دانلود و نمایش مقالات مرتبط با being::صفحه 1
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - being

تعداد مقالات یافته شده: 1246
ردیف عنوان نوع
1 Decentralization Using Quantum Blockchain: A Theoretical Analysis
تمرکززدایی با استفاده از بلاک چین کوانتومی: یک تحلیل نظری-2022
Blockchain technology has been prominent recently due to its applications in cryptocurrency. Numerous decentralized blockchain applications have been possible due to blockchains’ nature of distributed, secured, and peer-to-peer storage. One of its technical pillars is using public-key cryptography and hash functions, which promise a secure, pseudoanonymous, and distributed storage with nonrepudiation. This security is believed to be difficult to break with classical computational powers. However, recent advances in quantum computing have raised the possibility of breaking these algorithms with quantum computers, thus, threatening the blockchains’ security. Quantum-resistant blockchains are being proposed as alternatives to resolve this issue. Some propose to replace traditional cryptography with postquantum cryptography—others base their approaches on quantum computer networks or quantum internets. Nonetheless, a new security infrastructure (e.g., access control/authentication) must be established before any of these could happen. This article provides a theoretical analysis of the quantum blockchain technologies that could be used for decentralized identity authentication. We put together a conceptual design for a quantum blockchain identity framework and give a review of the technical evidence. We investigate its essential components and feasibility, effectiveness, and limitations. Even though it currently has various limitations and challenges, we believe a decentralized perspective of quantum applications is noteworthy and likely.
INDEX TERMS: Blockchains | consensus protocol | decentralized applications | identity management systems | quantum computing | quantum networks.
مقاله انگلیسی
2 Internet of Things-enabled Passive Contact Tracing in Smart Cities
ردیابی تماس غیرفعال با قابلیت اینترنت اشیا در شهرهای هوشمند-2022
Contact tracing has been proven an essential practice during pandemic outbreaks and is a critical non-pharmaceutical intervention to reduce mortality rates. While traditional con- tact tracing approaches are gradually being replaced by peer-to-peer smartphone-based systems, the new applications tend to ignore the Internet-of-Things (IoT) ecosystem that is steadily growing in smart city environments. This work presents a contact tracing frame- work that logs smart space users’ co-existence using IoT devices as reference anchors. The design is non-intrusive as it relies on passive wireless interactions between each user’s carried equipment (e.g., smartphone, wearable, proximity card) with an IoT device by uti- lizing received signal strength indicators (RSSI). The proposed framework can log the iden- tities for the interacting pair, their estimated distance, and the overlapping time duration. Also, we propose a machine learning-based infection risk classification method to char- acterize each interaction that relies on RSSI-based attributes and contact details. Finally, the proposed contact tracing framework’s performance is evaluated through a real-world case study of actual wireless interactions between users and IoT devices through Bluetooth Low Energy advertising. The results demonstrate the system’s capability to accurately cap- ture contact between mobile users and assess their infection risk provided adequate model training over time. © 2021 Elsevier B.V. All rights reserved.
keywords: بلوتوث کم انرژی | ردیابی تماس | اینترنت اشیا | طبقه بندی خطر عفونت | Bluetooth Low Energy | Contact Tracing | Internet of Things | Infection Risk Classification
مقاله انگلیسی
3 Development of an Undergraduate Quantum Engineering Degree
توسعه یک مدرک کارشناسی مهندسی کوانتوم-2022
Quantum computing, communications, sensing, and simulations are radically transformative technologies, with great potential to impact industries and economies. Worldwide, national governments, industries, and universities are moving to create a new class of workforce—the Quantum Engineers. Demand for such engineers is predicted to be in the tens of thousands within a five-year timescale, far exceeding the rate at which the world’s universities can produce Ph.D. graduates in the discipline. How best to train this next generation of engineers is currently a matter of debate. Quantum mechanics—long a pillar of traditional physics undergraduate degrees—must now be merged with traditional engineering offerings. This article discusses the history, development, and the first year of operation of the world’s first undergraduate degree in quantum engineering to be grown out of an engineering curriculum. The main purpose of this article is to inform the wider discussion, now being held by many institutions worldwide, on how best to formally educate the Quantum Engineer.
