با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
A computer vision-based method for bridge model updating using displacement influence lines
یک روش مبتنی بر بینایی کامپیوتری برای بهروزرسانی مدل پل با استفاده از خطوط موثر جابجایی-2022 This paper presents a new computer vision-based method that simultaneously provides the moving vehicle’s
tire loads, the location of the loads on a bridge, and the bridge’s response displacements, based on which the
bridge’s influence lines can be constructed. The method employs computer vision techniques to measure the
displacement influence lines of the bridge at different target positions, which is then later used to perform
model updating of the finite element models of the monitored structural system.
The method is enabled by a novel computer vision-based vehicle weigh-in-motion method which the coauthors recently introduced. A correlation discriminating filter tracker is used to estimate the displacements at target points and the location of single or multiple moving loads, while a low-cost, non-contact weigh-in-motion technique evaluates the magnitude of the moving vehicle loads. The method described in this paper is tested and validated using a laboratory bridge model. The system was loaded with a vehicle with pressurized tires and equipped with a monitoring system consisting of laser displacement sensors, accelerometers, and cameras. Both artificial and natural targets were considered in the experimental tests to track the displacements with the cameras and yielded robust results consistent with the laser displacement measurements. The extracted normalized displacement influence lines were then successfully used to perform model updating of the structure. The laser displacement sensors were used to validate the accuracy of the proposed computer vision-based approach in deriving the displacement measurements, while the accelerometers were used to derive the system’s modal properties employed to validate the updated finite element model. As a result, the updated finite element model correctly predicted the bridge’s displacements measured during the tests. Furthermore, the modal parameters estimated by the updated finite element model agreed well with those extracted from the experimental modal analysis carried out on the bridge model. The method described in this paper offers a low-cost non-contact monitoring tool that can be efficiently used without disrupting traffic for bridges in model updating analysis or long-term structural health monitoring. keywords: Computer vision | Displacement influence line | Vehicle weigh-in-motion | Structural identification | Finite element method model | Model updating | Modal analysis | Bridge systems |
مقاله انگلیسی |
2 |
A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions
بررسی جامع تشخیص حملات سایبری: مجموعه دادهها، روشها، چالش ها و جهتگیریهای تحقیقاتی آینده-2022 Rapid developments in network technologies and the amount and scope of data transferred on networks
are increasing day by day. Depending on this situation, the density and complexity of cyber threats
and attacks are also expanding. The ever-increasing network density makes it difficult for cybersecurity professionals to monitor every movement on the network. More frequent and complex cyberattacks make the detection and identification of anomalies in network events more complex. Machine
learning offers various tools and techniques for automating the detection of cyber attacks and for
rapid prediction and analysis of attack types. This study discusses the approaches to machine learning
methods used to detect attacks. We examined the detection, classification, clustering, and analysis of
anomalies in network traffic. We gave the cyber-security focus, machine learning methods, and data
sets used in each study we examined. We investigated which feature selection or dimension reduction
method was applied to the data sets used in the studies. We presented in detail the types of classification
carried out in these studies, which methods were compared with other methods, the performance
metrics used, and the results obtained in tables. We examined the data sets of network attacks presented
as open access. We suggested a basic taxonomy for cyber attacks. Finally, we discussed the difficulties
encountered in machine learning applications used in network attacks and their solutions
Keywords: Cyber attacks | Machine learning | Deep learning | Geometric deep learning | Cyber security | Adversarial machine learning | Intrusion detection |
مقاله انگلیسی |
3 |
A Two-layer Fog-Cloud Intrusion Detection Model for IoT Networks
مدل تشخیص نفوذ مه-ابر دو لایه برای شبکه های اینترنت اشیا-2022 The Internet of Things (IoT) and its applications are becoming ubiquitous in our life. However,
the open deployment environment and the limited resources of IoT devices make them vulnerable
to cyber threats. In this paper, we investigate intrusion detection techniques to mitigate attacks
that exploit IoT security vulnerabilities. We propose a machine learning-based two-layer hierarchical intrusion detection mechanism that can effectively detect intrusions in IoT networks
while satisfying the IoT resource constraints. Specifically, the proposed model effectively utilizes
the resources in the fog layer of the IoT network by efficiently deploying multi-layered feedforward neural networks in the fog-cloud infrastructure for detecting network attacks. With a fog
layer into the picture, analysis is dynamically distributed across the fog and cloud layer thus
enabling real-time analytics of traffic data closer to IoT devices and end-users. We have performed
extensive experiments using two publicly available datasets to test the proposed approach. Test
results show that the proposed approach outperforms existing approaches in multiple performance metrics such as accuracy, precision, recall, and F1-score. Moreover, experiments also
justified the proposed model in terms of improved service time, lower delay, and optimal energy
utilization.
