دانلود و نمایش مقالات مرتبط با graph::صفحه 5
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - graph

تعداد مقالات یافته شده: 1719
ردیف عنوان نوع
41 The Present and Future of Discrete Logarithm Problems on Noisy Quantum Computers
حال و آینده مسائل لگاریتم گسسته در کامپیوترهای کوانتومی پر سر و صدا-2022
The discrete logarithm problem (DLP) is the basis for several cryptographic primitives. Since Shor’s work, it has been known that the DLP can be solved by combining a polynomial-size quantum circuit and a polynomial-time classical postprocessing algorithm. The theoretical result corresponds the situation where a quantum device working with a medium number of qubits of very small errors can solve the DLP. However, all the quantum devices that we can use have a limited number of noisy qubits, as of the noisy intermediate-scale quantum (NISQ) era. Thus, evaluating the instance size that the latest quantum device can solve and giving a future prediction of the size along the progress of quantum devices are emerging research topics. This article contains two proposals to discuss the performance of quantum devices against the DLP in the NISQ era: 1) a quantitative measure based on the success probability of the postprocessing algorithm to determine whether an experiment on a quantum device (or a classical simulator) succeeded; and 2) a procedure to modify bit strings observed from a Shor’s circuit to increase the success probability of a lattice-based postprocessing algorithm. In this article, we conducted our experiments with the ibm_kawasaki device and discovered that the simplest circuit (7 qubits) from a 2-bit DLP instance achieves a sufficiently high success probability to proclaim the experiment successful. Experiments on another circuit from a slightly harder 2-bit DLP instance, on the other hand, did not succeed, and we determined that reducing the noise level by half is required to achieve a successful experiment. Finally, we give a near-term prediction based on required noise levels to solve some selected small DLPs and integer factoring instances.
INDEX TERMS: Discrete logarithm problem (DLP) | IBM quantum | lattice | postprocessing method | Shor’s algorithm.
مقاله انگلیسی
42 Topological-Graph Dependencies and Scaling Properties of a Heuristic Qubit-Assignment Algorithm
وابستگی‌های نمودار توپولوژیکی و ویژگی‌های مقیاس‌بندی الگوریتم تخصیص کیوبیت اکتشافی-2022
The qubit-mapping problem aims to assign and route qubits of a quantum circuit onto an noisy intermediate-scale quantum (NISQ) device in an optimized fashion, with respect to some cost function. Finding an optimal solution to this problem is known to scale exponentially in computational complexity; as such, it is imperative to investigate scalable qubit-mapping solutions for NISQ computation. In this work, a noise-aware heuristic qubit-assignment algorithm (which assigns initial placements for qubits in a quantum algorithm to qubits on an NISQ device, but does not route qubits during the quantum algorithm’s execution) is presented and compared against the optimal brute-force solution, as well as a trivial qubit assignment, with the aim to quantify the performance of our heuristic qubit-assignment algorithm. We find that for small, connected-graph algorithms, our heuristic-assignment algorithm faithfully lies in between the effective upper and lower bounds given by the brute-force and trivial qubit-assignment algorithms. Additionally, we find that the topological-graph properties of quantum algorithms with over six qubits play an important role in our heuristic qubit-assignment algorithm’s performance on NISQ devices. Finally, we investigate the scaling properties of our heuristic algorithm for quantum processors with up to 100 qubits; here, the algorithm was found to be scalable for quantum-algorithms that admit path-like graphs. Our findings show that as the size of the quantum processor in our simulation grows, so do the benefits from utilizing the heuristic qubitassignment algorithm, under particular constraints for our heuristic algorithm. This work, thus, characterizes the performance of a heuristic qubit-assignment algorithm with respect to the topological-graph and scaling properties of a quantum algorithm that one may wish to run on a given NISQ device.
INDEX TERMS: Quantum computing | qubit-mapping problem.
