با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
The application of computer vision systems in meat science and industry – A review
کاربرد سیستم های بینایی کامپیوتری در علم و صنعت گوشت – مروری-2022 Computer vision systems (CVS) are applied to macro- and microscopic digital photographs captured using digital
cameras, ultrasound scanners, computer tomography, and wide-angle imaging cameras. Diverse image acquisi-
tion devices make it technically feasible to obtain information about both the external features and internal
structures of targeted objects. Attributes measured in CVS can be used to evaluate meat quality. CVS are also used
in research related to assessing the composition of animal carcasses, which might help determine the impact of
cross-breeding or rearing systems on the quality of meat. The results obtained by the CVS technique also
contribute to assessing the impact of technological treatments on the quality of raw and cooked meat. CVS have
many positive attributes including objectivity, non-invasiveness, speed, and low cost of analysis and systems are
under constant development an improvement. The present review covers computer vision system techniques,
stages of measurements, and possibilities for using these to assess carcass and meat quality. keywords: سیستم بینایی کامپیوتری | گوشت | محصولات گوشتی | لاشه | Computer vision system | Meat | Meat products | Carcass |
مقاله انگلیسی |
2 |
Measurement Crosstalk Errors in Cloud-Based Quantum Computing
خطاهای متقابل اندازه گیری در محاسبات کوانتومی مبتنی بر ابر-2022 Quantum technologies available currently contain noise in general, often dubbed
noisy intermediate-scale quantum systems. We here present the verification of
noise in measurement readout errors in cloud-based quantum computing services,
IBMQ and Rigetti, by directly performing quantum detector tomography, and show
that there exist measurement crosstalk errors. We provide the characterization and
the quantification of noise in a quantum measurement of multiple qubits. We
remark that entanglement is found as a source of crosstalk errors in a
measurement of three qubits.
|
مقاله انگلیسی |
3 |
برهم کنش متقابل جهت گیری ها نشاندهنده رمز گشایی سطح بالا به پایین در حافظه کار بصری است
سال انتشار: 2022 - تعداد صفحات فایل pdf انگلیسی: 12 - تعداد صفحات فایل doc فارسی: 41 کدگذاری حسی ( چگونه محرکها واکنشهای حسی را برمیانگیزد ) به پیشرفت از ویژگیهای سطح پایین به سطح بالا مشهور است .
رمزگشایی ( چگونه پاسخها منجر به ادراک میشود ) کمتر درک میشود اما اغلب فرض میشود که از همان سلسلهمراتب پیروی میکند .
بر این اساس ، رمز گشایی جهت گیری باید در نواحی سطح پایین مانند V۱ ، بدون برهم کنش متقابل رخ دهد .
با این حال , یک مطالعه , دینگ ,کوا , تی سودیکس , و کان ( 2017 ) شواهدی در برابر این فرض ارائه دادند و پیشنهاد کردند که رمزگشایی بصری اغلب ممکن است از سلسلهمراتب سطح بالا به پایین در حافظه کاری پیروی کند , که در آن محدودیتهای سطح به پایین تعامل بین ویژگیهای سطح پایینتر را ایجاد میکند . اگر دو جهت گیری در جهت مخالف تثبیت هر دو عملی هستند و حافظه فعال را وارد میکنند , پس باید با هم تعامل داشته باشند. ما در واقع هم برهم کنش متقابل پیشبینیشده ( تنفر و همبستگی ) بین جهت گیری ها را پیدا کردیم .
آزمایشها کنترل و تجزیه و تحلیلهای کنترلی , توضیحات دیگری همچون تعصب گزارش دهی و انطباق در سراسر آزمایشها در همان سمت تثبیت را رد کردند . به علاوه , ما دادهها را با استفاده از چارچوب رمزگشایی Bayesian سطح پایین به سطح پایین توضیح دادیم .
واژه های کاربردی: کدگشایی بصری | جانبداری | سر و صدا | بیزین گذشته نگر |
مقاله ترجمه شده |
4 |
Simultaneous Execution of Quantum Circuits on Current and Near-Future NISQ Systems
اجرای همزمان مدارهای کوانتومی در سیستمهای NISQ فعلی و آینده نزدیک-2022 In the noisy intermediate-scale quantum (NISQ) era, the idea of quantum multiprogramming,
running multiple quantum circuits (QCs) simultaneously on the same hardware, helps to improve the
throughput of quantum computation. However, the crosstalk, unwanted interference between qubits on NISQ
processors, may cause performance degradation when using multiprogramming. To address this challenge,
we introduce palloq (parallel allocation of QCs), a novel compilation protocol. Palloq improves the performance of quantum multiprogramming on NISQ processors, while paying attention to 1) the combination
of QCs chosen for parallel execution and 2) the assignment of program qubit variables to physical qubits,
to reduce unwanted interference among the active set of QCs. We also propose a software-based crosstalk
detection protocol using a new combination of randomized benchmarking methods. Our method successfully
characterizes the suitability of hardware for multiprogramming with relatively low detection costs. We found
a tradeoff between the success rate and execution time of the multiprogramming. Our results will be of value
when device throughput becomes a significant bottleneck. Until service providers have enough quantum
processors available to more than meet demand, this approach will be attractive to the service providers and
users who want to optimize job management and throughput of the processor.
