دانلود و نمایش مقالات مرتبط با نفوذ::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - نفوذ

تعداد مقالات یافته شده: 247
ردیف عنوان نوع
1 A computer vision-based method for bridge model updating using displacement influence lines
یک روش مبتنی بر بینایی کامپیوتری برای به‌روزرسانی مدل پل با استفاده از خطوط موثر جابجایی-2022
This paper presents a new computer vision-based method that simultaneously provides the moving vehicle’s tire loads, the location of the loads on a bridge, and the bridge’s response displacements, based on which the bridge’s influence lines can be constructed. The method employs computer vision techniques to measure the displacement influence lines of the bridge at different target positions, which is then later used to perform model updating of the finite element models of the monitored structural system.
The method is enabled by a novel computer vision-based vehicle weigh-in-motion method which the coauthors recently introduced. A correlation discriminating filter tracker is used to estimate the displacements at target points and the location of single or multiple moving loads, while a low-cost, non-contact weigh-in-motion technique evaluates the magnitude of the moving vehicle loads.
The method described in this paper is tested and validated using a laboratory bridge model. The system was loaded with a vehicle with pressurized tires and equipped with a monitoring system consisting of laser displacement sensors, accelerometers, and cameras. Both artificial and natural targets were considered in the experimental tests to track the displacements with the cameras and yielded robust results consistent with the laser displacement measurements.
The extracted normalized displacement influence lines were then successfully used to perform model updating of the structure. The laser displacement sensors were used to validate the accuracy of the proposed computer vision-based approach in deriving the displacement measurements, while the accelerometers were used to derive the system’s modal properties employed to validate the updated finite element model. As a result, the updated finite element model correctly predicted the bridge’s displacements measured during the tests. Furthermore, the modal parameters estimated by the updated finite element model agreed well with those extracted from the experimental modal analysis carried out on the bridge model. The method described in this paper offers a low-cost non-contact monitoring tool that can be efficiently used without disrupting traffic for bridges in model updating analysis or long-term structural health monitoring.
keywords: Computer vision | Displacement influence line | Vehicle weigh-in-motion | Structural identification | Finite element method model | Model updating | Modal analysis | Bridge systems
مقاله انگلیسی
2 A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions
بررسی جامع تشخیص حملات سایبری: مجموعه داده‌ها، روش‌ها، چالش‌ ها و جهت‌گیری‌های تحقیقاتی آینده-2022
Rapid developments in network technologies and the amount and scope of data transferred on networks are increasing day by day. Depending on this situation, the density and complexity of cyber threats and attacks are also expanding. The ever-increasing network density makes it difficult for cybersecurity professionals to monitor every movement on the network. More frequent and complex cyberattacks make the detection and identification of anomalies in network events more complex. Machine learning offers various tools and techniques for automating the detection of cyber attacks and for rapid prediction and analysis of attack types. This study discusses the approaches to machine learning methods used to detect attacks. We examined the detection, classification, clustering, and analysis of anomalies in network traffic. We gave the cyber-security focus, machine learning methods, and data sets used in each study we examined. We investigated which feature selection or dimension reduction method was applied to the data sets used in the studies. We presented in detail the types of classification carried out in these studies, which methods were compared with other methods, the performance metrics used, and the results obtained in tables. We examined the data sets of network attacks presented as open access. We suggested a basic taxonomy for cyber attacks. Finally, we discussed the difficulties encountered in machine learning applications used in network attacks and their solutions
Keywords: Cyber attacks | Machine learning | Deep learning | Geometric deep learning | Cyber security | Adversarial machine learning | Intrusion detection
مقاله انگلیسی
3 A Two-layer Fog-Cloud Intrusion Detection Model for IoT Networks
مدل تشخیص نفوذ مه-ابر دو لایه برای شبکه های اینترنت اشیا-2022
The Internet of Things (IoT) and its applications are becoming ubiquitous in our life. However, the open deployment environment and the limited resources of IoT devices make them vulnerable to cyber threats. In this paper, we investigate intrusion detection techniques to mitigate attacks that exploit IoT security vulnerabilities. We propose a machine learning-based two-layer hierarchical intrusion detection mechanism that can effectively detect intrusions in IoT networks while satisfying the IoT resource constraints. Specifically, the proposed model effectively utilizes the resources in the fog layer of the IoT network by efficiently deploying multi-layered feedforward neural networks in the fog-cloud infrastructure for detecting network attacks. With a fog layer into the picture, analysis is dynamically distributed across the fog and cloud layer thus enabling real-time analytics of traffic data closer to IoT devices and end-users. We have performed extensive experiments using two publicly available datasets to test the proposed approach. Test results show that the proposed approach outperforms existing approaches in multiple performance metrics such as accuracy, precision, recall, and F1-score. Moreover, experiments also justified the proposed model in terms of improved service time, lower delay, and optimal energy utilization.
