دانلود و نمایش مقالات مرتبط با یمن::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - یمن

تعداد مقالات یافته شده: 473
ردیف عنوان نوع
1 Computer vision for anatomical analysis of equipment in civil infrastructure projects: Theorizing the development of regression-based deep neural networks
چشم انداز کامپیوتری برای تجزیه و تحلیل آناتومیکی تجهیزات در پروژه های زیرساختی عمرانی: نظریه پردازی توسعه شبکه های عصبی عمیق مبتنی بر رگرسیون-2022
There is high demand for heavy equipment in civil infrastructure projects and their performance is a determinant of the successful delivery of site operations. Although manufacturers provide equipment performance hand- books, additional monitoring mechanisms are required to depart from measuring performance on the sole basis of unit cost for moved materials. Vision-based tracking and pose estimation can facilitate site performance monitoring. This research develops several regression-based deep neural networks (DNNs) to monitor equipment with the aim of ensuring safety, productivity, sustainability and quality of equipment operations. Annotated image libraries are used to train and test several backbone architectures. Experimental results reveal the pre- cision of DNNs with depthwise separable convolutions and computational efficiency of DNNs with channel shuffle. This research provides scientific utility by developing a method for equipment pose estimation with the ability to detect anatomical angles and critical keypoints. The practical utility of this study is the provision of potentials to influence current practice of articulated machinery monitoring in projects.
keywords: هوش مصنوعی (AI) | سیستم های فیزیکی سایبری | معیارهای ارزیابی خطا | طراحی و آزمایش تجربی | تخمین ژست کامل بدن | صنعت و ساخت 4.0 | الگوریتم های یادگیری ماشین | معماری های ستون فقرات شبکه | Artificial intelligence (AI) | Cyber physical systems | Error evaluation metrics | Experimental design and testing | Full body pose estimation | Industry and construction 4.0 | Machine learning algorithms | Network backbone architectures
مقاله انگلیسی
2 A combined real-time intelligent fire detection and forecasting approach through cameras based on computer vision method
یک رویکرد تشخیص و پیش‌بینی حریق هوشمند ترکیبی در زمان واقعی از طریق دوربین‌ها بر اساس روش بینایی کامپیوتری-2022
Fire is one of the most common hazards in the process industry. Until today, most fire alarms have had very limited functionality. Normally, only a simple alarm is triggered without any specific information about the fire circumstances provided, not to mention fire forecasting. In this paper, a combined real-time intelligent fire detection and forecasting approach through cameras is discussed with extracting and predicting fire development characteristics. Three parameters (fire spread position, fire spread speed and flame width) are used to charac- terize the fire development. Two neural networks are established, i.e., the Region-Convolutional Neural Network (RCNN) for fire characteristic extraction through fire detection and the Residual Network (ResNet) for fire forecasting. By designing 12 sets of cable fire experiments with different fire developing conditions, the accu- racies of fire parameters extraction and forecasting are evaluated. Results show that the mean relative error (MRE) of extraction by RCNN for the three parameters are around 4–13%, 6–20% and 11–37%, respectively. Meanwhile, the MRE of forecasting by ResNet for the three parameters are around 4–13%, 11–33% and 12–48%, respectively. It confirms that the proposed approach can provide a feasible solution for quantifying fire devel- opment and improve industrial fire safety, e.g., forecasting the fire development trends, assessing the severity of accidents, estimating the accident losses in real time and guiding the fire fighting and rescue tactics.
keywords: ایمنی آتش سوزی صنعتی | تشخیص حریق | پیش بینی آتش سوزی | تجزیه و تحلیل آتش سوزی | هوش مصنوعی | Industrial fire safety | Fire detection | Fire forecasting | Fire analysis | Artificial intelligence
مقاله انگلیسی
3 Private Computation of Phylogenetic Trees Based on Quantum Technologies
محاسبات خصوصی درختان فیلوژنتیک بر اساس فناوری های کوانتومی-2022
Individuals’ privacy and legal regulations demand genomic data be handled and studied with highly secure privacy-preserving techniques. In this work, we propose a feasible Secure Multiparty Computation (SMC) system assisted with quantum cryptographic protocols that is designed to compute a phylogenetic tree from a set of private genome sequences. This system significantly improves the privacy and security of the computation thanks to three quantum cryptographic protocols that provide enhanced security against quantum computer attacks. This system adapts several distance-based methods (Unweighted Pair Group Method with Arithmetic mean, Neighbour-Joining, Fitch-Margoliash) into a private setting where the sequences owned by each party are not disclosed to the other members present in the protocol. We theoretically evaluate the performance and privacy guarantees of the system through a complexity analysis and security proof and give an extensive explanation about the implementation details and cryptographic protocols. We also implement a quantum-assisted secure phylogenetic tree computation based on the Libscapi implementation of the Yao, the PHYLIP library and simulated keys of two quantum systems: Quantum Oblivious Key Distribution and Quantum Key Distribution. This demonstrates its effectiveness and practicality. We benchmark this implementation against a classical-only solution and we conclude that both approaches render similar execution times, the only difference being the time overhead taken by the oblivious key management system of the quantum-assisted approach.
