با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
Intelligent authentication of 5G healthcare devices: A survey
احراز هویت هوشمند دستگاه های مراقبت بهداشتی 5G: یک مرور-2022 The dynamic nature of wireless links and the mobility of devices connected to the Internet of
Things (IoT) over fifth-generation (5G) networks (IoT-5G), on the one hand, empowers pervasive
healthcare applications. On the other hand, it allows eavesdroppers and other illegitimate
actors to access secret information. Due to the poor time efficiency and high computational
complexity of conventional cryptographic methods and the heterogeneous technologies used,
it is easy to compromise the authentication of lightweight wearable and healthcare devices.
Therefore, intelligent authentication, which relies on artificial intelligence (AI), and sufficient
network resources are extremely important for securing healthcare devices connected to IoT-
5G. This survey considers intelligent authentication and includes a comprehensive overview of
intelligent authentication mechanisms for securing IoT-5G devices deployed in the healthcare
domain. First, it presents a detailed, thoughtful, and state-of-the-art review of IoT-5G, healthcare
technologies, tools, applications, research trends, challenges, opportunities, and solutions. We
selected 20 technical articles from those surveyed based on their strong overlaps with IoT,
5G, healthcare, device authentication, and AI. Second, IoT-5G device authentication, radiofrequency fingerprinting, and mutual authentication are reviewed, characterized, clustered,
and classified. Third, the review envisions that AI can be used to integrate the attributes
of the physical layer and 5G networks to empower intelligent healthcare devices. Moreover,
methods for developing intelligent authentication models using AI are presented. Finally, the
future outlook and recommendations are introduced for IoT-5G healthcare applications, and
recommendations for further research are presented as well. The remarkable contributions and
relevance of this survey may assist the research community in understanding the research gaps
and the research opportunities relating to the intelligent authentication of IoT-5G healthcare
devices.
keywords: اینترنت اشیا (IoT) | امنیت اینترنت اشیا | احراز هویت دستگاه | هوش مصنوعی | امنیت مراقبت های بهداشتی | شبکه های 5g | InternetofThings(IoT) | InternetofThingssecurity | Deviceauthentication | Artificialintelligence | Healthcaresecurity | 5Gnetworks |
مقاله انگلیسی |
2 |
Intelligent context-aware fog node discovery
کشف گره مه آگاه از زمینه هوشمند-2022 Fog computing has been proposed as a mechanism to address certain issues in
cloud computing such as latency, storage, network bandwidth, etc. Fog computing brings the processing, storage, and networking to the edge of the network
near the edge devices, which we called fog consumers. This decreases latency,
network bandwidth, and response time. Discovering the most relevant fog node,
the nearest one to the fog consumers, is a critical challenge that is yet to be addressed by the research. In this study, we present the Intelligent and Distributed
Fog node Discovery mechanism (IDFD) which is an intelligent approach to enable fog consumers to discover appropriate fog nodes in a context-aware manner.
The proposed approach is based on the distributed fog registries between fog consumers and fog nodes that can facilitate the discovery process of fog nodes. In
this study, the KNN, K-d tree, and brute force algorithms are used to discover
fog nodes based on the context-aware criteria of fog nodes and fog consumers.
The proposed framework is simulated using OMNET++, and the performance of
the proposed algorithms is compared based on performance metrics and execution
time. The accuracy and execution time are the major points of consideration in
the selection of an optimal fog search algorithm. The experiment results show
that the KNN and K-d tree algorithms achieve the same accuracy results of 95 %.
However, the K-d tree method takes less time to find the nearest fog nodes than
KNN and brute force. Thus, the K-d tree is selected as the fog search algorithm
in the IDFD to discover the nearest fog nodes very efficiently and quickly.
keywords: Fog node | Discovery | Context-aware | Intelligent | Fog node discovery |
مقاله انگلیسی |
3 |
Deep Reinforcement Learning With Quantum-Inspired Experience Replay
یادگیری تقویتی عمیق با تکرار تجربه کوانتومی-2022 In this article, a novel training paradigm inspired
by quantum computation is proposed for deep reinforcement
learning (DRL) with experience replay. In contrast to the traditional experience replay mechanism in DRL, the proposed DRL
with quantum-inspired experience replay (DRL-QER) adaptively
chooses experiences from the replay buffer according to the
complexity and the replayed times of each experience (also
called transition), to achieve a balance between exploration and
exploitation. In DRL-QER, transitions are first formulated in
quantum representations and then the preparation operation
and depreciation operation are performed on the transitions.
In this process, the preparation operation reflects the relationship between the temporal-difference errors (TD-errors) and the
importance of the experiences, while the depreciation operation is
taken into account to ensure the diversity of the transitions. The
experimental results on Atari 2600 games show that DRL-QER
outperforms state-of-the-art algorithms, such as DRL-PER and
DCRL on most of these games with improved training efficiency
and is also applicable to such memory-based DRL approaches
as double network and dueling network.