INDEX TERMS: Degree | education | engineering | quantum | undergraduate.
مقاله انگلیسی
4 DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage
DOPIV: برون سپاری داده مبتنی بر هویت امن پس از کوانتومی با تأیید صحت عمومی در فضای ذخیره سازی ابری-2022
Public verification enables cloud users to employ a third party auditor (TPA) to check the data integrity. However, recent breakthrough results on quantum computers indicate that applying quantum computers in clouds would be realized. A majority of existing public verification schemes are based on conventional hardness assumptions, which are vulnerable to adversaries equipped with quantum computers in the near future. Moreover, new security issues need to be solved when an original data owner is restricted or cannot access the remote cloud server flexibly. In this paper, we propose an efficient identity-based data outsourcing with public integrity verification scheme (DOPIV) in cloud storage. DOPIV is designed on lattice-based cryptography, which achieves post-quantum security. DOPIV enables an original data owner to delegate a proxy to generate the signatures of data and outsource them to the cloud server. Any TPA can perform data integrity verification efficiently on behalf of the original data owner, without retrieving the entire data set. Additionally, DOPIV possesses the advantages of being identity-based systems, avoiding complex certificate management procedures. We provide security proofs of DOPIV in the random oracle model, and conduct a comprehensive performance evaluation to show that DOPIV is more practical in post-quantum secure cloud storage systems.
Index Terms: Cloud storage | public verification | lattice-based cryptography | identity-based data outsourcing | post-quantum security
مقاله انگلیسی
5 Tracking the northern seasonal cap retreat of mars using computer vision
ردیابی عقب نشینی کلاهک فصلی شمالی مریخ با استفاده از بینایی کامپیوتر-2022
Using polar stereographic images from the Mars Color Imager (MARCI), we use Python to autonomously track the Northern Polar Seasonal Cap (NPSC) recession from Mars Years (MY) 29 to MY 35 between Ls = 10° and Ls = 70°. We outline the cap and find an ellipse of best fit. We then compare our results to previously published recession rates, that were manually tracked, and find them to be consistent. Our process benefits from being automated, which increases the speed of tracking and allows us to monitor the recession with higher Ls fidelity than past studies. We find that most MYs have a local minimum recession rate at Ls = ~32° and a local maximum at Ls = ~51°. We also find that MY 30 experiences a rapid latitude increasing event that involves ~1° Ls of a rapid increase and ~5° Ls of slower recession, which then increases above the interannual average rate. We interpret this to be the result of a major sublimation driven by off-polar winds. We also discover divergent effects in the recession and size of the NPSC following the MY 28 and MY 35 global dust storms. MY 29’s cap is significantly smaller and retreats slower than the multi-year average, whereas MY 35’s cap is slighter larger and retreats very close to the average. We hypothesize that the diverging behavior of the caps in post-storm years can be a result of the differences in the date of onset and the duration of the storms.
مقاله انگلیسی
6 Spatiotemporal flow features in gravity currents using computer vision methods
ویژگی های جریان مکانی-زمانی در جریان های گرانشی با استفاده از روش های بینایی کامپیوتری-2022
Relationships between the features visually identified at the front of the flow’s current and parameters regarding its velocity and turbulence were observed in early experimental works on the characterization of gravity currents. Researches have associated front features, like lobes and clefts, with the flow’s turbulence, and have used these associations ever since. In more recent works using numerical simulations, these connections were still being validated for various flow parameters at higher front velocities. The majority of works regarding measurements at the front of a gravity current rely on the front’s images for making its analysis and establish relationships. Besides that, there is an interdisciplinary field related to computer science called computer vision, devoted to study how digital images can be analyzed and how these results can be automated. This paper describes the use of computer vision algorithms, particularly corner detection and optical flow, to automatically track features at the front of gravity currents, either from physical or numerical experiments. To determine the proposed approach’s accuracy, we establish a ground-truth method and apply it to numerical simulation results data sets. The technique used to trace the front features along the flow showed promising results, especially with higher Reynolds numbers flows.
