با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
41 |
The Present and Future of Discrete Logarithm Problems on Noisy Quantum Computers
حال و آینده مسائل لگاریتم گسسته در کامپیوترهای کوانتومی پر سر و صدا-2022 The discrete logarithm problem (DLP) is the basis for several cryptographic primitives. Since
Shor’s work, it has been known that the DLP can be solved by combining a polynomial-size quantum circuit
and a polynomial-time classical postprocessing algorithm. The theoretical result corresponds the situation
where a quantum device working with a medium number of qubits of very small errors can solve the DLP.
However, all the quantum devices that we can use have a limited number of noisy qubits, as of the noisy
intermediate-scale quantum (NISQ) era. Thus, evaluating the instance size that the latest quantum device can
solve and giving a future prediction of the size along the progress of quantum devices are emerging research
topics. This article contains two proposals to discuss the performance of quantum devices against the DLP in
the NISQ era: 1) a quantitative measure based on the success probability of the postprocessing algorithm to
determine whether an experiment on a quantum device (or a classical simulator) succeeded; and 2) a procedure to modify bit strings observed from a Shor’s circuit to increase the success probability of a lattice-based
postprocessing algorithm. In this article, we conducted our experiments with the ibm_kawasaki device
and discovered that the simplest circuit (7 qubits) from a 2-bit DLP instance achieves a sufficiently high
success probability to proclaim the experiment successful. Experiments on another circuit from a slightly
harder 2-bit DLP instance, on the other hand, did not succeed, and we determined that reducing the noise
level by half is required to achieve a successful experiment. Finally, we give a near-term prediction based on
required noise levels to solve some selected small DLPs and integer factoring instances.
INDEX TERMS: Discrete logarithm problem (DLP) | IBM quantum | lattice | postprocessing method | Shor’s algorithm. |
مقاله انگلیسی |
42 |
Topological-Graph Dependencies and Scaling Properties of a Heuristic Qubit-Assignment Algorithm
وابستگیهای نمودار توپولوژیکی و ویژگیهای مقیاسبندی الگوریتم تخصیص کیوبیت اکتشافی-2022 The qubit-mapping problem aims to assign and route qubits of a quantum circuit onto an
noisy intermediate-scale quantum (NISQ) device in an optimized fashion, with respect to some cost function.
Finding an optimal solution to this problem is known to scale exponentially in computational complexity; as
such, it is imperative to investigate scalable qubit-mapping solutions for NISQ computation. In this work, a
noise-aware heuristic qubit-assignment algorithm (which assigns initial placements for qubits in a quantum
algorithm to qubits on an NISQ device, but does not route qubits during the quantum algorithm’s execution)
is presented and compared against the optimal brute-force solution, as well as a trivial qubit assignment,
with the aim to quantify the performance of our heuristic qubit-assignment algorithm. We find that for small,
connected-graph algorithms, our heuristic-assignment algorithm faithfully lies in between the effective upper
and lower bounds given by the brute-force and trivial qubit-assignment algorithms. Additionally, we find that
the topological-graph properties of quantum algorithms with over six qubits play an important role in our
heuristic qubit-assignment algorithm’s performance on NISQ devices. Finally, we investigate the scaling
properties of our heuristic algorithm for quantum processors with up to 100 qubits; here, the algorithm
was found to be scalable for quantum-algorithms that admit path-like graphs. Our findings show that as the
size of the quantum processor in our simulation grows, so do the benefits from utilizing the heuristic qubitassignment algorithm, under particular constraints for our heuristic algorithm. This work, thus, characterizes
the performance of a heuristic qubit-assignment algorithm with respect to the topological-graph and scaling
properties of a quantum algorithm that one may wish to run on a given NISQ device.
INDEX TERMS: Quantum computing | qubit-mapping problem. |
مقاله انگلیسی |
43 |
Ontological Approach for Semantic Modelling of Malay Translated Qur’an
رویکرد هستیشناختی برای مدلسازی معنایی قرآن ترجمهشده مالایی-2022 This thesis contributes to the areas of ontology development and analysis, natural
language processing (NLP), Information Retrieval (IR) and Language Resource
and Corpus Development.
