis of the underlying discriminating gendered basic assumptions that structure current Israeli application of the doctrine of provocation and the way in which such a socio-legal structure constructs the Israeli ‘unfaithful’ woman, and her corresponding ‘reasonable’, and ‘normative’, so to speak, killer. Such men are considered less morally guilty when they kill ‘unfaithful’ women, consequently awarded lenient convictions and sentences. At the same time, Israeli women are blamed for morally instigating and provoking their own killing – thus precipitating their gruesome, premature and undue death. As the Israeli criminal legal structure is deeply rooted in English common law, its substantive criminal doctrine of provocation is widely shared by many countries. In this respect the papers exploration of Israeli criminal doctrine of provocation may provide a significant contribution to socio-legal discourse in many other countries with legal structures similarly steeped in English common law.
مقاله انگلیسی
5 A socio-legal deconstruction of homicide victims and perpetrators: Israeli femicide case law
ساختارشکنی حقوقی اجتماعی قربانیان و مرتکبان قتل: دادرسی اسرائیلی در زمینه قتل-2020
This interpretive paper explores the ways in which criminal law is applied to femicide victims and perpetrators and how it socially constructs and legitimizes genderbased violence in the form of femicide (the killing of a woman), when applying the doctrine of provocation. In doing so the paper discusses the socio-cultural underpinnings of the criminal legal mitigation available for defendants who claim to have killed their wives while being provoked. Conceptualizing the critical deconstruction within gendered socio-cultural predispositions and ensuing criminal legal doctrine and social norms, the paper demonstrates the ways in which Israeli social norms, attitudes and beliefs towards sexual jealousy, matrimony, loss of control, morality, gender and homicide – are entangled and intertwined in the structure and function of Israeli criminal law. The paper offers a critical analysis of the underlying discriminating gendered basic assumptions that structure current Israeli application of the doctrine of provocation and the way in which such a socio-legal structure constructs the Israeli ‘unfaithful’ woman, and her corresponding ‘reasonable’, and ‘normative’, so to speak, killer. Such men are considered less morally guilty when they kill ‘unfaithful’ women, consequently awarded lenient convictions and sentences. At the same time, Israeli women are blamed for morally instigating and provoking their own killing – thus precipitating their gruesome, premature and undue death. As the Israeli criminal legal structure is deeply rooted in English common law, its substantive criminal doctrine of provocation is widely shared by many countries. In this respect the papers exploration of Israeli criminal doctrine of provocation may provide a significant contribution to socio-legal discourse in many other countries with legal structures similarly steeped in English common law.
مقاله انگلیسی
6 Entrepreneurship as a vocational choice in contested entrepreneurship communities: The role of entrepreneurs justification strategies
کارآفرینی به عنوان یک انتخاب حرفه ای در جوامع کارآفرینانه مورد بحث: نقش استراتژی های توجیه کارآفرینان-2020
Research on the vocational decision to become an entrepreneur highlights how culture justifies such decisions when entrepreneurs align with the dominant cultural norms. Less is known about such justification when entrepreneurship is seen as less culturally appropriate. This qualitative study explores how entrepreneurs in Santiago, Chile and Nairobi, Kenya use strategies that comply, combine, and defy frames to justify vocational choices. Our framework sheds new light on how entrepreneurs act as purposeful cultural agents and use justification strategies to navigate constraining societal frames.
Keywords: Entrepreneurship | Framing | Justification | Vocational choice
مقاله انگلیسی
7 Understanding variations in socio-economic vulnerabilities and the strategies adopted by small scale fishing communities of tropical reservoirs
درک تغییرات در آسیب پذیری های اقتصادی و اجتماعی و استراتژی های اتخاذ شده توسط جوامع ماهیگیری در مقیاس کوچک مخازن گرمسیری-2020
The present study taken up in two reservoirs in India namely Peechi and Pothundi reservoir assess the vulnerabilities and various management aspects adopted in two reservoirs. Peechi reservoir situated in Peechi- Vazhani wildlife sanctuary was prevented from all fishery enhancement programmes. Pothundi reservoir, a manmade tropical lake though encompassed in Western Ghats biosphere was regularly stocked with Indian Major Carps. Livelihood survey was carried out on the fishers of Peechi and Pothundi reservoirs with the help of a structured schedule. The survey encompassed demographic information, particulars on fisheries and details on economic and marketing aspects of respective reservoir fisheries. The marketing part of the schedule dealt with ranking of various problems faced by the fishermen in the reservoirs using Garrette ranking. Out of the various socio-ecological vulnerabilities of reservoir fisheries communities that was analysed in this study, varied stakeholder interest, human and wild life interference and irregular stocking of fish were identified as the major vulnerabilities faced by them. Relevance of various strategies suggested by fishers in Peechi and Pothundi reservoirs estimated using RFMI (Reservoir fisheries management index) concluded that regular and continuous fish stocking (technical driver) along with allowing gender equity in land based fish production centres (social driver) was suggested as the appropriate strategy to augment the fishers income from Pothundi reservoir. The study suggested for a possible intervention by practicing fishing holidays in Peechi reservoir during lean months and substituting the lost income with alternative livelihood programmes. The RFMI values for Peechi and Pothundi reservoirs were 52.12 and 68.57 respectively. The study thus emphasized a bottom approach where in the importance of planning at primary stake holders level is ensured. The relevant research ensured adoption of these strategies in local scale along with policy window would definitely provide a better management of reservoir fisheries in tropical countries.
