با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
Computer vision for anatomical analysis of equipment in civil infrastructure projects: Theorizing the development of regression-based deep neural networks
چشم انداز کامپیوتری برای تجزیه و تحلیل آناتومیکی تجهیزات در پروژه های زیرساختی عمرانی: نظریه پردازی توسعه شبکه های عصبی عمیق مبتنی بر رگرسیون-2022 There is high demand for heavy equipment in civil infrastructure projects and their performance is a determinant
of the successful delivery of site operations. Although manufacturers provide equipment performance hand-
books, additional monitoring mechanisms are required to depart from measuring performance on the sole basis
of unit cost for moved materials. Vision-based tracking and pose estimation can facilitate site performance
monitoring. This research develops several regression-based deep neural networks (DNNs) to monitor equipment
with the aim of ensuring safety, productivity, sustainability and quality of equipment operations. Annotated
image libraries are used to train and test several backbone architectures. Experimental results reveal the pre-
cision of DNNs with depthwise separable convolutions and computational efficiency of DNNs with channel
shuffle. This research provides scientific utility by developing a method for equipment pose estimation with the
ability to detect anatomical angles and critical keypoints. The practical utility of this study is the provision of
potentials to influence current practice of articulated machinery monitoring in projects. keywords: هوش مصنوعی (AI) | سیستم های فیزیکی سایبری | معیارهای ارزیابی خطا | طراحی و آزمایش تجربی | تخمین ژست کامل بدن | صنعت و ساخت 4.0 | الگوریتم های یادگیری ماشین | معماری های ستون فقرات شبکه | Artificial intelligence (AI) | Cyber physical systems | Error evaluation metrics | Experimental design and testing | Full body pose estimation | Industry and construction 4.0 | Machine learning algorithms | Network backbone architectures |
مقاله انگلیسی |
2 |
A combined real-time intelligent fire detection and forecasting approach through cameras based on computer vision method
یک رویکرد تشخیص و پیشبینی حریق هوشمند ترکیبی در زمان واقعی از طریق دوربینها بر اساس روش بینایی کامپیوتری-2022 Fire is one of the most common hazards in the process industry. Until today, most fire alarms have had very
limited functionality. Normally, only a simple alarm is triggered without any specific information about the fire
circumstances provided, not to mention fire forecasting. In this paper, a combined real-time intelligent fire
detection and forecasting approach through cameras is discussed with extracting and predicting fire development
characteristics. Three parameters (fire spread position, fire spread speed and flame width) are used to charac-
terize the fire development. Two neural networks are established, i.e., the Region-Convolutional Neural Network
(RCNN) for fire characteristic extraction through fire detection and the Residual Network (ResNet) for fire
forecasting. By designing 12 sets of cable fire experiments with different fire developing conditions, the accu-
racies of fire parameters extraction and forecasting are evaluated. Results show that the mean relative error
(MRE) of extraction by RCNN for the three parameters are around 4–13%, 6–20% and 11–37%, respectively.
Meanwhile, the MRE of forecasting by ResNet for the three parameters are around 4–13%, 11–33% and 12–48%,
respectively. It confirms that the proposed approach can provide a feasible solution for quantifying fire devel-
opment and improve industrial fire safety, e.g., forecasting the fire development trends, assessing the severity of
accidents, estimating the accident losses in real time and guiding the fire fighting and rescue tactics. keywords: ایمنی آتش سوزی صنعتی | تشخیص حریق | پیش بینی آتش سوزی | تجزیه و تحلیل آتش سوزی | هوش مصنوعی | Industrial fire safety | Fire detection | Fire forecasting | Fire analysis | Artificial intelligence |
مقاله انگلیسی |
3 |
Private Computation of Phylogenetic Trees Based on Quantum Technologies
محاسبات خصوصی درختان فیلوژنتیک بر اساس فناوری های کوانتومی-2022 Individuals’ privacy and legal regulations demand genomic data be handled and studied
with highly secure privacy-preserving techniques. In this work, we propose a feasible Secure Multiparty
Computation (SMC) system assisted with quantum cryptographic protocols that is designed to compute a
phylogenetic tree from a set of private genome sequences. This system significantly improves the privacy
and security of the computation thanks to three quantum cryptographic protocols that provide enhanced
security against quantum computer attacks. This system adapts several distance-based methods (Unweighted
Pair Group Method with Arithmetic mean, Neighbour-Joining, Fitch-Margoliash) into a private setting
where the sequences owned by each party are not disclosed to the other members present in the protocol.