مقاله انگلیسی
43 Ontological Approach for Semantic Modelling of Malay Translated Qur’an
رویکرد هستی‌شناختی برای مدل‌سازی معنایی قرآن ترجمه‌شده مالایی-2022
This thesis contributes to the areas of ontology development and analysis, natural language processing (NLP), Information Retrieval (IR) and Language Resource and Corpus Development. Research in Natural Language Processing and semantic search for English has shown successful results for more than a decade. However, it is difficult to adapt those techniques to the Malay language, because its complex morphology and orthographic forms are very different from English. Moreover, limited resources and tools for computational linguistic analysis are available for Malay. In this thesis, we address those issues and challenges by proposing MyQOS,the Malay Qur’an Ontology System, a prototype ontology-based IR with semantics for representing and accessing a Malay translation of the Qur’an. This supports the development of a semantic search engine and a question answering system and provides a framework for storing and accessing a Malay language corpus and providing computational linguistics resources. The primary use of MyQOS in the current research is for creating and improving the quality and accuracy of the query mechanism to retrieve information embedded in the Malay text of the Qur’an translation. To demonstrate the feasibility of this approach, we describe a new architecture of morphological analysis for MyQOS and query algorithms based on MyQOS. Data analysis that consisted of two measures; precision and recall, where data was obtained from MyQOS Corpus conducted in three search engines. The precision and recall for semantic search are 0.8409 (84%) and 0.8043(80%), double the results of the question answer search which are 0.4971(50%) for precision and 0.6027 (60%) for recall. The semantic search gives high precision and high recall comparing the other two methods. This indicates that semantic search returns more relevant results than irrelevant ones. To conclude, this research is among research in the retrieval of the Qur’an texts in the Malay language that managed to outline state-of-the-art information retrieval system models. Thus, the use of MyQOS will help Malay readers to understand the Qur’an in better ways. Furthermore, the creation of a Malay language corpus and computational linguistics resources will benefit other researchers, especially in religious texts, morphological analysis and semantic modelling.
مقاله انگلیسی
44 LoRaWAN-Based IoT System Implementation for Long-Range Outdoor Air Quality Monitoring
پیاده سازی سیستم اینترنت اشیاء مبتنی بر LoRaWAN برای نظارت بر کیفیت هوای خارج از منزل در محدوده بلند-2022
This study proposes a smart long-range (LoRa) sensing node to timely collect the air quality in- formation and update it on the cloud. The developed long-range wide area network (LoRaWAN)- based Internet of Things (IoT) air quality monitoring system (AQMS), hereafter called LoRaWAN- IoT-AQMS, was deployed in an outdoor environment to validate its reliability and effectiveness. The system is composed of multiple sensors (NO2, SO2, CO2, CO, PM2.5, temperature, and hu- midity), Arduino microcontroller, LoRa shield, LoRaWAN gateway, and The Thing Network (TTN) IoT platform. The LoRaWAN-IoT-AQMS is a standalone system powered continuously by a rechargeable battery with a photovoltaic solar panel via a solar charger shield for sustainable operation. Our system simultaneously gathers the considered air quality information by using the smart sensing unit. Then, the system transmits the information through the gateway to the TTN platform, which is integrated with the ThingSpeak IoT server. This action updates the collected data and displays these data on a developed Web-based dashboard and a Graphical User Interface (GUI) that uses the Virtuino mobile application. Thus, the displayed information can be easily accessed by users via their smartphones. The results obtained by the developed LoRaWAN-IoT- AQMS are validated by comparing them with experimental results based on the high- technology Aeroqual air quality monitoring devices. Our system can reliably monitor various air quality indicators and efficiently transmit the information in real time over the Internet.