keywords: Fog computing | Intrusion detection | IoT network | Machine learning | Security |
مقاله انگلیسی |
4 |
Beacon Non-Transmission attack and its detection in intelligent transportation systems
حمله عدم انتقال Beacon و تشخیص آن در سیستم های حمل و نقل هوشمند-2022 Message dropping by intermediate nodes as well as RF jamming attack have been studied
widely in ad hoc networks. In this paper, we thoroughly investigate a new type of attack
in intelligent transportation systems (ITS) defined as Beacon Non-Transmission (BNT) attack
in which attacker is not an intermediate vehicle, but rather a source vehicle. In BNT attack,
a vehicle suppresses the transmissions of its own periodic beacon packets to get rid of the
automated driving misbehavior detection protocols running in ITS, or to mount a Denial-ofService (DoS) attack to cripple the traffic management functionality of ITS. Considering BNT
attack as a critical security threat to ITS, we propose two novel and lightweight techniques to
detect it. Our first technique bases its detection by assuming a certain distribution of the number
of beacons lost from a vehicle while accounting for loss due to channel-error. However, it fails to
classify shortish BNT attacks wherein amount of denial and channel-error loss are comparable.
Our second technique, suitable for identifying both shortish and longish BNT attacks, considers
beacon loss pattern of a vehicle as a time-series data and employs autocorrelation function (ACF)
to determine the existence of an attack. In order to trade-off detection accuracy for equitable
use of limited computational resources, we propose a random inspection model in which the
detection algorithm is executed at random time instances and for randomly selected set of
vehicles. We have performed extensive simulations to evaluate the performance of proposed
detection algorithms under random inspection and a practical attacker model. The results
obtained corroborate the lightweight nature of both techniques, and the efficacy of ACF based
technique over simple threshold based technique in terms of higher detection accuracy as well
as smaller reaction delay.
keywords: DoS attack | Intrusion detection | Driving anomaly detection | Beacon | Autocorrelation function | Intelligent Transportation Systems |
مقاله انگلیسی |
5 |
Nanoinfiltration behavior of carbon nanotube based nanocomposites with enhanced mechanical and electrical properties
رفتار نانوفیلتراسیون نانوکامپوزیت های مبتنی بر نانولوله کربنی با خواص مکانیکی و الکتریکی بهبود یافته-2021 In this work, carbon nanotube (CNT) based nanocomposites with high mass fraction are proposed by
in-situ bridging carbon matrix into CNT paper through optimized chemical vapor infiltration (CVI).
Nanoinfiltration behavior of CNTs is basically investigated under the CVI process. The contact between
each CNT can be strengthened and the conductive pathways can be established, resulting in the better
mechanical and electrical properties. Compared with the pristine CNT paper, the CNT/C composite after
pyrolysis process confirms a remarkable advance in tensile strength (up to 310 ± 13 MPa) and Young’s
modulus (up to 2.4 ± 0.1 GPa). Besides, a notable feature of electrical conductivity also shows an improvement up to 8.5 S/cm, which can be attributed to the mass fraction of CNT (41 wt%) breaking the limits of
percolation thresholds and the efficient densification of this sample to establish the conductive pathways.