Research in Natural Language Processing and semantic search for English has
shown successful results for more than a decade. However, it is difficult to adapt
those techniques to the Malay language, because its complex morphology and orthographic forms are very different from English. Moreover, limited resources and
tools for computational linguistic analysis are available for Malay. In this thesis,
we address those issues and challenges by proposing MyQOS,the Malay Qur’an
Ontology System, a prototype ontology-based IR with semantics for representing
and accessing a Malay translation of the Qur’an. This supports the development
of a semantic search engine and a question answering system and provides a framework for storing and accessing a Malay language corpus and providing computational linguistics resources. The primary use of MyQOS in the current research
is for creating and improving the quality and accuracy of the query mechanism
to retrieve information embedded in the Malay text of the Qur’an translation.
To demonstrate the feasibility of this approach, we describe a new architecture
of morphological analysis for MyQOS and query algorithms based on MyQOS.
Data analysis that consisted of two measures; precision and recall, where data
was obtained from MyQOS Corpus conducted in three search engines. The precision and recall for semantic search are 0.8409 (84%) and 0.8043(80%), double
the results of the question answer search which are 0.4971(50%) for precision and
0.6027 (60%) for recall. The semantic search gives high precision and high recall
comparing the other two methods. This indicates that semantic search returns
more relevant results than irrelevant ones. To conclude, this research is among
research in the retrieval of the Qur’an texts in the Malay language that managed
to outline state-of-the-art information retrieval system models. Thus, the use of
MyQOS will help Malay readers to understand the Qur’an in better ways. Furthermore, the creation of a Malay language corpus and computational linguistics
resources will benefit other researchers, especially in religious texts, morphological
analysis and semantic modelling. |
مقاله انگلیسی |
44 |
LoRaWAN-Based IoT System Implementation for Long-Range Outdoor Air Quality Monitoring
پیاده سازی سیستم اینترنت اشیاء مبتنی بر LoRaWAN برای نظارت بر کیفیت هوای خارج از منزل در محدوده بلند-2022 This study proposes a smart long-range (LoRa) sensing node to timely collect the air quality in-
formation and update it on the cloud. The developed long-range wide area network (LoRaWAN)-
based Internet of Things (IoT) air quality monitoring system (AQMS), hereafter called LoRaWAN-
IoT-AQMS, was deployed in an outdoor environment to validate its reliability and effectiveness.
The system is composed of multiple sensors (NO2, SO2, CO2, CO, PM2.5, temperature, and hu-
midity), Arduino microcontroller, LoRa shield, LoRaWAN gateway, and The Thing Network
(TTN) IoT platform. The LoRaWAN-IoT-AQMS is a standalone system powered continuously by a
rechargeable battery with a photovoltaic solar panel via a solar charger shield for sustainable
operation. Our system simultaneously gathers the considered air quality information by using the
smart sensing unit. Then, the system transmits the information through the gateway to the TTN
platform, which is integrated with the ThingSpeak IoT server. This action updates the collected
data and displays these data on a developed Web-based dashboard and a Graphical User Interface
(GUI) that uses the Virtuino mobile application. Thus, the displayed information can be easily
accessed by users via their smartphones. The results obtained by the developed LoRaWAN-IoT-
AQMS are validated by comparing them with experimental results based on the high-
technology Aeroqual air quality monitoring devices. Our system can reliably monitor various
air quality indicators and efficiently transmit the information in real time over the Internet. keywords: پایش کیفیت هوا | Air quality monitoring | Iot lora lorawan | TTN ThingSpeak Virtuino |
مقاله انگلیسی |
45 |
Securing wireless communications from the perspective of physical layer: A survey
ایمن سازی ارتباطات بی سیم از دیدگاه لایه فیزیکی: یک مرور-2022 Ultra-reliability low-latency communication (uRLLC) is a new service category of the fifthgeneration (5G) mobile wireless networks, also plays a crucial role in the sixth-generation (6G)
networks. Given the openness of the wireless environment, the security and confidentiality of
uRLLC are of utmost important. Since traditional cryptography methods often feature significant
complex designs and processing delays, physical layer security (PLS) technologies exploiting the
inherent properties of the wireless medium have become a promising solution to secure wireless
communications. However, most existing PLS methods assume a finite block-length regime,
which cannot cater to uRLLC with short block-lengths. In this paper, the PLS technologies for
uRLLC were comprehensively investigated. First, we reviewed the typical characteristics of the
next-generation mobile networks and analyzed the threats faced by the physical layer. Then,
we introduced the traditional solutions and performance metrics of PLS with a finite blocklength regime. Furthermore, we discussed several physical layer technologies and observed their
influence on PLS. Additionally, this study also analyzed the impact of the unique characteristics
of 5G networks on communication securit, such as the mobility.