keywords: پایش کیفیت هوا | Air quality monitoring | Iot lora lorawan | TTN ThingSpeak Virtuino
مقاله انگلیسی
45 Securing wireless communications from the perspective of physical layer: A survey
ایمن سازی ارتباطات بی سیم از دیدگاه لایه فیزیکی: یک مرور-2022
Ultra-reliability low-latency communication (uRLLC) is a new service category of the fifthgeneration (5G) mobile wireless networks, also plays a crucial role in the sixth-generation (6G) networks. Given the openness of the wireless environment, the security and confidentiality of uRLLC are of utmost important. Since traditional cryptography methods often feature significant complex designs and processing delays, physical layer security (PLS) technologies exploiting the inherent properties of the wireless medium have become a promising solution to secure wireless communications. However, most existing PLS methods assume a finite block-length regime, which cannot cater to uRLLC with short block-lengths. In this paper, the PLS technologies for uRLLC were comprehensively investigated. First, we reviewed the typical characteristics of the next-generation mobile networks and analyzed the threats faced by the physical layer. Then, we introduced the traditional solutions and performance metrics of PLS with a finite blocklength regime. Furthermore, we discussed several physical layer technologies and observed their influence on PLS. Additionally, this study also analyzed the impact of the unique characteristics of 5G networks on communication securit, such as the mobility.
Keywords: uRLLC | Wireless networks | Security and confidentiality | PLS | Finite block-length
مقاله انگلیسی
46 Single-lead ECG based multiscale neural network for obstructive sleep apnea detection
شبکه عصبی چند مقیاسی مبتنی بر ECG تک سرب برای تشخیص آپنه انسدادی خواب-2022
Obstructive sleep apnea (OSA) is a common sleep disorder characterized by frequent cessation of breathing during sleep, which cannot be easily diagnosed at the early stage due to the complexity and labor intensity of the polysomnography (PSG). Using a ECG device for OSA detection provides a convenient solution in the current Internet of Things scenario. However, previous intelligent analysis algorithms mainly rely on single scale network, therefore the discriminative ECG representations cannot be identified, which affects the accuracy of OSA detection. We report a multiscale neural network URNet for OSA detection by optimizing the deep learning networks and integrating Unet with ResNet. The URNet automatically extracts delicate features from the RR interval of single-lead ECG and processes convolution blocks with different scales by skip connections, so that the network can fuse features collected from both shallow and deep levels. For each OSA segment identification, URNet achieves an accuracy of 90.4%, a sensitivity of 83.3%, a specificity of 94.8% and an F1 of 89.6% on the ApneaECG dataset. The result indicates that our approach provides major improvements compared to the state-of-the-art methods. The URNet model proposed in this study for unobstructive OSA detection has good potential application in daily sleep health.
Keywords: Wearable ECG | Obstructive sleep apnea | Multi-scale neural network | Deep learning
مقاله انگلیسی
47 5G network slice for digital real-time healthcare system powered by network data analytics
برش شبکه 5G برای سیستم دیجیتال مراقبت بهداشتی بلادرنگ طراحی شده توسط تجزیه و تحلیل داده های شبکه-2022
In the wake of the COVID-19 pandemic, where almost the entire global healthcare ecosystem struggled to handle patients, it’s evident that the healthcare segment needs a virtual real-time digital support system. The recent advancements in technology have enabled machine-to-machine communication, enhanced mobile broadband, and real-time biometric data analytics. These could potentially fulfill the requirements of an end-to-end digital healthcare system. For building such a system, there is also a need for a dedicated and specialized communication network. Such a system will not only support dynamic throughput, latency and payload but also provide guaranteed QoS (Quality of Service) at every instant. The motive of our study was to define an implementable lowlevel architecture for the digital healthcare system by using the 5G Network Slice that incorporates all these features. Best-in-class wearable devices will collect the biometric data and transmit it via the 5G network slice. Data analytics is then applied to the collected data to build a knowledge graph used for quick predictions and prescriptions. The architecture also keeps in mind the security and integrity aspects of healthcare data.
