با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
Equivalence Checking of Quantum Circuits With the ZX-Calculus
بررسی هم ارزی مدارهای کوانتومی با ZX-calculus-2022 As state-of-the-art quantum computers are capable of running increasingly complex algorithms, the need for
automated methods to design and test potential applications
rises. Equivalence checking of quantum circuits is an important,
yet hardly automated, task in the development of the quantum
software stack. Recently, new methods have been proposed that
tackle this problem from widely different perspectives. One of
them is based on the ZX-calculus, a graphical rewriting system
for quantum computing. However, the power and capability of
this equivalence checking method has barely been explored.
The aim of this work is to evaluate the ZX-calculus as a
tool for equivalence checking of quantum circuits. To this end,
it is demonstrated how the ZX-calculus based approach for
equivalence checking can be expanded in order to verify the
results of compilation flows and optimizations on quantum
circuits. It is also shown that the ZX-calculus based method
is not complete—especially for quantum circuits with ancillary
qubits. In order to properly evaluate the proposed method,
we conduct a detailed case study by comparing it to two other
state-of-the-art methods for equivalence checking: one based
on path-sums and another based on decision diagrams. The
proposed methods have been integrated into the publicly available
QCEC tool (https://github.com/cda-tum/qcec) which is
part of the Munich Quantum Toolkit (MQT).
Index Terms: Quantum computing | formal verification | quantum circuit. |
مقاله انگلیسی |
2 |
A Secure Anonymous D2D Mutual Authentication and Key Agreement Protocol for IoT
پروتکل ایمن تأیید هویت متقابل D2D و قرارداد کلیدی برای اینترنت اشیا-2022 Internet of Things (IoT) is a developing technology in our time that is prone to security problems
as it uses wireless and shared networks. A challenging scenario in IoT environments is Device-to-
Device (D2D) communication where an authentication server, as a trusted third-party, does not
participate in the Authentication and Key Agreement (AKA) process and only cooperates in the
process of allocating and updating long-term secret keys. Various authentication protocols have
been suggested for such situations but have not been able to meet security and efficiency re-
quirements. This paper examined three related protocols and demonstrated that they failed to
remain anonymous and insecure against Key Compromise Impersonation (KCI) and clogging at-
tacks. To counter these pitfalls, a new D2D mutual AKA protocol that is anonymous, untraceable,
and highly secure was designed that needed no secure channel to generate paired private and
public keys in the registration phase. Formal security proof and security analysis using BAN logic,
Real-Or-Random (ROR) model, and Scyther tool showed that our proposed protocol satisfied
security requirements. The communication and computation costs and energy consumption
comparisons denoted that our design had a better performance than existing protocols. keywords: تأیید اعتبار و توافقنامه کلید (AKA) | ارتباط دستگاه به دستگاه (D2D) | اینترنت اشیا (IoT) | حمله جعل هویت کلیدی (KCI) | Authentication and Key Agreement (AKA) | Device to Device (D2D) communication | Internet of Things (IoT) | Key Compromise Impersonation (KCI) attack |
مقاله انگلیسی |
3 |
Social movement activists’ conceptions of political action and counter-accounting through a critical dialogic accounting and accountability lens
تصورات فعالان جنبش اجتماعی از کنش سیاسی و مقابله با حسابداری از طریق یک دریچه حسابداری گفتگوی انتقادی و پاسخگویی-2021 In the face of growing disaffection with neoliberalism and corporate social and environmental
accounting, critical accounting recognizes the potential of counter-accounting to open spaces for
democratic contestation and to advance progressive change. Critical dialogic accounting and
accountability (CDAA), for example, views counter-accounting as providing social movements
with opportunities to challenge neoliberal hegemony, to mobilize multiple publics and to
construct new social realities. However, the democratizing potential of counter-accounting is
contested within academia, and social movements’ views of counter-accounting as a politicizing
practice are not well understood. We extend CDAA theorizing by elaborating on the value of
counter-accounting in advancing democratic struggles against neoliberalism and illustrating how
an agonistic lens can be useful in framing social movements’ actions in these struggles. Social
movements’ conceptualizations of political action and counter-accounting are empirically
