دانلود و نمایش مقالات مرتبط با mechanism::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - mechanism

تعداد مقالات یافته شده: 1232
ردیف عنوان نوع
1 Intelligent authentication of 5G healthcare devices: A survey
احراز هویت هوشمند دستگاه های مراقبت بهداشتی 5G: یک مرور-2022
The dynamic nature of wireless links and the mobility of devices connected to the Internet of Things (IoT) over fifth-generation (5G) networks (IoT-5G), on the one hand, empowers pervasive healthcare applications. On the other hand, it allows eavesdroppers and other illegitimate actors to access secret information. Due to the poor time efficiency and high computational complexity of conventional cryptographic methods and the heterogeneous technologies used, it is easy to compromise the authentication of lightweight wearable and healthcare devices. Therefore, intelligent authentication, which relies on artificial intelligence (AI), and sufficient network resources are extremely important for securing healthcare devices connected to IoT- 5G. This survey considers intelligent authentication and includes a comprehensive overview of intelligent authentication mechanisms for securing IoT-5G devices deployed in the healthcare domain. First, it presents a detailed, thoughtful, and state-of-the-art review of IoT-5G, healthcare technologies, tools, applications, research trends, challenges, opportunities, and solutions. We selected 20 technical articles from those surveyed based on their strong overlaps with IoT, 5G, healthcare, device authentication, and AI. Second, IoT-5G device authentication, radiofrequency fingerprinting, and mutual authentication are reviewed, characterized, clustered, and classified. Third, the review envisions that AI can be used to integrate the attributes of the physical layer and 5G networks to empower intelligent healthcare devices. Moreover, methods for developing intelligent authentication models using AI are presented. Finally, the future outlook and recommendations are introduced for IoT-5G healthcare applications, and recommendations for further research are presented as well. The remarkable contributions and relevance of this survey may assist the research community in understanding the research gaps and the research opportunities relating to the intelligent authentication of IoT-5G healthcare devices.
keywords: اینترنت اشیا (IoT) | امنیت اینترنت اشیا | احراز هویت دستگاه | هوش مصنوعی | امنیت مراقبت های بهداشتی | شبکه های 5g | InternetofThings(IoT) | InternetofThingssecurity | Deviceauthentication | Artificialintelligence | Healthcaresecurity | 5Gnetworks
مقاله انگلیسی
2 Intelligent context-aware fog node discovery
کشف گره مه آگاه از زمینه هوشمند-2022
Fog computing has been proposed as a mechanism to address certain issues in cloud computing such as latency, storage, network bandwidth, etc. Fog computing brings the processing, storage, and networking to the edge of the network near the edge devices, which we called fog consumers. This decreases latency, network bandwidth, and response time. Discovering the most relevant fog node, the nearest one to the fog consumers, is a critical challenge that is yet to be addressed by the research. In this study, we present the Intelligent and Distributed Fog node Discovery mechanism (IDFD) which is an intelligent approach to enable fog consumers to discover appropriate fog nodes in a context-aware manner. The proposed approach is based on the distributed fog registries between fog consumers and fog nodes that can facilitate the discovery process of fog nodes. In this study, the KNN, K-d tree, and brute force algorithms are used to discover fog nodes based on the context-aware criteria of fog nodes and fog consumers. The proposed framework is simulated using OMNET++, and the performance of the proposed algorithms is compared based on performance metrics and execution time. The accuracy and execution time are the major points of consideration in the selection of an optimal fog search algorithm. The experiment results show that the KNN and K-d tree algorithms achieve the same accuracy results of 95 %. However, the K-d tree method takes less time to find the nearest fog nodes than KNN and brute force. Thus, the K-d tree is selected as the fog search algorithm in the IDFD to discover the nearest fog nodes very efficiently and quickly.
keywords: Fog node | Discovery | Context-aware | Intelligent | Fog node discovery
مقاله انگلیسی
3 Deep Reinforcement Learning With Quantum-Inspired Experience Replay
یادگیری تقویتی عمیق با تکرار تجربه کوانتومی-2022
In this article, a novel training paradigm inspired by quantum computation is proposed for deep reinforcement learning (DRL) with experience replay. In contrast to the traditional experience replay mechanism in DRL, the proposed DRL with quantum-inspired experience replay (DRL-QER) adaptively chooses experiences from the replay buffer according to the complexity and the replayed times of each experience (also called transition), to achieve a balance between exploration and exploitation. In DRL-QER, transitions are first formulated in quantum representations and then the preparation operation and depreciation operation are performed on the transitions. In this process, the preparation operation reflects the relationship between the temporal-difference errors (TD-errors) and the importance of the experiences, while the depreciation operation is taken into account to ensure the diversity of the transitions. The experimental results on Atari 2600 games show that DRL-QER outperforms state-of-the-art algorithms, such as DRL-PER and DCRL on most of these games with improved training efficiency and is also applicable to such memory-based DRL approaches as double network and dueling network.
Index Terms: Deep reinforcement learning (DRL) | quantum computation | quantum-inspired experience replay (QER) | quantum reinforcement learning.