This study has a broad application in the development of the multi-functional electrical and engineering
materials.
Keywords: Carbon nanotube | Chemical vapor infiltration (CVI) | Nanocomposites |
مقاله انگلیسی |
6 |
The architecture of accounting and the neoliberal betrayal of life
معماری حسابداری و خیانت نئولیبرالی از زندگی-2021 This paper identifies the way in which accounting practices reinforced the increasing influence of
the intolerant financial emphasis of the market on the quality of social housing under neoliber-
alism when successive British governments gave little importance to the impact of aesthetic and
ethical qualities of social housing on the well-being of inhabitants. Social values, most especially
safety and beauty, were able to be reinterpreted according to economic logic, thereby denying the
need for them to be explicitly considered in any social housing decisions. The study emphasises
the way in which the austerity and deregulation agenda of neoliberal policies that had a signif-
icant impact on building and fire safety regulations were ultimately justified by financial criteria.
The Grenfell Tower fire in 2017 belatedly exposed the way in which the financial and operational
visibilities created by accounting practices had become crucial to the successful implementation
of the economic logic of the neoliberal agenda and related market priorities of successive British
governments, irrespective of the consequences. The paper demonstrates how the Grenfell Tower
refurbishment was the apotheosis of neoliberalism; a toxic mix of austerity, outsourcing and
deregulation. The focus on value for money in the refurbishment led ultimately to the betrayal of
life of the residents. keywords: حسابداری | برج گرنفل | مسکن اجتماعی | نئولیبرالیسم | فوکو | Accounting | Grenfell Tower | Social housing | Neoliberalism | Foucault |
مقاله انگلیسی |
7 |
Moisture dependence of electrical resistivity in under-percolated cement-based composites with multi-walled carbon nanotubes
وابستگی مقاومت الکتریکی به رطوبت در کامپوزیت های پایه سیمانی کم نفوذ با نانولوله های کربنی چند جداره-2021 Cement-based piezoresistive composites have attracted significant attention as smart construction materials for embedding self-sensing capability in concrete infrastructure. Although a number of studies have been conducted using multi-walled carbon nanotubes (MWCNTs) as a functional filler for self-sensing cement-based composites, studies addressing the influence of the internal moisture state on the electrical properties are relatively scant. In this study, we aim to experimentally investigate the effect of internal moisture state on the electrical resistivity of cement-based composites containing MWCNTs as an electrically conductive medium to raise a need for calibration of self-sensing data considering the internal moisture state. To this end, the moisture dependence of electrical resistivity in under-percolated cement-based composites was mainly evaluated, along with other material properties such as strength, shrinkage, and flowability. Results revealed that the electrical resistivity increased almost linearly as the internal relative humidity (IRH) decreased, and the increase was more pronounced below the percolation threshold. In addition, it was found that the strength gained by the microfiller effect of MWCNTs was significantly reduced particularly in under-percolated mixtures, leading to overall strength reductions. Furthermore, this study showed that the more the MWCNT was added, the smaller the flowability was obtained due to the increased viscosity of the mixture. The findings of this study are expected to provide pivotal information for accurate and reliable interpretations of self-sensing data generated by MWCNT-embedded cement-based composites.
Keywords: carbon nanotubes | cement-based composites | electrical resistivity | internal relative humidity | percolation threshold | self-sensing |
مقاله انگلیسی |
8 |
تحلیل شبکه اجتماعی: بررسی ارتباطات برای پیشرفت علم پرستاری نظامی
سال انتشار: 2021 - تعداد صفحات فایل pdf انگلیسی: 11 - تعداد صفحات فایل doc فارسی: 30 زمینه: دانشمندان پرستار نظامی در شاخه های وابسته به خدمات گنجانده شده اند (ارتش ، نیروی دریایی ، نیروی هوایی) با مأموریت های مختلف ، اما با هدف منحصر به فرد تولید و انتشار تحقیقات موثر بر سلامتی و رفاه ذینفعان وزارت دفاع.