investigated through interviews with 25 social movement activists. Based on the interviews and
our CDAA lens, we propose possible areas for critical accounting collaborations with social
movements as they seek to effect progressive change. keywords: حسابداری دیجیتالی انتقادی و پاسخگویی | مبنی بر حسابداری | عذاب | جنبش های اجتماعی | نئولیبرالیسم | Critical dialogic accounting and accountability | Counter-accounting | Agonistics | Social movements | Neoliberalism |
مقاله انگلیسی |
4 |
Accounting and accountability for farm animals: Conceptual limits and the possibilities of caring
حسابداری و پاسخگویی برای حیوانات مزرعه: محدودیت های مفهومی و امکان مراقبت-2021 This study explores dairy farmers’ accounts of farm animals in a context heavily influenced by the
concept of farm animal welfare (FAW). We illustrate how external demands linked to FAW,
performance concerns, and proximity to animals shape farmers’ formal and cognitive accounts of
animals. We explain how different accounts underlie farmers’ accountability for animals. Using
FAW as an example of a referent concept, we propose that accountability can be limited
conceptually by its referent. This limit is not a matter of its (in)ability to account fully for all lived
experiences. Rather, it is a matter of what one is or is not accountable for—such as the mortality
rate but not culling—as well as assumptions regarding the referent—such as the nature of animal
welfare and how it can be assessed and safeguarded. Even when it is conceptually bounded in this
way, self-accountability has potential to alter farming practices by reflecting on caring about
animals and on what this implies for oneself and the animals. keywords: رفاه حیوانات مزرعه | حسابداری | مسئوليت | حیوانات | محدودیت پاسخگویی | اهميت دادن | Farm animal welfare | Accounting | Accountability | Animals | Limits of accountability | Care |
مقاله انگلیسی |
5 |
Formalizing and analyzing security ceremonies with heterogeneous devices in ANP and PDL
رسمیت و تجزیه و تحلیل مراسم امنیتی با دستگاههای ناهمگن در ANP و PDL-2021 In today’s security protocols (also called “security ceremonies” when humans play a key role), different nodes may have different capabilities: computers can encrypt and decrypt messages, whereas humans cannot; a biometric device can capture biometric information, whereas a random number generator used in e-banking cannot; and so on. Furthermore, even if a node has the decryption capability, it must also know the encryption key to decrypt a message. Actor-network procedures (ANPs) are a well-known formal model of heterogeneous security protocols by Meadows and Pavlovic, and their procedure derivation logic (PDL) supports the logical reasoning about ANPs. However, ANPs do not support explicitly specifying node capabilities, and PDL does not support reasoning explicitly about the knowledge of the participants at different points in time. In this paper, we extend ANPs to deal with heterogeneous devices by explicitly specifying the nodes’ capabilities, as well as by adding new types of events. We also modify PDL to take into account the knowledge of participants at different points in time, and extend PDL to reason both from a “bird’s- eye” view of the system, as well from a “node’s-eye” view. All this allows us to reason about secrecy and authentication in security protocols/ceremonies with different kinds of devices and human users. We illustrate the use of our modeling notation ANP-C and our logics PDL-CK and PDL-CKL to specify and reason about a number of scenarios involving different kinds of devices, including: scenarios for updating someone’s data in a smart card reader; an SSL/TLS ceremony involving a user, a smartphone with a fingerprint reader, anda remote computer/server; and scenarios involving the YubiKey authentication device used by companies such as Google, Facebook, and Bank of America. 2021 Elsevier Inc. All rights reserved. Keywords: Formal methods | Security protocols | Security ceremonies | Actor-network procedures | Procedure derivation logic | Authentication devices |
مقاله انگلیسی |
6 |
Knowledge management and humanitarian organisations in the Asia-Pacific: Practices, challenges, and future pathways
مدیریت دانش و سازمان های بشردوستانه در آسیا و اقیانوس آرام: شیوه ها، چالش ها و مسیرهای آینده-2021 While there is growing recognition amongst humanitarians that knowledge sharing and exchange are essential
components of organisational efficiency and effectiveness, knowledge management processes in many human-
itarian organisations are still inadequate. The review of knowledge management and international relations
literature reveals limited research on the institutional memory of humanitarian organisations. This article aims to