We theoretically evaluate the performance and privacy guarantees of the system through a complexity
analysis and security proof and give an extensive explanation about the implementation details and cryptographic protocols. We also implement a quantum-assisted secure phylogenetic tree computation based on
the Libscapi implementation of the Yao, the PHYLIP library and simulated keys of two quantum systems:
Quantum Oblivious Key Distribution and Quantum Key Distribution. This demonstrates its effectiveness
and practicality. We benchmark this implementation against a classical-only solution and we conclude that
both approaches render similar execution times, the only difference being the time overhead taken by the
oblivious key management system of the quantum-assisted approach.
INDEX TERMS: Genomics | phylogenetic trees | privacy | quantum oblivious transfer | quantum secure multiparty computation | security. |
مقاله انگلیسی |
4 |
مدیریت بر اساس ارزش ها: مطالعه کیفی چگونگی مشاهده و اجرای مسئولیت های کارفرمای خود در رابطه با مدیریت ایمنی و بهداشت شغلی توسط صاحبان مشاغل کوچک در بخش نظافت
سال انتشار: 2022 - تعداد صفحات فایل pdf انگلیسی: 7 - تعداد صفحات فایل doc فارسی: 25 برای این مطالعه با نه صاحب کسب و کار کوچک سوئدی در بخش نظافت در رابطه با نظرات و تجربیات شخصی آنها در مورد مسئولیت های کارفرما در رابطه با مدیریت ایمنی و بهداشت شغلی مصاحبه شد. تجزیه و تحلیل توسط یک تحلیل محتوای کیفی هدایت می شود که استراتژی های اعمال شده برای رهبری مسئول را بررسی می کند. ما متوجه شدیم که یک الگوی رفتاری خاص وجود دارد که بیش از بقیه برجسته است. صاحبان مشاغل کوچک مرتباً شکلی از رهبری مسئولانه را اجرا می کنند که ما آن را مدیریت ارزش ها می نامیم. مدیریت بر اساس ارزش ها با استفاده از سه راهبرد ایجاد روابط کارکنان، مدیریت منطقی و انتقال مسئولیت به کار گرفته شد. این سبک مدیریت می تواند برای شرایط کاری کارکنان هم نقطه قوت و هم نقطه ضعف باشد. نقاط قوت این است که مالکان حمایت می کنند، راهنمایی می کنند، و برقراری ارتباط در رهبری خود با کارکنان خود در حالی که نقاط ضعف می تواند این باشد که آنها، مالکان، مدیریت ایمنی و بهداشت شغلی خود را به جای دانش، بر ارزش ها قرار می دهند. در نتیجه، برای اقدامات مربوط به محیط کار، مسئولیتهایی از صاحبان مشاغل کوچک به کارکنانشان منتقل میشود. نتیجهگیری این مطالعه این است که با اعمال مدیریت بر اساس ارزشها، به نظر میرسد صاحبان کسبوکارهای کوچک شرایط کاری روانی-اجتماعی خوبی را در شرکتهای خود ارتقا میدهند و در عین حال کمبود دانش در مورد مدیریت ایمنی و بهداشت شغلی نشان میدهند. این ممکن است به معنای این خطر باشد که رویکردهای سیستماتیک برای شرایط فیزیکی محیط کار در رابطه با مسائل ایمنی اعمال نشود. مدیریت ایمنی و بهداشت شغلی خود را به جای دانش بر اساس ارزش ها قرار می دهند. در نتیجه، برای اقدامات مربوط به محیط کار، مسئولیتهایی از صاحبان مشاغل کوچک به کارکنانشان منتقل میشود. نتیجهگیری این مطالعه این است که با اعمال مدیریت بر اساس ارزشها، به نظر میرسد که صاحبان مشاغل کوچک شرایط کاری روانی-اجتماعی خوبی را در شرکتهای خود ارتقا میدهند و در عین حال کمبود دانش در مورد مدیریت ایمنی و بهداشت شغلی نشان میدهند. این ممکن است به معنای این خطر باشد که رویکردهای سیستماتیک برای شرایط فیزیکی محیط کار در