دانلود و نمایش مقالات مرتبط با WAR::صفحه 224
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - WAR

تعداد مقالات یافته شده: 3714
ردیف عنوان نوع
2231 Asset quality, non-interest income, and bank profitability: Evidence from Indian banks
کیفیت دارایی، درآمد بدون بهره و سودآوری بانک: شواهد از بانک های هند-2017
This paper investigates whether a shift toward non-interest income activities improves the profitability of Indian banks and, if so, how it varies across ownership groups and banks with different asset qualities. Our findings show that higher share of non-interest income yields higher profits and risk-adjusted profits; in particular when banks are involved in more trading activities. The results indicate that private foreign banks earn more risk adjusted profits compared to public sector and private domestic banks. Furthermore, we also find that income diversification benefits more to the banks that have lower asset quality compared to the banks that have higher asset quality. The findings are insensitive to dynamic panel data estimations and alternative sample specification. The results of this paper provide valuable insights for policymakers, and conclude that ensuring diversification activities enhances bank profitability, in particular for the banks that have lower asset quality.
Keywords: Bank | Profitability | Diversification | Asset quality
مقاله انگلیسی
2232 Comparisons between the attitudes of student nurses and other health and social care students toward illicit drug use: An attitudinal survey
مقایسه بین نگرش پرستاران دانشجو و دیگر دانشجویان سلامت و مراقبت های اجتماعی نسبت به مصرف غیر قانونی مواد مخدر : یک نظرسنجی نگرشی-2017
In the context of a recent emphasis on compassion in the delivery of health care, the current study set out to mea sure the attitudes of different groups of health and social care students toward illicit drug users. Previous research has identified variations in the attitudes of different groups of health and social care professionals toward work ing with illicit drug users. Nurses, in particular, have been reported as holding moralistic or stereotypical views of illicit drug users. However, few studies have measured the attitudes of student nurses or compared their attitudes to other health and social care students. This article describes the use of a bespoke attitude scale to measure the attitudes of cohorts of student nurses, clinical psychology trainees, health and social care, social work and mid wifery students at the start of their course (N = 308). Results indicated that student nurses had the least tolerant attitudes, reinforcing the need for a specific educational focus on working with illicit drug users in nurse educa tion. Variations between student groups indicate that Interprofessional Education can provide an opportunity to improve attitudes toward illicit drug users, particularly amongst student nurses.
Keywords: Student nurses | Social work students | Midwifery students | Clinical psychology trainees | Attitudes | Drug use/misuse | Interprofessional education
مقاله انگلیسی
2233 Efficient and accurate algorithms for computing matrix trigonometric functions
الگوریتم های کارآمد و دقیق برای محاسبه توابع مثلثاتی ماتریس-2017
Trigonometric matrix functions play a fundamental role in second order differential equations. This work presents an algorithm based on Taylor series for computing the matrix cosine. It uses a backward error analysis with improved bounds. Numerical experiments show that MATLAB implementations of this algorithm has higher accuracy than other MATLAB implementations of the state of the art in the majority of tests. Furthermore, we have implemented the designed algorithm in language C for general purpose processors, and in CUDA for one and two NVIDIA GPUs. We obtained a very good performance from these implementations thanks to the high computational power of these hardware accelerators and our effort driven to avoid as much communications as possible. All the implemented programs are accessible through the MATLAB environment.
Keywords: Matrix cosine | Matrix sine | Scaling and squaring method | Taylor series | Backward error | Parallel implementation
مقاله انگلیسی
2234 Development of haptic based piezoresistive artificial fingertip: Toward efficient tactile sensing systems for humanoids
توسعه حس نوک انگشت مصنوعی بر اساس piezoresistive (تغییر مقاومت الکتریکی بر اثر فشار مکانیکی) : به سوی سیستم های سنجش لمسی کارآمد برای انسان نماها-2017
Haptic sensors are essential devices that facilitate human-like sensing systems such as implantable medical de- vices and humanoid robots. The availability of conducting thin films with haptic properties could lead to the de- velopment of tactile sensing systems that stretch reversibly, sense pressure (not just touch), and integrate with collapsible. In this study, a nanocomposite based hemispherical artificial fingertip fabricated to enhance the tac- tile sensing systems of humanoid robots. To validate the hypothesis, proposed method was used in the robot-like finger system to classify the ripe and unripe tomato by recording the metabolic growth of the tomato as a func- tion of resistivity change during a controlled indention force. Prior to fabrication, a finite element modeling (FEM) was investigated for tomato to obtain the stress distribution and failure point of tomato by applying different ex- ternal loads. Then, the extracted computational analysis information was utilized to design and fabricate nano- composite based artificial fingertip to examine the maturity analysis of tomato. The obtained results demonstrate that the fabricated conformable and scalable artificial fingertip shows different electrical property for ripe and unripe tomato. The artificial fingertip is compatible with the development of brain-like systems for artificial skin by obtaining periodic response during an applied load.© 2017 Published by Elsevier B.V.