مقاله انگلیسی
4 Efficient Quantum Blockchain With a Consensus Mechanism QDPoS
بلاک چین کوانتومی کارآمد با مکانیزم اجماع QDPoS-2022
Quantum blockchain is expected to offer an alternative to classical blockchain to resist malicious attacks laughed by future quantum computers. Although a few quantum blockchain schemes have been constructed, their efficiency is low and unable to meet application requirements due to the fact that they lack of a suitable consensus mechanism. To tackle this issue, a consensus mechanism called quantum delegated proof of stake (QDPoS) is constructed by using quantum voting to provide fast decentralization for the quantum blockchain scheme at first. Then an efficient scheme is proposed for quantum blockchain based on QDPoS, where the classical information is initialized as a part of each single quantum state and these quantum states are entangled to form the chain. Compared with previous methods, the designed quantum blockchain scheme is more complete and carried out with higher efficiency, which greatly contributes to better adapting to the challenges of the quantum era.
Index Terms: Quantum blockchain | consensus mechanism | QDPoS | quantum voting | quantum entanglement.
مقاله انگلیسی
5 Disintegration testing augmented by computer Vision technology
آزمایش تجزیه با فناوری Vision کامپیوتری تقویت شده است-2022
Oral solid dosage forms, specifically immediate release tablets, are prevalent in the pharmaceutical industry. Disintegration testing is often the first step of commercialization and large-scale production of these dosage forms. Current disintegration testing in the pharmaceutical industry, according to United States Pharmacopeia (USP) chapter 〈701〉, only gives information about the duration of the tablet disintegration process. This infor- mation is subjective, variable, and prone to human error due to manual or physical data collection methods via the human eye or contact disks. To lessen the data integrity risk associated with this process, efforts have been made to automate the analysis of the disintegration process using digital lens and other imaging technologies. This would provide a non-invasive method to quantitatively determine disintegration time through computer algorithms. The main challenges associated with developing such a system involve visualization of tablet pieces through cloudy and turbid liquid. The Computer Vision for Disintegration (CVD) system has been developed to be used along with traditional pharmaceutical disintegration testing devices to monitor tablet pieces and distinguish them from the surrounding liquid. The software written for CVD utilizes data captured by cameras or other lenses then uses mobile SSD and CNN, with an OpenCV and FRCNN machine learning model, to analyze and interpret the data. This technology is capable of consistently identifying tablets with ≥ 99.6% accuracy. Not only is the data produced by CVD more reliable, but it opens the possibility of a deeper understanding of disintegration rates and mechanisms in addition to duration.
keywords: از هم پاشیدگی | اشکال خوراکی جامد | تست تجزیه | یادگیری ماشین | شبکه های عصبی | Disintegration | Oral Solid Dosage Forms | Disintegration Test | Machine Learning | Neural Networks
مقاله انگلیسی
6 Digital Twin-driven approach to improving energy efficiency of indoor lighting based on computer vision and dynamic BIM
رویکرد دیجیتال دوقلو برای بهبود بهره وری انرژی در روشنایی داخلی بر اساس بینایی کامپیوتر و BIM پویا-2022
Intelligent lighting systems and surveillance systems have become an important part of intelligent buildings. However, the current intelligent lighting system generally adopts independent sensor control and does not perform multi-source heterogeneous data fusion with other digital systems. This paper fully considers the linkage between the lighting system and the surveillance system and proposes a digital twin lighting (DTL) system that mainly consists of three parts. Firstly, a visualized operation and maintenance (VO&M) platform for a DTL system was established based on dynamic BIM. Secondly, the environment perception, key-frame similarity judgment, and multi-channel key-frame cut and merge mechanism were utilized to preprocess the video stream of the surveillance system in real-time. Lastly, pedestrians detected using YOLOv4 and the ambient brightness perceived by the environment perception mechanism were transmitted to the cloud database and were continuously read by the VO&M platform. The intent here was to aid timely adaptive adjustment of the digital twin and realistic lighting through the internet. The effectiveness of the proposed method was verified by experimenting with a surveillance video stream for 14 days. The key results of the experiments are as follows: (1) the accuracy rate of intelligent decision control reached 95.15%; (2) energy consumption and electricity costs were reduced by approximately 79%; and (3) the hardware cost and energy consumption of detection equipment and the time and cost of operation and maintenance (O&M) were greatly reduced.