Keywords: uRLLC | Wireless networks | Security and confidentiality | PLS | Finite block-length |
مقاله انگلیسی |
46 |
Single-lead ECG based multiscale neural network for obstructive sleep apnea detection
شبکه عصبی چند مقیاسی مبتنی بر ECG تک سرب برای تشخیص آپنه انسدادی خواب-2022 Obstructive sleep apnea (OSA) is a common sleep disorder characterized by frequent cessation
of breathing during sleep, which cannot be easily diagnosed at the early stage due to the
complexity and labor intensity of the polysomnography (PSG). Using a ECG device for OSA
detection provides a convenient solution in the current Internet of Things scenario. However,
previous intelligent analysis algorithms mainly rely on single scale network, therefore the
discriminative ECG representations cannot be identified, which affects the accuracy of OSA
detection. We report a multiscale neural network URNet for OSA detection by optimizing the
deep learning networks and integrating Unet with ResNet. The URNet automatically extracts
delicate features from the RR interval of single-lead ECG and processes convolution blocks with
different scales by skip connections, so that the network can fuse features collected from both
shallow and deep levels. For each OSA segment identification, URNet achieves an accuracy
of 90.4%, a sensitivity of 83.3%, a specificity of 94.8% and an F1 of 89.6% on the ApneaECG dataset. The result indicates that our approach provides major improvements compared to
the state-of-the-art methods. The URNet model proposed in this study for unobstructive OSA
detection has good potential application in daily sleep health.
Keywords: Wearable ECG | Obstructive sleep apnea | Multi-scale neural network | Deep learning |
مقاله انگلیسی |
47 |
5G network slice for digital real-time healthcare system powered by network data analytics
برش شبکه 5G برای سیستم دیجیتال مراقبت بهداشتی بلادرنگ طراحی شده توسط تجزیه و تحلیل داده های شبکه-2022 In the wake of the COVID-19 pandemic, where almost the entire global healthcare ecosystem struggled to handle
patients, it’s evident that the healthcare segment needs a virtual real-time digital support system. The recent
advancements in technology have enabled machine-to-machine communication, enhanced mobile broadband,
and real-time biometric data analytics. These could potentially fulfill the requirements of an end-to-end digital
healthcare system. For building such a system, there is also a need for a dedicated and specialized communication
network. Such a system will not only support dynamic throughput, latency and payload but also provide guaranteed QoS (Quality of Service) at every instant. The motive of our study was to define an implementable lowlevel architecture for the digital healthcare system by using the 5G Network Slice that incorporates all these
features. Best-in-class wearable devices will collect the biometric data and transmit it via the 5G network slice.
Data analytics is then applied to the collected data to build a knowledge graph used for quick predictions and
prescriptions. The architecture also keeps in mind the security and integrity aspects of healthcare data.