keywords: Fog computing | Intrusion detection | IoT network | Machine learning | Security
مقاله انگلیسی
4 Beacon Non-Transmission attack and its detection in intelligent transportation systems
حمله عدم انتقال Beacon و تشخیص آن در سیستم های حمل و نقل هوشمند-2022
Message dropping by intermediate nodes as well as RF jamming attack have been studied widely in ad hoc networks. In this paper, we thoroughly investigate a new type of attack in intelligent transportation systems (ITS) defined as Beacon Non-Transmission (BNT) attack in which attacker is not an intermediate vehicle, but rather a source vehicle. In BNT attack, a vehicle suppresses the transmissions of its own periodic beacon packets to get rid of the automated driving misbehavior detection protocols running in ITS, or to mount a Denial-ofService (DoS) attack to cripple the traffic management functionality of ITS. Considering BNT attack as a critical security threat to ITS, we propose two novel and lightweight techniques to detect it. Our first technique bases its detection by assuming a certain distribution of the number of beacons lost from a vehicle while accounting for loss due to channel-error. However, it fails to classify shortish BNT attacks wherein amount of denial and channel-error loss are comparable. Our second technique, suitable for identifying both shortish and longish BNT attacks, considers beacon loss pattern of a vehicle as a time-series data and employs autocorrelation function (ACF) to determine the existence of an attack. In order to trade-off detection accuracy for equitable use of limited computational resources, we propose a random inspection model in which the detection algorithm is executed at random time instances and for randomly selected set of vehicles. We have performed extensive simulations to evaluate the performance of proposed detection algorithms under random inspection and a practical attacker model. The results obtained corroborate the lightweight nature of both techniques, and the efficacy of ACF based technique over simple threshold based technique in terms of higher detection accuracy as well as smaller reaction delay.
keywords: DoS attack | Intrusion detection | Driving anomaly detection | Beacon | Autocorrelation function | Intelligent Transportation Systems
مقاله انگلیسی
5 Nanoinfiltration behavior of carbon nanotube based nanocomposites with enhanced mechanical and electrical properties
رفتار نانوفیلتراسیون نانوکامپوزیت های مبتنی بر نانولوله کربنی با خواص مکانیکی و الکتریکی بهبود یافته-2021
In this work, carbon nanotube (CNT) based nanocomposites with high mass fraction are proposed by in-situ bridging carbon matrix into CNT paper through optimized chemical vapor infiltration (CVI). Nanoinfiltration behavior of CNTs is basically investigated under the CVI process. The contact between each CNT can be strengthened and the conductive pathways can be established, resulting in the better mechanical and electrical properties. Compared with the pristine CNT paper, the CNT/C composite after pyrolysis process confirms a remarkable advance in tensile strength (up to 310 ± 13 MPa) and Young’s modulus (up to 2.4 ± 0.1 GPa). Besides, a notable feature of electrical conductivity also shows an improvement up to 8.5 S/cm, which can be attributed to the mass fraction of CNT (41 wt%) breaking the limits of percolation thresholds and the efficient densification of this sample to establish the conductive pathways. This study has a broad application in the development of the multi-functional electrical and engineering materials.