رابطه با مسائل ایمنی اعمال نشود. مدیریت ایمنی و بهداشت شغلی خود را به جای دانش بر اساس ارزش ها قرار می دهند. در نتیجه، برای اقدامات مربوط به محیط کار، مسئولیتهایی از صاحبان مشاغل کوچک به کارکنانشان منتقل میشود. نتیجهگیری این مطالعه این است که با اعمال مدیریت بر اساس ارزشها، به نظر میرسد صاحبان کسبوکارهای کوچک شرایط کاری روانی-اجتماعی خوبی را در شرکتهای خود ارتقا میدهند و در عین حال کمبود دانش در مورد مدیریت ایمنی و بهداشت شغلی نشان میدهند. این ممکن است به معنای این خطر باشد که رویکردهای سیستماتیک برای شرایط فیزیکی محیط کار در رابطه با مسائل ایمنی اعمال نشود. نتیجهگیری این مطالعه این است که با اعمال مدیریت بر اساس ارزشها، به نظر میرسد که صاحبان مشاغل کوچک شرایط کاری روانی-اجتماعی خوبی را در شرکتهای خود ارتقا میدهند و در عین حال کمبود دانش در مورد مدیریت ایمنی و بهداشت شغلی نشان میدهند. این ممکن است به معنای این خطر باشد که رویکردهای سیستماتیک برای شرایط فیزیکی محیط کار در رابطه با مسائل ایمنی اعمال نشود. نتیجهگیری این مطالعه این است که با اعمال مدیریت بر اساس ارزشها، به نظر میرسد که صاحبان مشاغل کوچک شرایط کاری روانی-اجتماعی خوبی را در شرکتهای خود ارتقا میدهند و در عین حال کمبود دانش در مورد مدیریت ایمنی و بهداشت شغلی نشان میدهند. این ممکن است به معنای این خطر باشد که رویکردهای سیستماتیک برای شرایط فیزیکی محیط کار در رابطه با مسائل ایمنی اعمال نشود.
کلید واژه ها: صاحبان مشاغل کوچک | صنعت نظافت | بهداشت و ایمنی شغلی | رهبری مسئول |
مقاله ترجمه شده |
5 |
Secure Social Internet of Things Based on Post-Quantum Blockchain
اینترنت اجتماعی ایمن اشیا بر اساس بلاک چین پس کوانتومی-2022 With the advancement of the application of Internet
of Things (IoTs), the IoT technology is combining with the social
network, forming a new network with private object information
as the media and social entertainment as the purpose. Social
Internet of things (SIoTs) is a new application of IoT technology
in social network. The current SIoT systems are centralized and
the user’s security and privacy is not properly protected. In
order to address the challenges in SIoTs, we propose a privacy
protection system for the users. First, we propose a post-quantum
ring signature. Second, we propose a blockchain system based on
the ring signature. Compared with the traditional SIoTs, our
system is based on post-quantum techniques, which is secure
against both traditional computers and quantum computers. The
results of the blockchain system show that it is very suitable for
SIoTs.
Index Terms—Social Internet of Things (SIoTs) | Internet of Things (IoTs) | Blockchain | Post-Quantum Signature. |
مقاله انگلیسی |
6 |
The “Cyber Security via Determinism” Paradigm for a Quantum Safe Zero Trust Deterministic Internet of Things (IoT)
پارادایم «امنیت سایبری از طریق جبرگرایی» برای اینترنت اشیا قطعی (IoT) ایمن صفر کوانتومی-2022 The next-generation Internet of Things (IoT) will control the critical infrastructure of the 21st
century, including the Smart Power Grid and Smart Cities. It will also support Deterministic Communications, where ‘deterministic traffic flows’ (D-flows) receive strict Quality-of-Service (QoS) guarantees.