Keywords: 5G network slice | Slice dimensioning | Digital healthcare | Network data analytics framework | IoMT
مقاله انگلیسی
48 A jamming attack detection technique for opportunistic networks
یک تکنیک تشخیص حمله پارازیت برای شبکه های فرصت طلب-2022
Opportunistic networks (OppNets) are dispersed in nature, with nodes acting as resource restrictions, with intermittent connectivity. These nodes are subject to various types of attacks, posing a security risk in data transmission. One of the most common attacks that cause jamming among the message forwarding nodes in infrastructure-less networks is Denial of Service (DoS) attack. Most of the methods addressing this type of attack rely on cryptographic algorithms, which are too difficult to implement. In this paper, a novel jamming attack detection technique (JADT) for OppNets, is proposed, which relies on the use of some statistical measures collected from the relay nodes and a prescribed threshold on the packet delivery ratio (PDR) to discover a jamming attack while decrypting the acknowledgement, stopping the message transmission and rebroadcasting the message through a different channel. The proposed JADT is evaluated using the ONE simulator, showing its superiority against the Fuzzy Geocasting mechanism in Opportunistic Networks (F-GSAF) scheme in terms of packet delivery ratio and overhead ratio, under varying TTL and buffer size.
Keywords: Jamming detection | Opportunistic networks | Routing | Statistical information | Energy
مقاله انگلیسی
49 Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectives
امضای دیجیتالی پیشرفته برای حفظ حریم خصوصی و مدیریت اعتماد در اینترنت اشیا ناهمگون سلسله مراتبی: طبقه بندی، قابلیت ها و اهداف-2022
Internet of Things (IoT) systems in different areas, such as manufacturing, transportation, and healthcare, are the convergence of several technologies. There are many concerns about security and privacy drawbacks in IoT systems. Apart from confidentiality supported by encryption primitives, authenticity and non-repudiation are of utmost importance. IoT entities generally use conventional digital signature schemes to achieve imperative goals. However, there are some state-of-the-art digital signatures with more functionalities, IoT-friendly properties, and privacy-preserving features.
This survey paper aims to accelerate the adoption of advanced digital signatures. We bridge the gap between the advanced theoretical digital signatures recently designed in cryptographic oriented papers and the applied IoT systems. It aids researchers in achieving more security, privacy as well as some unique functionality aspects. First, we illustrate the benefits of the hierarchical and heterogeneous IoT architecture supporting the end-edge-fog-cloud continuum accompanying blockchain technology. Second, our survey delves into five state-of-the-art digital signatures, including randomizable, keyless, double-authentication-prevention, sanitizable, and redactable schemes, that are aligned with entities in IoT systems. We provide an outline, taxonomy, comparison table, and diverse IoT-based use cases for each of them. Then, the integration of primitives and the relationship diagrams give guidelines to help select the appropriate advanced digital signatures and highlights how researchers can use them with different IoT entities for preserving privacy and management of trust.
keywords: امضای دیجیتالی | حفظ حریم خصوصی اینترنت اشیا | بلاک چین | محاسبات ابری | Digital signature | IoT Privacy-preserving | Blockchain | Cloud computing
مقاله انگلیسی
50 An integrated solution of software and hardware for environmental monitoring
راه حل یکپارچه نرم افزاری و سخت افزاری برای نظارت محیطی-2022
With the expansion of the Internet of Things (IoT), several monitoring solutions are available in the market. However, most solutions use proprietary software, which is costly and do not provide online monitoring, hampering data access and hindering preventive actions. This article presents LimnoStation, a low-cost integrated hardware and software solution that employs IoT concepts with LoRaWan, whose main objective is to monitor environmental and oceanographic data from surface and submerged sensors, which can be accessed online and has low-power consumption. Long-distance transmission tests were performed analyzing battery consumption and readings taken by the LimnoStation sensors. The results show that the average error of sensor readings was 0.51%, with a battery life of more than 2900 days and costing about 100 times less compared to commercial sensors. The evaluation of the LimnoStation showed that it is viable not only for academic use, but also as a replacement for presenting lower cost, high reliability, greater integration, and more functionality than most solutions found on the market.
Keywords: IoT | LoRaWan | LoRa | Environmental monitoring
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 3155 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 3155 :::::::: افراد آنلاین: 70