Index Terms: Deep reinforcement learning (DRL) | quantum computation | quantum-inspired experience replay (QER) | quantum reinforcement learning. |
مقاله انگلیسی |
4 |
Efficient Quantum Blockchain With a Consensus Mechanism QDPoS
بلاک چین کوانتومی کارآمد با مکانیزم اجماع QDPoS-2022 Quantum blockchain is expected to offer an alternative to classical blockchain to resist malicious attacks laughed by future quantum computers. Although a few quantum blockchain schemes have been constructed, their efficiency is low and unable to meet application requirements due to the fact that they lack of a suitable consensus mechanism. To tackle this issue, a consensus mechanism called quantum delegated proof of stake (QDPoS) is constructed by using quantum voting to provide fast decentralization for the quantum blockchain scheme at first. Then an efficient scheme is proposed for quantum blockchain based on QDPoS, where the classical information is initialized as a part of each single quantum state and these quantum states are entangled to form the chain. Compared with previous methods, the designed quantum blockchain scheme is more complete and carried out with higher efficiency, which greatly contributes to better adapting to the challenges of the quantum era.
Index Terms: Quantum blockchain | consensus mechanism | QDPoS | quantum voting | quantum entanglement. |
مقاله انگلیسی |
5 |
Disintegration testing augmented by computer Vision technology
آزمایش تجزیه با فناوری Vision کامپیوتری تقویت شده است-2022 Oral solid dosage forms, specifically immediate release tablets, are prevalent in the pharmaceutical industry.
Disintegration testing is often the first step of commercialization and large-scale production of these dosage
forms. Current disintegration testing in the pharmaceutical industry, according to United States Pharmacopeia
(USP) chapter 〈701〉, only gives information about the duration of the tablet disintegration process. This infor-
mation is subjective, variable, and prone to human error due to manual or physical data collection methods via
the human eye or contact disks. To lessen the data integrity risk associated with this process, efforts have been
made to automate the analysis of the disintegration process using digital lens and other imaging technologies.
This would provide a non-invasive method to quantitatively determine disintegration time through computer
algorithms. The main challenges associated with developing such a system involve visualization of tablet pieces
through cloudy and turbid liquid. The Computer Vision for Disintegration (CVD) system has been developed to
be used along with traditional pharmaceutical disintegration testing devices to monitor tablet pieces and
distinguish them from the surrounding liquid. The software written for CVD utilizes data captured by cameras or
other lenses then uses mobile SSD and CNN, with an OpenCV and FRCNN machine learning model, to analyze
and interpret the data. This technology is capable of consistently identifying tablets with ≥ 99.6% accuracy. Not
only is the data produced by CVD more reliable, but it opens the possibility of a deeper understanding of
disintegration rates and mechanisms in addition to duration. keywords: از هم پاشیدگی | اشکال خوراکی جامد | تست تجزیه | یادگیری ماشین | شبکه های عصبی | Disintegration | Oral Solid Dosage Forms | Disintegration Test | Machine Learning | Neural Networks |
مقاله انگلیسی |
6 |
Digital Twin-driven approach to improving energy efficiency of indoor lighting based on computer vision and dynamic BIM
رویکرد دیجیتال دوقلو برای بهبود بهره وری انرژی در روشنایی داخلی بر اساس بینایی کامپیوتر و BIM پویا-2022 Intelligent lighting systems and surveillance systems have become an important part of intelligent buildings. However, the current intelligent lighting system generally adopts independent sensor control and
does not perform multi-source heterogeneous data fusion with other digital systems. This paper fully
considers the linkage between the lighting system and the surveillance system and proposes a digital
twin lighting (DTL) system that mainly consists of three parts. Firstly, a visualized operation and maintenance (VO&M) platform for a DTL system was established based on dynamic BIM. Secondly, the environment perception, key-frame similarity judgment, and multi-channel key-frame cut and merge
mechanism were utilized to preprocess the video stream of the surveillance system in real-time.
Lastly, pedestrians detected using YOLOv4 and the ambient brightness perceived by the environment
perception mechanism were transmitted to the cloud database and were continuously read by the
VO&M platform. The intent here was to aid timely adaptive adjustment of the digital twin and realistic
lighting through the internet. The effectiveness of the proposed method was verified by experimenting
with a surveillance video stream for 14 days. The key results of the experiments are as follows: (1) the
accuracy rate of intelligent decision control reached 95.15%; (2) energy consumption and electricity costs
were reduced by approximately 79%; and (3) the hardware cost and energy consumption of detection
equipment and the time and cost of operation and maintenance (O&M) were greatly reduced.