Keywords: Carbon nanotube | Chemical vapor infiltration (CVI) | Nanocomposites
مقاله انگلیسی
6 The architecture of accounting and the neoliberal betrayal of life
معماری حسابداری و خیانت نئولیبرالی از زندگی-2021
This paper identifies the way in which accounting practices reinforced the increasing influence of the intolerant financial emphasis of the market on the quality of social housing under neoliber- alism when successive British governments gave little importance to the impact of aesthetic and ethical qualities of social housing on the well-being of inhabitants. Social values, most especially safety and beauty, were able to be reinterpreted according to economic logic, thereby denying the need for them to be explicitly considered in any social housing decisions. The study emphasises the way in which the austerity and deregulation agenda of neoliberal policies that had a signif- icant impact on building and fire safety regulations were ultimately justified by financial criteria. The Grenfell Tower fire in 2017 belatedly exposed the way in which the financial and operational visibilities created by accounting practices had become crucial to the successful implementation of the economic logic of the neoliberal agenda and related market priorities of successive British governments, irrespective of the consequences. The paper demonstrates how the Grenfell Tower refurbishment was the apotheosis of neoliberalism; a toxic mix of austerity, outsourcing and deregulation. The focus on value for money in the refurbishment led ultimately to the betrayal of life of the residents.
keywords: حسابداری | برج گرنفل | مسکن اجتماعی | نئولیبرالیسم | فوکو | Accounting | Grenfell Tower | Social housing | Neoliberalism | Foucault
مقاله انگلیسی
7 Moisture dependence of electrical resistivity in under-percolated cement-based composites with multi-walled carbon nanotubes
وابستگی مقاومت الکتریکی به رطوبت در کامپوزیت های پایه سیمانی کم نفوذ با نانولوله های کربنی چند جداره-2021
Cement-based piezoresistive composites have attracted significant attention as smart construction materials for embedding self-sensing capability in concrete infrastructure. Although a number of studies have been conducted using multi-walled carbon nanotubes (MWCNTs) as a functional filler for self-sensing cement-based composites, studies addressing the influence of the internal moisture state on the electrical properties are relatively scant. In this study, we aim to experimentally investigate the effect of internal moisture state on the electrical resistivity of cement-based composites containing MWCNTs as an electrically conductive medium to raise a need for calibration of self-sensing data considering the internal moisture state. To this end, the moisture dependence of electrical resistivity in under-percolated cement-based composites was mainly evaluated, along with other material properties such as strength, shrinkage, and flowability. Results revealed that the electrical resistivity increased almost linearly as the internal relative humidity (IRH) decreased, and the increase was more pronounced below the percolation threshold. In addition, it was found that the strength gained by the microfiller effect of MWCNTs was significantly reduced particularly in under-percolated mixtures, leading to overall strength reductions. Furthermore, this study showed that the more the MWCNT was added, the smaller the flowability was obtained due to the increased viscosity of the mixture. The findings of this study are expected to provide pivotal information for accurate and reliable interpretations of self-sensing data generated by MWCNT-embedded cement-based composites.
Keywords: carbon nanotubes | cement-based composites | electrical resistivity | internal relative humidity | percolation threshold | self-sensing
مقاله انگلیسی
8 تحلیل شبکه اجتماعی: بررسی ارتباطات برای پیشرفت علم پرستاری نظامی
سال انتشار: 2021 - تعداد صفحات فایل pdf انگلیسی: 11 - تعداد صفحات فایل doc فارسی: 30
زمینه: دانشمندان پرستار نظامی در شاخه های وابسته به خدمات گنجانده شده اند (ارتش ، نیروی دریایی ، نیروی هوایی) با مأموریت های مختلف ، اما با هدف منحصر به فرد تولید و انتشار تحقیقات موثر بر سلامتی و رفاه ذینفعان وزارت دفاع.