start filling this research gap by examining the use of explicit and tacit knowledge transfer in the humanitarian
sector in the Asia-Pacific. It points to the embryonic stage of knowledge management and the reliance on tacit
knowledge management consistent with the early stage of sector professionalization in the region. It reviews and
analyses existing scholarly literature and manuals and draws on fieldwork interviews with key humanitarian
personnel that primarily focus on natural hazards. The findings suggest institutional memory in the humanitarian
sector remains ad hoc with limited long-term capture. There is a broad tendency in the region to rely on tacit
knowledge transfer – interpersonal relationships and informal decision-making – as the dominant knowledge
management practice. This reliance challenges knowledge management at the institutional level and indicates a
weakness in the institutional memory of humanitarian organisations in the region. Our research raises questions
about how to improve knowledge management practices within humanitarian organisations in the Asia-Pacific
with significant implications for the sector more generally. A recalibration of tacit and explicit knowledge
management would build institutional memory in humanitarian organisations. This requires a dual-track
approach with codified documentation of experiences and greater emphasis on an institutional culture of
knowledge sharing. keywords: آسیا و اقیانوسیه | حافظه نهادی | مدیریت بحران | مدیریت دانش | امور بشردوستانه | حکومت | Asia-pacific | Institutional memory | disaster management | Knowledge management | Humanitarian affairs | governance |
مقاله انگلیسی |
7 |
Indigenous flood control and management knowledge and flood disaster risk reduction in Nigerias coastal communities: An empirical analysis
دانش کنترل و مدیریت سیل بومی و کاهش خطر بلایای سیل در جوامع ساحلی نیجریه: یک تحلیل تجربی-2021 Flooding is one of the major global challenges today. The role of indigenous knowledge in offering an effective
risk reduction strategy towards flood disaster disregarded for many decades is now gaining global recognition.
There is a growing call for empirical identification of the effectiveness of indigenous knowledge in flood risk
reduction. Consequently, this paper empirically examines indigenous flood control and management knowledge
with the intent to identify its effectiveness in risk reduction of flood disasters in Nigeria’s coastal communities.
This is to provide empirical bases for the formulation of appropriate strategies for enhancing flood risk reduction
in Nigeria’s coastal communities. The research engaged focus group discussion and questionnaire methods to
generate primary data. The research proceeds with principal component analysis to classify and measure the
effectiveness of indigenous flood control and management knowledge in flood risk reduction. The result shows
the existence of eight types of indigenous flood control and management knowledge in the coastal communities
and they were 61.2% effective in flood risk reduction. This implies that indigenous flood control and manage-
ment knowledge practiced in Nigeria’s coastal communities is effective in flood risk reduction. This study pro-
posed a sustainable approach to risk reduction in flood disasters based on the integration of indigenous
knowledge systems and modern flood management strategies. keywords: دانش بومی | کنترل سیل | جوامع ساحلی | مدیریت | فاجعه سیل | کاهش خطر | Indigenous knowledge | Flood control | Coastal communities | Management | Flood disaster | Risk reduction |
مقاله انگلیسی |
8 |
X-PHM: Prognostics and health management knowledge-based framework for SME
X-PHM: پیش آگهی و چارچوب دانش مبتنی بر مدیریت سلامت برای SME-2021 Prognostics and Health Management (PHM) is an emerging concept based on industrial data management. The implementation of PHM in
small and medium-sized enterprises (SMEs) is currently limited due to data accessibility difficulties. In order to overcome this pitfall, one could
formalize the operators’ knowledge and integrate it in the SME’s information system. Thus, the implementation of the PHM will be based
on this information system associating data with knowledge. To this end, we propose a collaborative PHM approach (X-PHM) to ensure the
extraction of operators’ knowledge and its integration into the PHM process. The decision resulting from this approach is restituted with a concern
of explainability. This paper details the proposed approach while focusing on the data management process and its integration in explainable
decisions. This new framework is applied in a French SME to understand its production process and facilitate its digital transformation.