هدف: این پروژه همکاری بین تحقیقات پرستاری TriService را بررسی می کند اعضای برنامه (TSNRP) ، به دنبال فرصت هایی برای تقویت ، متنوع سازی و گسترش همکاری تحقیقاتی هستند. روش: تجزیه و تحلیل شبکه های اجتماعی (SNA) تحقیق تجربی از روابط بین بازیگران اجتماعی در سطوح مختلف تجزیه و تحلیل است . یک ارزیابی الکترونیکی SNA و نمونه برداری کلی برای بررسی همکاری های فعلی دانشمندان پرستار نظامی دکترای آماده (136 ( N= استفاده شد. یافته ها: شبکه همکاری TSNRP دارای ساختار پیچیده خدمات محور است با بازیگران سطح بالا که دیگران به دنبال مشاوره ، دانش یا مهارت آنها هستند و به عنوان اتصالات یا پلهای مختلف در بین شعب خدمات فعالیت می کنند. بحث: از نظر دانشمندان نظامی ، SNA در شناسایی افراد با نفوذ ، تجسم فرصت های مشاوره درون خدماتی ، طراحی سیاست های پاسخگو و جهت دهی فرصت های شغلی برای دانشمندان تازه کار نقش مهمی دارد. کلید واژه ها: همکاری های حرفه ای دانشمندان پرستار | تحلیل شبکه اجتماعی | شبکه های اجتماعی | پرستاری نظامی | زمینه |
مقاله ترجمه شده |
9 |
Impacts of leadership style, organizational design and HRM practices on knowledge hiding: The indirect roles of organizational justice and competitive work environment
تأثیر سبک رهبری، طراحی سازمانی و شیوههای مدیریت منابع انسانی بر پنهانسازی دانش: نقشهای غیرمستقیم عدالت سازمانی و محیط کار رقابتی-2021 In this paper, we investigate how Leadership Style, Organizational Design, and HRM practices influence
Knowledge Hiding. Organizational Justice and Competitive Work Environment are additionally considered as
mediating variables of these impacts. 224 professionals completed an extensive survey with questions corre-
sponding to the hypothesized effects. Based on partial least squares regression to test these hypotheses, this study
shows that Leadership Style and Organizational Design mitigate Knowledge Hiding only when Organizational
Justice is developed. While HRM practices can also decrease the intention of employees to hide knowledge in
cases with high levels of justice, they may induce such behavior in a highly competitive work environment.
Hence, this research contributes to knowledge management literature by examining the joint influence on
knowledge hiding of organizational factors that genuinely describe an organization’s structure and climate. From
a practical standpoint, we recommend that managers establish the right balance between justice and competition
to reduce knowledge hiding. keywords: Knowledge hiding | Leadership style | Organisational design | HRM practices | Organizational justice | Competitive work environment |
مقاله انگلیسی |
10 |
Institutionalised management accounting and control in farm businesses
حسابداری مدیریت و کنترل نهادینه شده در شرکت های مزرعه-2021 This paper analyses the management accounting and control practices (MAC) in dairy farms as examples of small
family firms, a segment that is rarely studied. We consider how the relative extent of embeddedness in the
institutional logics of business, family and farming shapes MAC and how farmers cope with logic tensions
through alignment and prioritizing. First, our findings lend nuance to the suggested ’negative’ role of family on
the sophistication of MAC, showing the relevance of who handles the accounting, when and for what purpose.
We also explain how MAC can be used even by managers in small firms who are close to actual operations.
Secondly, we explain the significant impact of external stakeholders as carriers of logics on logic embeddedness
and enactment. We find that this influence relates to the intensity of interactions and the learning involved in
them, and how both are enabled by MAC. keywords: مدیریت حسابداری مدیریت و کنترل | شرکت های کوچک خانواده | مزارع | منطق نهادی | تعبیه | سهامداران | Management accounting and control practices | Small family firms | Farms | Institutional logics | Embeddedness | Stakeholders |
مقاله انگلیسی |