Keywords: Reservoir fisheries management index | Garette method | Policy driver | Vocation
مقاله انگلیسی
8 A practical solution to clone problem in anonymous information system
یک راه حل عملی برای مسئله کلون در سیستم اطلاعات ناشناس-2020
Cloning user’s identity is always a thorny problem for an information system, especially for an anonymous system. With the development of big data applications, clone behav- iors sometimes even become attacks on these systems. But until now, there has been no very satisfactory anti-clone scheme in the anonymous system. After analyzing the prob- lems in existing anti-clone schemes, without any assumptions about physical security, we provide a practical solution to the clone problem in anonymous authentication system. In our scheme, the authentication is not only related to user’s private key, but also related to user’s current state, which is constantly updated by the system. Therefore, the authen- tication trajectories of user and clone will inevitably overlap, and it results in information leakage so as to indentify clone behaviors and revoke clone user’s credential. Meanwhile, we prove that honest users are truly anonymous and their login behaviors are unlinkable with complete security proofs. According to the analysis of the system function and the system efficiency, our scheme is much more efficient and has the best anti-clone proper- ties comparing with the existing schemes.
Keywords: Cloning identity | Anonymous system | Unlinkable login | Identification of clone behavior/user | Revocation of clone user’s credential | Denying clone user access
مقاله انگلیسی
9 Barriers to post exposure prophylaxis use among men who have sex with men in sub-Saharan Africa: An online cross-sectional survey
موانع استفاده از پروفیلاکسی پس از مواجهه در مردانی که در جنوب صحرای آفریقا با مردان رابطه جنسی برقرار می کنند: یک مطالعه مقطعی بصورت آنلاین-2020
Background: Curbing new HIV infections among MSM in SSA remains problematic, due to cultural beliefs, norms that oppose same-sex acts, and criminalization of same-sex acts. No study focused on barriers to PEP use in SSA region has been conducted. Our study focused on identifying barriers to Post-Exposure Prophylaxis (PEP) use among MSM in sub-Saharan Africa (SSA). Methods: An online cross-sectional survey was sent out to members of 14 Lesbian, Gay, Transgender, Bisexual, Queer (LGBTQ) associations in SSA, to identify barriers to PEP utilization in MSM. A total of 297 MSM from 22 countries in SSA completed the survey between 8 January 2019 and 23 February 2019. Descriptive statistics were generated, chi-square and backward stepwise logistic regression analysis were performed to evaluate the association between the outcome “PEP use” and other variables. Results: Most of the MSM were aged 18 to 30, and the majority (220, 74.6%) described themselves as gay. Rwanda had the highest number of respondents (117, 39.7% of the total), followed by Nigeria, Ghana and South- Africa. The majority of respondents reported having heard about PEP (234, 80.7%), and the average PEP correct knowledge level was 59%. Five characteristics were associated with increased odds of using PEP: Age, having vocational education, having heard of PEP, knowledge of where to get PEP, and having been refused housing. Conclusion: There is a need for a collaborative effort between policy makers, key players in HIV prevention, and MSM associations in SSA to remove barriers to PEP uptake to promote optimal PEP utilization amongst MSM.
Keywords: Post-exposure prophylaxis | MSM | Key population | HIV prevention | Sub-Saharan Africa
مقاله انگلیسی
10 The ‘Ethification’ of ICT Governance: Artificial Intelligence and Data Protection in the European Union
"تعارف" حاکمیت فناوری اطلاعات و ارتباطات: هوش مصنوعی و حفاظت از داده ها در اتحادیه اروپا-2020
Several European Commission’s initiatives have been resorting to ethics in policy discourses as a way to govern and regulate Information and Communication Technologies (ICT). The proliferation of invocations of ‘ethics’, especially concerning the recent debate on (the regulation of) Artificial Intelligence (AI), can be referred to as the ‘ethification’ phenomenon. This article aims to elucidate the benefits and drawbacks of the ethification of ICT governance, and its effects on the articulations of law, technology and politics in democratic constitutional states. First, the article will provide a mapping to locate where the ethics work is being produced in the EU. Second, the authors will distinguish different types of ethics based on the mapping. Third, the ethification phenomenon will be analyzed through the concepts of boundary and convergence work, where we will both see that it plays the role of ‘normative glue’ between interests of different practices to reach a common goal, but also tracing or obfuscating boundaries to claim autonomy from the law and exclude forms of non-genuine ethics. Fourth, we inquire into the nature of ethics as a practice and the consequences of ethification for the law.© 2021 Niels van Dijk, Simone Casiraghi, Serge Gutwirth. Published by Elsevier Ltd. Allrights reserved.
Keywords: Ethics | General Data Protection Regulation | Innovation governance | Artificial Intelligence | European Commission | Boundary work | Ecology of practices
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 2895 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 2895 :::::::: افراد آنلاین: 70