A ‘Cybersecurity via Determinism’ paradigm for the next-generation ‘Industrial and Tactile Deterministic
IoT’ is presented. A forwarding sub-layer of simple and secure ‘deterministic packet switches’ (D-switches)
is introduced into layer-3. This sub-layer supports many deterministic Software Defined Wide Area Networks
(SD-WANs), along with 3 new tools for improving cyber security: Access Control, Rate Control, and
Isolation Control. A Software Defined Networking (SDN) control-plane configures each D-switch (ie FPGA)
with multiple deterministic schedules to support D-flows. The SDN control-plane can embed millions of
isolated Deterministic Virtual Private Networks (DVPNs) into layer 3. This paradigm offers several benefits:
1) All congestion, interference, and Distributed Denial-of-Service (DDOS) attacks are removed; 2) Buffer
sizes in D-switches are reduced by 1000C times; 3) End-to-end IoT delays can be reduced to ultra-low
latencies, i.e., the speed-of-light in fiber; 4) The D-switches do not require Gigabytes of memory to store
large IP routing tables; 5) Hardware support is provided in layer 3 for the US NIST Zero Trust Architecture;
6) Packets within a DVPN can be entirely encrypted using Quantum Safe encryption, which is impervious
to attacks by Quantum Computers using existing quantum algorithms; 7) The probability of an undetected
cyberattack targeting a DVPN can be made arbitrarily small by using long Quantum Safe encryption keys;
and 8) Savings can reach $10s of Billions per year, through reduced capital, energy and operational costs.
INDEX TERMS: Cyber security | deterministic, the Internet of Things (IoT) | quantum computing, zero trust | encryption | privacy | Software Defined Networking (SDN) | industrial internet of things (IIoT) | tactile Internet of Things | FPGA | Industry 4.0 | deterministic Internet of Things. |
مقاله انگلیسی |
7 |
Tunneling Current Through a Double Quantum Dots System
جریان تونل زنی از طریق سیستم دو نقطه کوانتومی-2022 Electrostatically confined quantum dots in semiconductors hold the promise to achieve high
scalability and reliability levels for practical implementation of solid-state qubits where the electrochemical
potentials of each quantum dot can be independently controlled by the gate voltages.In this paper, the
current and charge stability diagram of two-well potentials arising from electrostatically defined double
quantum dot (DQD) are analytically realized. We propose to apply the Generalized Hubbard model to find
the Hamiltonian of the system. The proposed analysis takes the tunnel coupling between the dots, Coulomb
interaction, and Zeeman energy arising from an external magnetic field into account. Using quantum master
equations to predict the probability of the final states in a DQD system, we study the tunneling current
through two quantum dots coupled in series with two conducting leads, and therefore, the charge stability
diagram is theoretically investigated. The impact of the tunnel coupling and Zeeman energy on the charge
stability diagram is deeply discussed. The validity of the presented analysis is confirmed by experimental
data as well as the classical capacitance model.
INDEX TERMS: Double quantum dot | hubbard model | zeeman energy | charge stability diagram | master equation. |
مقاله انگلیسی |
8 |
Secure firmware Over-The-Air updates for IoT: Survey, challenges, and discussions
به روز رسانی ایمن میان افزار خارج از هوا برای اینترنت اشیا: بررسی، چالش ها و بحث ها-2022 The Internet of Things (IoT) market has shown strong growth in recent years, where many
manufacturers of IoT devices and IoT-related service providers are competing. Time to market
has become essential to be competitive. The faster a competitor develops and integrates his
product, the more likely he is to dominate the market. This competition could lead to critical
security issues due to the lack of testing or the short development time. Moreover, lots of
IoT devices present some vulnerabilities that can be exploited by attackers. They are also
constantly subject to Zero-days, which require quick intervention to maintain the security of
the environments in which they are deployed in. For these purposes, the quick update of the
firmware image of these IoT devices is an effective way to counter most of these attacks. This
document starts by defining the firmware update mechanisms for IoT, and in particular the ones
done Over-The-Air. Then presents a state-of-the-art of the currently proposed solutions, with the
particularity of surveying from the literature, the standardization bodies and from some well known industrial solutions. It also proposes a new classification of the different types of System
on Chip (SoC) present in the marketed IoT devices together with an analysis of the different
challenges and threats related to the OTA update. The objective is to open up the horizon for
future research directions.