keywords: Computer vision | Digital Twin | Dynamic BIM | Energy-efficient buildings | Intelligent lighting control |
مقاله انگلیسی |
7 |
Computer vision for anatomical analysis of equipment in civil infrastructure projects: Theorizing the development of regression-based deep neural networks
چشم انداز کامپیوتری برای تجزیه و تحلیل آناتومیکی تجهیزات در پروژه های زیرساختی عمرانی: نظریه پردازی توسعه شبکه های عصبی عمیق مبتنی بر رگرسیون-2022 There is high demand for heavy equipment in civil infrastructure projects and their performance is a determinant
of the successful delivery of site operations. Although manufacturers provide equipment performance hand-
books, additional monitoring mechanisms are required to depart from measuring performance on the sole basis
of unit cost for moved materials. Vision-based tracking and pose estimation can facilitate site performance
monitoring. This research develops several regression-based deep neural networks (DNNs) to monitor equipment
with the aim of ensuring safety, productivity, sustainability and quality of equipment operations. Annotated
image libraries are used to train and test several backbone architectures. Experimental results reveal the pre-
cision of DNNs with depthwise separable convolutions and computational efficiency of DNNs with channel
shuffle. This research provides scientific utility by developing a method for equipment pose estimation with the
ability to detect anatomical angles and critical keypoints. The practical utility of this study is the provision of
potentials to influence current practice of articulated machinery monitoring in projects. keywords: هوش مصنوعی (AI) | سیستم های فیزیکی سایبری | معیارهای ارزیابی خطا | طراحی و آزمایش تجربی | تخمین ژست کامل بدن | صنعت و ساخت 4.0 | الگوریتم های یادگیری ماشین | معماری های ستون فقرات شبکه | Artificial intelligence (AI) | Cyber physical systems | Error evaluation metrics | Experimental design and testing | Full body pose estimation | Industry and construction 4.0 | Machine learning algorithms | Network backbone architectures |
مقاله انگلیسی |
8 |
Cov-Net: A computer-aided diagnosis method for recognizing COVID-19 from chest X-ray images via machine vision
Cov-Net: یک روش تشخیصی به کمک رایانه برای تشخیص COVID-19 از تصاویر اشعه ایکس قفسه سینه از طریق بینایی ماشین-2022 In the context of global pandemic Coronavirus disease 2019 (COVID-19) that threatens life of all human
beings, it is of vital importance to achieve early detection of COVID-19 among symptomatic patients. In this
paper, a computer aided diagnosis (CAD) model Cov-Net is proposed for accurate recognition of COVID-19
from chest X-ray images via machine vision techniques, which mainly concentrates on powerful and robust
feature learning ability. In particular, a modified residual network with asymmetric convolution and attention
mechanism embedded is selected as the backbone of feature extractor, after which skip-connected dilated
convolution with varying dilation rates is applied to achieve sufficient feature fusion among high-level semantic
and low-level detailed information. Experimental results on two public COVID-19 radiography databases have
demonstrated the practicality of proposed Cov-Net in accurate COVID-19 recognition with accuracy of 0.9966
and 0.9901, respectively. Furthermore, within same experimental conditions, proposed Cov-Net outperforms
other six state-of-the-art computer vision algorithms, which validates the superiority and competitiveness of
Cov-Net in building highly discriminative features from the perspective of methodology. Hence, it is deemed
that proposed Cov-Net has a good generalization ability so that it can be applied to other CAD scenarios.
Consequently, one can conclude that this work has both practical value in providing reliable reference to the
radiologist and theoretical significance in developing methods to build robust features with strong presentation
ability.
keywords: COVID-19 | Computer aided diagnosis (CAD) | Feature learning | Image recognition | Machine vision |
مقاله انگلیسی |
9 |
On the Logical Error Rate of Sparse Quantum Codes
در مورد میزان خطای منطقی کدهای کوانتومی پراکنده-2022 The quantum paradigm presents a phenomenon known as degeneracy that can potentially
improve the performance of quantum error correcting codes. However, the effects of this mechanism are
sometimes ignored when evaluating the performance of sparse quantum codes and the logical error rate is
not always correctly reported. In this article, we discuss previously existing methods to compute the logical
error rate and we present an efficient coset-based method inspired by classical coding strategies to estimate
degenerate errors and distinguish them from logical errors. Additionally, we show that the proposed method
presents a computational advantage for the family of Calderbank–Shor–Steane codes. We use this method
to prove that degenerate errors are frequent in a specific family of sparse quantum codes, which stresses
the importance of accurately reporting their performance. Our results also reveal that the modified decoding
strategies proposed in the literature are an important tool to improve the performance of sparse quantum
codes.
INDEX TERMS: Iterative decoding | quantum error correction (QEC) | quantum low density generator matrix codes | quantum low-density parity check (QLDPC) codes. |
مقاله انگلیسی |
10 |
An exploration of local rules to map spawning processes to regular hardware architectures
کاوشی در قوانین محلی برای نگاشت فرآیندهای تخم ریزی به معماری های سخت افزاری معمولی-2022 This thesis presents an exploration of population growth via simulation in software to ascertain if a massively parallel hardware system can manage applications running within.
Task execution happens dynamically and is controlled by the growth mechanism implementing efficient mapping in simulation.
Algorithms that provide population simulation models are often inspired by those
evidenced in biology and in particular those of cellular automata and L-systems. These
algorithms are of particular interest due to their complexity and self-replication and
recent research has shown that it is the refinement of the biological methodology that
has resulted in their complexity. Further to this, adaptation of the design has moved the
algorithm on towards being able to organize and build itself from a single cell. A growth
model is utilized in software systems to provide production of meaningful data. The
development of bio-inspired software is constrained by using contemporary processor
architectures. |
مقاله انگلیسی |