keywords: جریان های گرانشی | ساختارهای لوب و شکاف | روش های کامپیوتری | ویژگی ردیابی | Gravitycurrents | Lobesandcleftsstructures | Computervisionmethods | Featurepointtracking
مقاله انگلیسی
7 Barriers to computer vision applications in pig production facilities
موانع برنامه های بینایی کامپیوتری در تاسیسات تولید خوک-2022
Surveillance and analysis of behavior can be used to detect and characterize health disruption and welfare status in animals. The accurate identification of changes in behavior is a time-consuming task for caretakers in large, commercial pig production systems and requires strong observational skills and a working knowledge of animal husbandry and livestock systems operations. In recent years, many studies have explored the use of various technologies and sensors to assist animal caretakers in monitoring animal activity and behavior. Of these technologies, computer vision offers the most consistent promise as an effective aid in animal care, and yet, a systematic review of the state of application of this technology indicates that there are many significant barriers to its widespread adoption and successful utilization in commercial production system settings. One of the most important of these barriers is the recognition of the sources of errors from objective behavior labeling that are not measurable by current algorithm performance evaluations. Additionally, there is a significant disconnect between the remarkable advances in computer vision research interests and the integration of advances and practical needs being instituted by scientific experts working in commercial animal production partnerships. This lack of synergy between experts in the computer vision and animal health and production sectors means that existing and emerging datasets tend to have a very particular focus that cannot be easily pivoted or extended for use in other contexts, resulting in a generality versus particularity conundrum. This goal of this paper is to help catalogue and consider the major obstacles and impediments to the effective use of computer vision associated technologies in the swine industry by offering a systematic analysis of computer vision applications specific to commercial pig management by reviewing and summarizing the following: (i) the purpose and associated challenges of computer vision applications in pig behavior analysis; (ii) the use of computer vision algorithms and datasets for pig husbandry and management tasks; (iii) the process of dataset construction for computer vision algorithm development. In this appraisal, we outline common difficulties and challenges associated with each of these themes and suggest possible solutions. Finally, we highlight the opportunities for future research in computer vision applications that can build upon existing knowledge of pig management by extending our capability to interpret pig behaviors and thereby overcome the current barriers to applying computer vision technologies to pig production systems. In conclusion, we believe productive collaboration between animal-based scientists and computer-based scientists may accelerate animal behavior studies and lead the computer vision technologies to commercial applications in pig production facilities.
keywords: بینایی کامپیوتر | دامپروری دقیق | رفتار - اخلاق | یادگیری عمیق | مجموعه داده | گراز | Computer vision | Precision livestock farming | Behavior | Deep learning | Dataset | Swine
مقاله انگلیسی
8 Cov-Net: A computer-aided diagnosis method for recognizing COVID-19 from chest X-ray images via machine vision
Cov-Net: یک روش تشخیصی به کمک رایانه برای تشخیص COVID-19 از تصاویر اشعه ایکس قفسه سینه از طریق بینایی ماشین-2022
In the context of global pandemic Coronavirus disease 2019 (COVID-19) that threatens life of all human beings, it is of vital importance to achieve early detection of COVID-19 among symptomatic patients. In this paper, a computer aided diagnosis (CAD) model Cov-Net is proposed for accurate recognition of COVID-19 from chest X-ray images via machine vision techniques, which mainly concentrates on powerful and robust feature learning ability. In particular, a modified residual network with asymmetric convolution and attention mechanism embedded is selected as the backbone of feature extractor, after which skip-connected dilated convolution with varying dilation rates is applied to achieve sufficient feature fusion among high-level semantic and low-level detailed information. Experimental results on two public COVID-19 radiography databases have demonstrated the practicality of proposed Cov-Net in accurate COVID-19 recognition with accuracy of 0.9966 and 0.9901, respectively. Furthermore, within same experimental conditions, proposed Cov-Net outperforms other six state-of-the-art computer vision algorithms, which validates the superiority and competitiveness of Cov-Net in building highly discriminative features from the perspective of methodology. Hence, it is deemed that proposed Cov-Net has a good generalization ability so that it can be applied to other CAD scenarios. Consequently, one can conclude that this work has both practical value in providing reliable reference to the radiologist and theoretical significance in developing methods to build robust features with strong presentation ability.