keywords: دستگاه های اینترنت اشیا | نرم افزار | به روز رسانی | خارج از هوا | امنیت | حریم خصوصی | بررسی | مرور | چالش ها | تهدیدات | زنجیره اعتماد | IoT devices | Firmware | Updates | Over-The-Air | Security | Privacy | State of the art | Survey | Challenges | Threats | Trust chain |
مقاله انگلیسی |
9 |
Securing wireless communications from the perspective of physical layer: A survey
ایمن سازی ارتباطات بی سیم از دیدگاه لایه فیزیکی: یک مرور-2022 Ultra-reliability low-latency communication (uRLLC) is a new service category of the fifthgeneration (5G) mobile wireless networks, also plays a crucial role in the sixth-generation (6G)
networks. Given the openness of the wireless environment, the security and confidentiality of
uRLLC are of utmost important. Since traditional cryptography methods often feature significant
complex designs and processing delays, physical layer security (PLS) technologies exploiting the
inherent properties of the wireless medium have become a promising solution to secure wireless
communications. However, most existing PLS methods assume a finite block-length regime,
which cannot cater to uRLLC with short block-lengths. In this paper, the PLS technologies for
uRLLC were comprehensively investigated. First, we reviewed the typical characteristics of the
next-generation mobile networks and analyzed the threats faced by the physical layer. Then,
we introduced the traditional solutions and performance metrics of PLS with a finite blocklength regime. Furthermore, we discussed several physical layer technologies and observed their
influence on PLS. Additionally, this study also analyzed the impact of the unique characteristics
of 5G networks on communication securit, such as the mobility.
Keywords: uRLLC | Wireless networks | Security and confidentiality | PLS | Finite block-length |
مقاله انگلیسی |
10 |
Sensible and secure IoT communication for digital twins, cyber twins, web twins
ارتباط معقول و ایمن IoT برای زوج های دیجیتال، زوج های سایبری، زوج های وب-2022 In order to effectively solve the current security problems encountered by smart wireless terminals in the digital
twin biological network, to ensure the stable and efficient operation of the wireless communication network. This
research aims to reduce the interference attack in the communication network, an interference source location
scheme based on Mobile Tracker in the communication process of the Internet of Things (IoT) is designed. Firstly,
this paper improves Attribute-Based Encryption (ABE) to meet the security and overhead requirements of digital
twin networking communication. The access control policy is used to encrypt a random key, and the symmetric
encryption scheme is used to hide the key. In addition, in the proposed interference source location technology,
the influence of observation noise is reduced based on the principle of unscented Kalman filter, and the estimated
interference source location is modified by the interference source motion model. In order to further evaluate the
performance of the method proposed as the interference source, this paper simulates the jamming attack scenario.
The Root Mean Square Error (RMSE) value of the proposed algorithm is 0.245 m, which is better than the ErrMin
algorithm (0.313 m), and the number of observation nodes of the proposed algorithm is less than half of the
ErrMin algorithm. To sum up, satisfactory results can be achieved by taking the Jamming Signal Strength (JSS)
information as the observation value and estimating the location of the interference source and other state information based on the untracked Kalman filter algorithm. This research has significant value for the secure
communication of the digital twins in the IoT.
keywords: زوج دیجیتال | سیستم فیزیکی-سایبری | زوج وب | ارتباطات اینترنت اشیا | امنیت ارتباطات | Digital twin | Cyber-physical system | Web twins | IoT communication | Communication security |
مقاله انگلیسی |