Keywords:Artificial finger | Haptic sensors | Nanocomposite | Modeling | Harvesting robot
مقاله انگلیسی
2235 A hybrid and learning agent architecture for network intrusion detection
عامل یادگیری معماری ترکیبی برای تشخیص نفوذ شبکه -2017
Learning is an effective way for automating the adaptation of systems to their environment. This ability is especially relevant in dynamic environments as computer networks where new intrusions are constantly emerging, most of them having similarities and occurring frequently. Traditional intrusion detection sys tems still have limitations of adaptability because they are just able to detect intrusions previously set in system design. This paper proposes HyLAA a software agent architecture that combines case-based reasoning, reactive behavior and learning. Through its learning mechanism, HyLAA can adapt itself to its environment and identify new intrusions not previously specified in system design. This is done by learn ing new reactive rules by observing recurrent good solutions to the same perception from the case-based reasoning system, which will be stored in the agent knowledge base. The effectiveness of HyLAA to de tect intrusions using case-based reasoning behavior, the accuracy of the classifier learned by the learning component and both the performance and effectiveness of HyLAA to detect intrusions using hybrid be havior with learning and without learning were evaluated, respectively, by conducting four experiments. In the first experiment, HyLAA exhibited good effectiveness to detect intrusions. In the second experi ment the classifiers learned by the learning component presented high accuracy. Both the hybrid agent behavior with learning and without learning (third and fourth experiment, respectively) presented greater effectiveness and a balance between performance and effectiveness, but only the hybrid behavior showed better effectiveness and performance as long as the agent learns.
Keywords: Learning agents | Hybrid agents | Case-based reasoning | Ontologies | Information security | Intrusion detection systems
مقاله انگلیسی
2236 Design and implementation of an omnidirectional vision system for robot perception
طراحی و پیاده سازی یک سیستم چشم انداز چند منظوره برای درک ربات-2017
Article history:Received 30 December 2015Revised 21 October 2016Accepted 20 November 2016Available online 7 December 2016Keywords:Robotics Mechatronic systemOmnidirectional vision Stereo visionTo meet the demand of surrounding detection of a humanoid robot, we developed an omnidirectional vision system for robot perception (OVROP) with 5 Degrees of Freedom (DOFs). OVROP has a modu- lar design and mainly consists of three parts: hardware, control architecture and visual processing part (omnidirectional vision and stereovision). As OVROP is equipped with universal hardware and software interfaces it can be applied to various types of robots. Our performance evaluation proves that OVROP can accurately detect and track an object with 360° field of view (FOV). Besides, undistorted omnidirectional perception of surroundings can be achieved through calibrations of both monocular and stereo cameras. Furthermore, our preliminary experimental results show that OVROP can perceive a desired object within 160 ms in most cases. As a result, OVROP can provide detailed information on surrounding environment for full-scope and real-time robot perception.© 2016 Elsevier Ltd. All rights reserved.
Keywords: Robotics | Mechatronic system | Omnidirectional vision | Stereo vision
مقاله انگلیسی
2237 Combining heterogeneous anomaly detectors for improved software security
ترکیب اشکارسازهای انومالی ناهمگن برای بهبود امنیت نرم افزار -2017
Host-based Anomaly Detection Systems (ADSs) monitor for significant deviations from normal software behavior. Several techniques have been investigated for detecting anomalies in system call sequences. Among these, Sequence Time-Delay Embedding (STIDE), Hidden Markov Model (HMM), and One-Class Support Vector Machine (OCSVM) have shown a high level of anomaly detection accuracy. Although ADSs can detect novel attacks, they generate a large number of false alarms due to the difficulty in obtaining complete descriptions of normal software behavior. This paper presents a multiple-detector ADS that ef ficiently combines the decisions from heterogeneous detectors (e.g., STIDE, HMM, and OCSVM), using Boolean combination in the Receiver Operating Characteristics (ROC) space, to reduce the false alarms. Results on two modern and large system call datasets generated from Linux and Windows operating sys tems show that the proposed ADS consistently outperforms an ADS based on a single best detector and on an ensemble of homogeneous detectors. At an operating point of zero percent alarm rate, the pro posed multiple-detector ADS increased the true positive rate by 500% on the Linux dataset and by 25% on the Window dataset. Furthermore, the combinations of decisions from multiple heterogeneous detec tors make the ADS more reliable and resilient against evasion and adversarial attacks.