Keywords: 5G network slice | Slice dimensioning | Digital healthcare | Network data analytics framework | IoMT |
مقاله انگلیسی |
48 |
A jamming attack detection technique for opportunistic networks
یک تکنیک تشخیص حمله پارازیت برای شبکه های فرصت طلب-2022 Opportunistic networks (OppNets) are dispersed in nature, with nodes acting as resource
restrictions, with intermittent connectivity. These nodes are subject to various types of attacks,
posing a security risk in data transmission. One of the most common attacks that cause jamming
among the message forwarding nodes in infrastructure-less networks is Denial of Service (DoS)
attack. Most of the methods addressing this type of attack rely on cryptographic algorithms,
which are too difficult to implement. In this paper, a novel jamming attack detection technique
(JADT) for OppNets, is proposed, which relies on the use of some statistical measures collected
from the relay nodes and a prescribed threshold on the packet delivery ratio (PDR) to discover
a jamming attack while decrypting the acknowledgement, stopping the message transmission
and rebroadcasting the message through a different channel. The proposed JADT is evaluated
using the ONE simulator, showing its superiority against the Fuzzy Geocasting mechanism in
Opportunistic Networks (F-GSAF) scheme in terms of packet delivery ratio and overhead ratio,
under varying TTL and buffer size.
Keywords: Jamming detection | Opportunistic networks | Routing | Statistical information | Energy |
مقاله انگلیسی |
49 |
Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectives
امضای دیجیتالی پیشرفته برای حفظ حریم خصوصی و مدیریت اعتماد در اینترنت اشیا ناهمگون سلسله مراتبی: طبقه بندی، قابلیت ها و اهداف-2022 Internet of Things (IoT) systems in different areas, such as manufacturing, transportation, and
healthcare, are the convergence of several technologies. There are many concerns about security
and privacy drawbacks in IoT systems. Apart from confidentiality supported by encryption
primitives, authenticity and non-repudiation are of utmost importance. IoT entities generally
use conventional digital signature schemes to achieve imperative goals. However, there are
some state-of-the-art digital signatures with more functionalities, IoT-friendly properties, and
privacy-preserving features.
This survey paper aims to accelerate the adoption of advanced digital signatures. We bridge the gap between the advanced theoretical digital signatures recently designed in cryptographic oriented papers and the applied IoT systems. It aids researchers in achieving more security, privacy as well as some unique functionality aspects. First, we illustrate the benefits of the hierarchical and heterogeneous IoT architecture supporting the end-edge-fog-cloud continuum accompanying blockchain technology. Second, our survey delves into five state-of-the-art digital signatures, including randomizable, keyless, double-authentication-prevention, sanitizable, and redactable schemes, that are aligned with entities in IoT systems. We provide an outline, taxonomy, comparison table, and diverse IoT-based use cases for each of them. Then, the integration of primitives and the relationship diagrams give guidelines to help select the appropriate advanced digital signatures and highlights how researchers can use them with different IoT entities for preserving privacy and management of trust. keywords: امضای دیجیتالی | حفظ حریم خصوصی اینترنت اشیا | بلاک چین | محاسبات ابری | Digital signature | IoT Privacy-preserving | Blockchain | Cloud computing |
مقاله انگلیسی |
50 |
An integrated solution of software and hardware for environmental monitoring
راه حل یکپارچه نرم افزاری و سخت افزاری برای نظارت محیطی-2022 With the expansion of the Internet of Things (IoT), several monitoring solutions are available
in the market. However, most solutions use proprietary software, which is costly and do not
provide online monitoring, hampering data access and hindering preventive actions. This article
presents LimnoStation, a low-cost integrated hardware and software solution that employs IoT
concepts with LoRaWan, whose main objective is to monitor environmental and oceanographic
data from surface and submerged sensors, which can be accessed online and has low-power
consumption. Long-distance transmission tests were performed analyzing battery consumption
and readings taken by the LimnoStation sensors. The results show that the average error of
sensor readings was 0.51%, with a battery life of more than 2900 days and costing about 100
times less compared to commercial sensors. The evaluation of the LimnoStation showed that it
is viable not only for academic use, but also as a replacement for presenting lower cost, high
reliability, greater integration, and more functionality than most solutions found on the market.
Keywords: IoT | LoRaWan | LoRa | Environmental monitoring |
مقاله انگلیسی |