keywords: COVID-19 | Computer aided diagnosis (CAD) | Feature learning | Image recognition | Machine vision
مقاله انگلیسی
9 A computer vision framework using Convolutional Neural Networks for airport-airside surveillance
چارچوب بینایی کامپیوتری با استفاده از شبکه‌های عصبی کانولوشن برای نظارت در فرودگاه-2022
Modern airports often have large and complex airside environments featuring multiple runways, with changing configurations, numerous taxiways for effective circulation of flights and tens, if not hundreds, of gates. With inherent uncertainties in gate push-back and taxiway routing, efficient surveillance and management of airport-airside operations is a highly challenging task for air traffic controllers. An increase in air traffic may lead to gate delays, taxiway congestion, taxiway incursions as well as significant increase in the workload of air traffic controllers. With the advent of Digital Towers, airports are increasingly being equipped with surveillance camera systems. This paper proposes a novel computer vision framework for airport-airside surveillance, using cameras to monitor ground movement objects for safety enhancement and operational efficiency improvement. The framework adopts Convolutional Neural Networks and camera calibration techniques for aircraft detection and tracking, push-back prediction, and maneuvering monitoring. The proposed framework is applied on video camera feeds from Houston Airport, USA (for maneuvering monitoring) and Obihiro Airport, Japan (for push-back prediction). The object detection models of the proposed framework achieve up to 73.36% average precision on Houston airport and 87.3% on Obihiro airport. The framework estimates aircraft speed and distance with low error (up to 6 meters), and aircraft push-back is predicted with an average error of 3 min from the time an aircraft arrives with the error-rate reducing until the aircraft’s actual push-back event.
keywords: Air traffic control | Convolutional Neural Network | Computer vision
مقاله انگلیسی
10 Multilevel 2-D Quantum Wavelet Transforms
تبدیل موجک کوانتومی دو بعدی چندسطحی-2022
Wavelet transform is being widely used in classical image processing. One-dimension quantum wavelet transforms (QWTs) have been proposed. Generalizations of the 1-D QWT into multilevel and multidimension have been investigated but restricted to the quantum wavelet packet transform (QWPTs), which is the direct product of 1-D QWPTs, and there is no transform between the packets in different dimensions. A 2-D QWT is vital for image processing. We construct the multilevel 2-D QWT’s general theory. Explicitly, we built multilevel 2-D Haar QWT and the multilevel Daubechies D4 QWT, respectively. We have given the complete quantum circuits for these wavelet transforms, using both noniterative and iterative methods. Compared to the 1-D QWT and wavelet packet transform, the multilevel 2-D QWT involves the entanglement between components in different degrees. Complexity analysis reveals that the proposed transforms offer exponential speedup over their classical counterparts. Also, the proposed wavelet transforms are used to realize quantum image compression. Simulation results demonstrate that the proposed wavelet transforms are significant and obtain the same results as their classical counterparts with an exponential speedup.
Index Terms: Multilevel 2-D-Daubechies quantum wavelet transform (QWT) | multilevel 2-D-Haar QWT | quantum image processing.
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 4422 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 4422 :::::::: افراد آنلاین: 66