keywords: Computer vision | Digital Twin | Dynamic BIM | Energy-efficient buildings | Intelligent lighting control
مقاله انگلیسی
7 Computer vision for anatomical analysis of equipment in civil infrastructure projects: Theorizing the development of regression-based deep neural networks
چشم انداز کامپیوتری برای تجزیه و تحلیل آناتومیکی تجهیزات در پروژه های زیرساختی عمرانی: نظریه پردازی توسعه شبکه های عصبی عمیق مبتنی بر رگرسیون-2022
There is high demand for heavy equipment in civil infrastructure projects and their performance is a determinant of the successful delivery of site operations. Although manufacturers provide equipment performance hand- books, additional monitoring mechanisms are required to depart from measuring performance on the sole basis of unit cost for moved materials. Vision-based tracking and pose estimation can facilitate site performance monitoring. This research develops several regression-based deep neural networks (DNNs) to monitor equipment with the aim of ensuring safety, productivity, sustainability and quality of equipment operations. Annotated image libraries are used to train and test several backbone architectures. Experimental results reveal the pre- cision of DNNs with depthwise separable convolutions and computational efficiency of DNNs with channel shuffle. This research provides scientific utility by developing a method for equipment pose estimation with the ability to detect anatomical angles and critical keypoints. The practical utility of this study is the provision of potentials to influence current practice of articulated machinery monitoring in projects.
keywords: هوش مصنوعی (AI) | سیستم های فیزیکی سایبری | معیارهای ارزیابی خطا | طراحی و آزمایش تجربی | تخمین ژست کامل بدن | صنعت و ساخت 4.0 | الگوریتم های یادگیری ماشین | معماری های ستون فقرات شبکه | Artificial intelligence (AI) | Cyber physical systems | Error evaluation metrics | Experimental design and testing | Full body pose estimation | Industry and construction 4.0 | Machine learning algorithms | Network backbone architectures
مقاله انگلیسی
8 Cov-Net: A computer-aided diagnosis method for recognizing COVID-19 from chest X-ray images via machine vision
Cov-Net: یک روش تشخیصی به کمک رایانه برای تشخیص COVID-19 از تصاویر اشعه ایکس قفسه سینه از طریق بینایی ماشین-2022
In the context of global pandemic Coronavirus disease 2019 (COVID-19) that threatens life of all human beings, it is of vital importance to achieve early detection of COVID-19 among symptomatic patients. In this paper, a computer aided diagnosis (CAD) model Cov-Net is proposed for accurate recognition of COVID-19 from chest X-ray images via machine vision techniques, which mainly concentrates on powerful and robust feature learning ability. In particular, a modified residual network with asymmetric convolution and attention mechanism embedded is selected as the backbone of feature extractor, after which skip-connected dilated convolution with varying dilation rates is applied to achieve sufficient feature fusion among high-level semantic and low-level detailed information. Experimental results on two public COVID-19 radiography databases have demonstrated the practicality of proposed Cov-Net in accurate COVID-19 recognition with accuracy of 0.9966 and 0.9901, respectively. Furthermore, within same experimental conditions, proposed Cov-Net outperforms other six state-of-the-art computer vision algorithms, which validates the superiority and competitiveness of Cov-Net in building highly discriminative features from the perspective of methodology. Hence, it is deemed that proposed Cov-Net has a good generalization ability so that it can be applied to other CAD scenarios. Consequently, one can conclude that this work has both practical value in providing reliable reference to the radiologist and theoretical significance in developing methods to build robust features with strong presentation ability.
keywords: COVID-19 | Computer aided diagnosis (CAD) | Feature learning | Image recognition | Machine vision
مقاله انگلیسی
9 On the Logical Error Rate of Sparse Quantum Codes
در مورد میزان خطای منطقی کدهای کوانتومی پراکنده-2022
The quantum paradigm presents a phenomenon known as degeneracy that can potentially improve the performance of quantum error correcting codes. However, the effects of this mechanism are sometimes ignored when evaluating the performance of sparse quantum codes and the logical error rate is not always correctly reported. In this article, we discuss previously existing methods to compute the logical error rate and we present an efficient coset-based method inspired by classical coding strategies to estimate degenerate errors and distinguish them from logical errors. Additionally, we show that the proposed method presents a computational advantage for the family of Calderbank–Shor–Steane codes. We use this method to prove that degenerate errors are frequent in a specific family of sparse quantum codes, which stresses the importance of accurately reporting their performance. Our results also reveal that the modified decoding strategies proposed in the literature are an important tool to improve the performance of sparse quantum codes.
INDEX TERMS: Iterative decoding | quantum error correction (QEC) | quantum low density generator matrix codes | quantum low-density parity check (QLDPC) codes.
مقاله انگلیسی
10 An exploration of local rules to map spawning processes to regular hardware architectures
کاوشی در قوانین محلی برای نگاشت فرآیندهای تخم ریزی به معماری های سخت افزاری معمولی-2022
This thesis presents an exploration of population growth via simulation in software to ascertain if a massively parallel hardware system can manage applications running within. Task execution happens dynamically and is controlled by the growth mechanism implementing efficient mapping in simulation. Algorithms that provide population simulation models are often inspired by those evidenced in biology and in particular those of cellular automata and L-systems. These algorithms are of particular interest due to their complexity and self-replication and recent research has shown that it is the refinement of the biological methodology that has resulted in their complexity. Further to this, adaptation of the design has moved the algorithm on towards being able to organize and build itself from a single cell. A growth model is utilized in software systems to provide production of meaningful data. The development of bio-inspired software is constrained by using contemporary processor architectures.
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 11151 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 11151 :::::::: افراد آنلاین: 63