Keywords: PHM | Knowledge formalization and integration | Explainable artificial intelligence | SME | Data analysis. |
مقاله انگلیسی |
9 |
Combining computer vision with semantic reasoning for on-site safety management in construction
ترکیب بینایی ماشین با استدلال معنایی برای مدیریت ایمنی در هر دو سو در ساخت -2021 Computer vision has been utilized to extract safety-related information from images with the advancement of
video monitoring systems and deep learning algorithms. However, construction safety management is a
knowledge-intensive task; for instance, safety managers rely on safety regulations and their prior knowledge
during a jobsite safety inspection. This paper presents a conceptual framework that combines computer vision
and ontology techniques to facilitate the management of safety by semantically reasoning hazards and corre-
sponding mitigations. Specifically, computer vision is used to detect visual information from on-site photos while
the safety regulatory knowledge is formally represented by ontology and semantic web rule language (SWRL)
rules. Hazards and corresponding mitigations can be inferred by comparing extracted visual information from
construction images with pre-defined SWRL rules. Finally, the example of falls from height is selected to validate
the theoretical and technical feasibility of the developed conceptual framework. Results show that the proposed
framework operates similar to the thinking model of safety managers and can facilitate on-site hazard identi-
fication and prevention by semantically reasoning hazards from images and listing corresponding mitigations.
1. Introduction keywords: بینایی ماشین | هستی شناسی | استدلال معنایی | شناسایی ریسک | مدیریت ایمنی ساخت | Computer vision | Ontology | Semantic reasoning | Hazard identification | Construction safety management |
مقاله انگلیسی |
10 |
Ontology-augmented Prognostics and Health Management for shopfloor-synchronised joint maintenance and production management decisions
پیش آگهی و مدیریت سلامت با هستی شناسی تقویت شده برای تصمیمات مدیریت تولید و نگهداری مشترک هماهنگ شده با کف مغازه-2021 In smart factories, guaranteeing shopfloor-synchronised and real-time decision-making is essential to be
responsive to the ever-changing internal environment, namely the shopfloor of the production system and assets.
At operational level, decisions should balance counter acting objectives of maintenance and production; there-
fore, their decision-making processes should be joint and coordinated, to fulfil production requirements
considering the health state of the assets. The knowledge of the current state is promoted by the application of
Prognostics and Health Management (PHM) as an aid to support informed decision-making. Nevertheless, PHM-
purposed information is usually not complete in terms of production requirements. To support joint maintenance
and production management decisions, an ontological approach is proposed. The ontology, called ORMA
(Ontology for Reliability-centred MAintenance), has a modular structure, including formalisation of asset, pro-
cess, and product knowledge. Via suitable relationships, rules, and axioms, ORMA can infer product feasibility
based on the current health state of the assets and their functional units. ORMA is implemented in a Flexible
Manufacturing Line at a laboratory scale. Therein, an integrated solution, involving a health state detection
algorithm that interacts with the ontology, supports human decision-making via a web-based dashboard; joint
maintenance and production management decisions can be then taken, relying on diversified information pro-
vided by the PHM algorithm as well as the augmentation via ontology reasoning. The proposed ontology-based
solution represents a step towards reconfigurability of smart factories where human and automated decision-
making processes work in synergy. keywords: هستی شناسی | استدلال | پیشگویی و مدیریت بهداشت | phm | نگهداری | تولید | Ontology | Reasoning | Prognostics and health management | PHM | maintenance | production |
مقاله انگلیسی |