INDEX TERMS: Compiler | crosstalk | multiprogramming | noisy intermediate-scale quantum (NISQ) | quantum computing. |
مقاله انگلیسی |
5 |
فعل و انفعالات فیکساسیون متقاطع جهت ها، پیشنهاد کدگشایی سطح بالا به پایین در حافظه کاری بصری
سال انتشار: 2022 - تعداد صفحات فایل pdf انگلیسی: 12 - تعداد صفحات فایل doc فارسی: 37 کدگذاری حسی (چگونگی برانگیختن پاسخ های حسی توسط محرک ها) به پیشرفت از ویژگی های سطح پایین به سطح بالا معروف است. کمتر به فهم و درک کدگشایی (چگونه پاسخ ها منجر به ادراک می شوند) پرداخته شده است اما اغلب فرض می شود که از سلسله مراتب مشابهی پیروی می کند. بر این اساس، کدگشایی جهت باید در مناطق سطح پایین مانند V1، بدون فعل و انفعالات فیکساسیون متقابل رخ دهد. با این حال، در مطالعه ی Ding, Cueva, Tsodyks, and Qian (2017) شواهدی برخلاف این فرض ارائه شد و آنها پیشنهاد کردند که کدگشایی بصری اغلب از سلسله مراتبی از سطح بالا به سطح پایین در حافظه کاری پیروی می کند، که در آن محدودیتهای سطح از بالاتر به پایینتر ، تعامل بین ویژگیهای سطح پایینتر را معرفی میکنند. دو جهت در سویه مخالف فیکساسیون، هم مربوط به کار هستند و هم حافظه کاری می و باید با یکدیگر تعامل داشته باشند. در واقع فعل و انفعالات فیکساسیون متقابل پیش بینی شده (دفعه و همبستگی) بین جهت ها را پیدا کرده. کارآزماییها و تجزیه و تحلیلهای کنترلی، توضیحات جایگزین مانند گزارش سوگیری و انطباق در سراسر کارآزماییها را در جهت مشابه فیکساسیون، رد کردند. علاوه بر این، دادهها را با استفاده از چارچوب کدگشایی بیزی سطح بالا به پایین گذشتهنگر شرح دادیم.
کلیدواژه ها: کدگشایی بصری | سوگیری ادراکی | نویز حافظه | گذشته نگر بیزی |
مقاله ترجمه شده |
6 |
A Secure Anonymous D2D Mutual Authentication and Key Agreement Protocol for IoT
پروتکل ایمن تأیید هویت متقابل D2D و قرارداد کلیدی برای اینترنت اشیا-2022 Internet of Things (IoT) is a developing technology in our time that is prone to security problems
as it uses wireless and shared networks. A challenging scenario in IoT environments is Device-to-
Device (D2D) communication where an authentication server, as a trusted third-party, does not
participate in the Authentication and Key Agreement (AKA) process and only cooperates in the
process of allocating and updating long-term secret keys. Various authentication protocols have
been suggested for such situations but have not been able to meet security and efficiency re-
quirements. This paper examined three related protocols and demonstrated that they failed to
remain anonymous and insecure against Key Compromise Impersonation (KCI) and clogging at-
tacks. To counter these pitfalls, a new D2D mutual AKA protocol that is anonymous, untraceable,
and highly secure was designed that needed no secure channel to generate paired private and
public keys in the registration phase. Formal security proof and security analysis using BAN logic,
Real-Or-Random (ROR) model, and Scyther tool showed that our proposed protocol satisfied
security requirements. The communication and computation costs and energy consumption
comparisons denoted that our design had a better performance than existing protocols. keywords: تأیید اعتبار و توافقنامه کلید (AKA) | ارتباط دستگاه به دستگاه (D2D) | اینترنت اشیا (IoT) | حمله جعل هویت کلیدی (KCI) | Authentication and Key Agreement (AKA) | Device to Device (D2D) communication | Internet of Things (IoT) | Key Compromise Impersonation (KCI) attack |
مقاله انگلیسی |
7 |
Evaluating computing performance of deep neural network models with different backbones on IoT-based edge and cloud platforms
ارزیابی عملکرد محاسباتی مدلهای شبکه عصبی عمیق با ستون فقرات مختلف در بسترهای لبه و ابری مبتنی بر اینترنت اشیا-2022 This paper focuses on evaluating and predicting the computing performance of different archi-
tectures of deep neural network models (DNNs) in cross-platform and cross-inference frame-
works. We test nearly 30 typical DNN models for image recognition on Google Colab cloud
computing platform and Intel neural compute stick 2 embedded edge computing platform and
record the computational performance metrics i.e. the Top-N accuracy, model complexity,
computational complexity, inference time, memory usage, and so on. We compare and analyze
these performance parameters with the previous workstation equipped with NVIDIA Titan X
Pascal and an embedded system based on NVIDIA Jetson TX1 board to evaluate the inference
efficiency of different DNN models using different inference frameworks. The methods of ANOVA
are adopted to quantify the differences between the models. A combination method of cluster
analysis and regression analysis is proposed to find the similar inference time variation processes
across models, which can be used to predict the inference results of unknown models. These
presented results will contribute to better deployment and application of resource-constrained
DNN models on the heterogeneous high-performance computing platform. keywords: شبکه های عصبی عمیق | سکوهای متقابل | چارچوب های استنتاج متقابل | تشخیص تصویر | Deep neural networks | Cross platforms | Cross-inference frameworks | Image recognition |
مقاله انگلیسی |
8 |
The effects of personal information management capabilities and social-psychological factors on accounting professionals’ knowledge-sharing intentions: Pre and post COVID-19