eywords: Anomaly detection systems | Intrusion detection systems | Heterogeneous and reliable systems | Decision-level combination
مقاله انگلیسی
2238 Integrated forward and reverse supply chain: A tire case study
زنجیره تامین یکپارچه رو به جلو و معکوس: مطالعه موردی تایر-2017
This paper attempts to integrate both a forward and reverse supply chain to design a closed-loop supply chain network (CLSC). The problem in the design of a CLSC network is uncertainty in demand, return products and the quality of return products. Scenario analyses are generated to overcome this uncertainty. In contrast to the existing supply chain network design models, a new application of a CLSC network was studied in this paper to reduce waste. A multi-product, multi-tier mixed integer linear model is developed for a CLSC network design. The main objective is to maximize profit and provide waste management decision support in order to minimize pollution. The result shows applicability of the model in the tire industry. The model determines the number and the locations of facilities and the material flows between these facilities.
Keywords: Waste management | Closed-loop supply chain | Network design | Reverse logistics
مقاله انگلیسی
2239 Security slicing for auditing common injection vulnerabilities
برش امنیت برای حسابرسی آسیب پذیری تزریق مشترک-2017
Cross-site scripting and injection vulnerabilities are among the most common and serious security issues for Web applications. Although existing static analysis approaches can detect potential vulnerabilities in source code, they generate many false warnings and source-sink traces with irrelevant information, mak ing their adoption impractical for security auditing. One suitable approach to support security auditing is to compute a program slice for each sink, which contains all the information required for security auditing. However, such slices are likely to contain a large amount of information that is irrelevant to security, thus raising scalability issues for security audits. In this paper, we propose an approach to assist security auditors by defining and experimenting with pruning techniques to reduce original program slices to what we refer to as security slices, which contain sound and precise information. To evaluate the proposed approach, we compared our security slices to the slices generated by a state of-the-art program slicing tool, based on a number of open-source benchmarks. On average, our security slices are 76% smaller than the original slices. More importantly, with security slicing, one needs to audit approximately 1% of the total code to fix all the vulnerabilities, thus suggesting significant reduction in auditing costs.
Keywords: Security auditing | Static analysis | Vulnerability | Automated code fixing
مقاله انگلیسی
2240 Efficient CPR-type preconditioner and its adaptive strategies for large-scale parallel reservoir simulations
پیش پردازنده نوع CPR کارآمد و استراتژی های سازگار آن برای شبیه سازی مخزن موازی بزرگ در مقیاس بزرگ-2017
With the rapid development of high performance parallel computers and the increasing demands of large-scale reservoir simulation, the development of effective and fast solvers and preconditioners for parallel reservoir simulation has become increasingly important. The incomplete LU factorization (ILU) preconditioners are the most commonly used preconditioners in reservoir simulations due to their low computational cost. They have been implemented in commercial simulators as the default preconditioners. However, for reservoirs with highly heterogeneous permeability, the CPR (constrained pressure residual)-type preconditioners are more effective than the ILU preconditioners, especially when parallel computing is employed. The CPR-type preconditioners consist of multi-stages of preconditioning processes, which lead to huge computational costs. Employing the algebraic multigrid (AMG) method to solve a pressure system and the ILU method to solve the whole system has two indispensable stages. For parallel computation, due to the serial nature of the ILU method, the ILU method is usually combined with the restricted additive Schwarz (RAS) method and used as a subdomain solver. Different settings of the AMG and RAS methods, such as a grid coarsening strategy, interpolation and smoothing in the AMG method, and a subdomain solver and an overlap level in the RAS method, as well as different CPR-type preconditioners, yield significantly different performance. This paper first gives an overview of the CPR-type preconditioners and the AMG and RAS methods. Then a detailed comparison between different CPR-type preconditioners with different settings of the AMG and RAS methods is presented. Based on the comparison, the efficient settings of the AMG and RAS methods and the most efficient CPR-type preconditioner are given. Furthermore, an adaptive preconditioning strategy is designed to save the computational time. The adaptive preconditioning strategy introduces an indicator to measure the difficulty level of solving a linear system. According to difficulties, a RAS-ILU preconditioner or a CPR-type preconditioner is automatically and dynamically selected to achieve both efficiency and effectiveness.
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 2388 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 2388 :::::::: افراد آنلاین: 54