هدف: این پروژه همکاری بین تحقیقات پرستاری TriService را بررسی می کند اعضای برنامه (TSNRP) ، به دنبال فرصت هایی برای تقویت ، متنوع سازی و گسترش همکاری تحقیقاتی هستند.
روش: تجزیه و تحلیل شبکه های اجتماعی (SNA) تحقیق تجربی از روابط بین بازیگران اجتماعی در سطوح مختلف تجزیه و تحلیل است . یک ارزیابی الکترونیکی SNA و نمونه برداری کلی برای بررسی همکاری های فعلی دانشمندان پرستار نظامی دکترای آماده (136 ( N= استفاده شد.
یافته ها: شبکه همکاری TSNRP دارای ساختار پیچیده خدمات محور است با بازیگران سطح بالا که دیگران به دنبال مشاوره ، دانش یا مهارت آنها هستند و به عنوان اتصالات یا پلهای مختلف در بین شعب خدمات فعالیت می کنند.
بحث: از نظر دانشمندان نظامی ، SNA در شناسایی افراد با نفوذ ، تجسم فرصت های مشاوره درون خدماتی ، طراحی سیاست های پاسخگو و جهت دهی فرصت های شغلی برای دانشمندان تازه کار نقش مهمی دارد.
کلید واژه ها: همکاری های حرفه ای دانشمندان پرستار | تحلیل شبکه اجتماعی | شبکه های اجتماعی | پرستاری نظامی | زمینه
مقاله ترجمه شده
9 Impacts of leadership style, organizational design and HRM practices on knowledge hiding: The indirect roles of organizational justice and competitive work environment
تأثیر سبک رهبری، طراحی سازمانی و شیوه‌های مدیریت منابع انسانی بر پنهان‌سازی دانش: نقش‌های غیرمستقیم عدالت سازمانی و محیط کار رقابتی-2021
In this paper, we investigate how Leadership Style, Organizational Design, and HRM practices influence Knowledge Hiding. Organizational Justice and Competitive Work Environment are additionally considered as mediating variables of these impacts. 224 professionals completed an extensive survey with questions corre- sponding to the hypothesized effects. Based on partial least squares regression to test these hypotheses, this study shows that Leadership Style and Organizational Design mitigate Knowledge Hiding only when Organizational Justice is developed. While HRM practices can also decrease the intention of employees to hide knowledge in cases with high levels of justice, they may induce such behavior in a highly competitive work environment. Hence, this research contributes to knowledge management literature by examining the joint influence on knowledge hiding of organizational factors that genuinely describe an organization’s structure and climate. From a practical standpoint, we recommend that managers establish the right balance between justice and competition to reduce knowledge hiding.
keywords: Knowledge hiding | Leadership style | Organisational design | HRM practices | Organizational justice | Competitive work environment
مقاله انگلیسی
10 Institutionalised management accounting and control in farm businesses
حسابداری مدیریت و کنترل نهادینه شده در شرکت های مزرعه-2021
This paper analyses the management accounting and control practices (MAC) in dairy farms as examples of small family firms, a segment that is rarely studied. We consider how the relative extent of embeddedness in the institutional logics of business, family and farming shapes MAC and how farmers cope with logic tensions through alignment and prioritizing. First, our findings lend nuance to the suggested ’negative’ role of family on the sophistication of MAC, showing the relevance of who handles the accounting, when and for what purpose. We also explain how MAC can be used even by managers in small firms who are close to actual operations. Secondly, we explain the significant impact of external stakeholders as carriers of logics on logic embeddedness and enactment. We find that this influence relates to the intensity of interactions and the learning involved in them, and how both are enabled by MAC.
keywords: مدیریت حسابداری مدیریت و کنترل | شرکت های کوچک خانواده | مزارع | منطق نهادی | تعبیه | سهامداران | Management accounting and control practices | Small family firms | Farms | Institutional logics | Embeddedness | Stakeholders
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 756 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 756 :::::::: افراد آنلاین: 76