تأثیر قابلیت های مدیریت اطلاعات شخصی و عوامل اجتماعی-روانشناختی بر اهداف به اشتراک گذاری دانش حرفه ای حسابداری: پیش و پست Covid-19-2021 Given the increased emphasis on individual factors in knowledge management research, this
study proposes a research model that examines the effects of personal information management
capabilities and social-psychological factors on the knowledge-sharing intention of accounting
professionals. The survey results from 136 accounting professionals reveal that both personal
information management capabilities and perceived image can positively influence knowledge-
sharing behavior. Conversely, reciprocity and loss of knowledge power do not exhibit a signifi-
cant role in knowledge-sharing intentions. The comparison analyses between pre- and post-
COVID-19 sample groups indicate similar results for the hypothesized relationships while there
are notable mean differences in knowledge sharing intention, image and information processing
capabilities. This study extends current research by incorporating personal information man-
agement capabilities to examine the power of the “individual” in knowledge sharing and offers
timely evidence of accounting professionals’ personal knowledge management practices during
the period of COVID-19. This study raises implications for researchers and practitioners interested
in knowledge management in the accounting profession. keywords: تصویر | قصد به اشتراک گذاری دانش | از دست دادن قدرت دانش | قابلیت های مدیریت اطلاعات شخصی | متقابل | Image | Knowledge-sharing intention | Loss of knowledge power | Personal information management capabilities | Reciprocity |
مقاله انگلیسی |
9 |
The dynamic linkages between current account deficit and budget balance deficit in the South Asian region
ارتباط پویا بین کسری حساب جاری و کسری تراز بودجه در منطقه جنوب آسیا-2021 The issue of twin imbalances is at the forefront of fiscal policy concerns in the South Asian region,
fuelled by an ever-going budget deficit and current account deficit over the last five decades. A
standard approach is to assume a model in which budget balance influences the current account.
We relax this assumption by using a panel data vector autoregression model comprising five
South Asian countries. The results show that both budget deficit and current account deficit are
mutually causative, which contrasts the unidirectional causality running from fiscal deficit to
current account deficit found in prior studies. Further, this bi-causality relationship is also
demonstrated in the impulse response analyses. Budget balance in South Asian economies re-
sponds positively to a one standard deviation positive shock in the current account balance.
Likewise, external balance increases to a one standard deviation positive shock in internal bal-
ance. Higher fiscal debt impedes economic growth, which in turn impacts negatively on the
budget balance. Our findings lead us to reject ’fiscal policy only’ recommendations to address the
twin deficits. keywords: کسری دوقلو | مدل P-VAR | آزمون علیت پانل گرنجر | تابع پاسخ ضربه ای | آسیای جنوبی | Twin deficits | P-VAR model | Panel Granger causality test | Impulse response function | South Asia |
مقاله انگلیسی |
10 |
The effects of personal information management capabilities and social-psychological factors on accounting professionals’ knowledge-sharing intentions: Pre and post COVID-19
تأثیر قابلیت های مدیریت اطلاعات شخصی و عوامل اجتماعی-روانشناختی بر اهداف به اشتراک گذاری دانش حرفه ای حسابداری: پیش و پس Covid-19-2021 Given the increased emphasis on individual factors in knowledge management research, this
study proposes a research model that examines the effects of personal information management
capabilities and social-psychological factors on the knowledge-sharing intention of accounting
professionals. The survey results from 136 accounting professionals reveal that both personal
information management capabilities and perceived image can positively influence knowledge-
sharing behavior. Conversely, reciprocity and loss of knowledge power do not exhibit a signifi-
cant role in knowledge-sharing intentions. The comparison analyses between pre- and post-
COVID-19 sample groups indicate similar results for the hypothesized relationships while there
are notable mean differences in knowledge sharing intention, image and information processing
capabilities. This study extends current research by incorporating personal information man-
agement capabilities to examine the power of the “individual” in knowledge sharing and offers
timely evidence of accounting professionals’ personal knowledge management practices during
the period of COVID-19. This study raises implications for researchers and practitioners interested
in knowledge management in the accounting profession. keywords: تصویر | قصد به اشتراک گذاری دانش | از دست دادن قدرت دانش | قابلیت های مدیریت اطلاعات شخصی | متقابل | Image | Knowledge-sharing intention | Loss of knowledge power | Personal information management capabilities | Reciprocity |
مقاله انگلیسی |