INDEX TERMS: Genomics | phylogenetic trees | privacy | quantum oblivious transfer | quantum secure multiparty computation | security.
مقاله انگلیسی
4 مدیریت بر اساس ارزش ها: مطالعه کیفی چگونگی مشاهده و اجرای مسئولیت های کارفرمای خود در رابطه با مدیریت ایمنی و بهداشت شغلی توسط صاحبان مشاغل کوچک در بخش نظافت
سال انتشار: 2022 - تعداد صفحات فایل pdf انگلیسی: 7 - تعداد صفحات فایل doc فارسی: 25
برای این مطالعه با نه صاحب کسب و کار کوچک سوئدی در بخش نظافت در رابطه با نظرات و تجربیات شخصی آنها در مورد مسئولیت های کارفرما در رابطه با مدیریت ایمنی و بهداشت شغلی مصاحبه شد. تجزیه و تحلیل توسط یک تحلیل محتوای کیفی هدایت می شود که استراتژی های اعمال شده برای رهبری مسئول را بررسی می کند. ما متوجه شدیم که یک الگوی رفتاری خاص وجود دارد که بیش از بقیه برجسته است. صاحبان مشاغل کوچک مرتباً شکلی از رهبری مسئولانه را اجرا می کنند که ما آن را مدیریت ارزش ها می نامیم. مدیریت بر اساس ارزش ها با استفاده از سه راهبرد ایجاد روابط کارکنان، مدیریت منطقی و انتقال مسئولیت به کار گرفته شد. این سبک مدیریت می تواند برای شرایط کاری کارکنان هم نقطه قوت و هم نقطه ضعف باشد. نقاط قوت این است که مالکان حمایت می کنند، راهنمایی می کنند، و برقراری ارتباط در رهبری خود با کارکنان خود در حالی که نقاط ضعف می تواند این باشد که آنها، مالکان، مدیریت ایمنی و بهداشت شغلی خود را به جای دانش، بر ارزش ها قرار می دهند. در نتیجه، برای اقدامات مربوط به محیط کار، مسئولیت‌هایی از صاحبان مشاغل کوچک به کارکنانشان منتقل می‌شود. نتیجه‌گیری این مطالعه این است که با اعمال مدیریت بر اساس ارزش‌ها، به نظر می‌رسد صاحبان کسب‌وکارهای کوچک شرایط کاری روانی-اجتماعی خوبی را در شرکت‌های خود ارتقا می‌دهند و در عین حال کمبود دانش در مورد مدیریت ایمنی و بهداشت شغلی نشان می‌دهند. این ممکن است به معنای این خطر باشد که رویکردهای سیستماتیک برای شرایط فیزیکی محیط کار در رابطه با مسائل ایمنی اعمال نشود. مدیریت ایمنی و بهداشت شغلی خود را به جای دانش بر اساس ارزش ها قرار می دهند. در نتیجه، برای اقدامات مربوط به محیط کار، مسئولیت‌هایی از صاحبان مشاغل کوچک به کارکنانشان منتقل می‌شود. نتیجه‌گیری این مطالعه این است که با اعمال مدیریت بر اساس ارزش‌ها، به نظر می‌رسد که صاحبان مشاغل کوچک شرایط کاری روانی-اجتماعی خوبی را در شرکت‌های خود ارتقا می‌دهند و در عین حال کمبود دانش در مورد مدیریت ایمنی و بهداشت شغلی نشان می‌دهند. این ممکن است به معنای این خطر باشد که رویکردهای سیستماتیک برای شرایط فیزیکی محیط کار در رابطه با مسائل ایمنی اعمال نشود. مدیریت ایمنی و بهداشت شغلی خود را به جای دانش بر اساس ارزش ها قرار می دهند. در نتیجه، برای اقدامات مربوط به محیط کار، مسئولیت‌هایی از صاحبان مشاغل کوچک به کارکنانشان منتقل می‌شود. نتیجه‌گیری این مطالعه این است که با اعمال مدیریت بر اساس ارزش‌ها، به نظر می‌رسد صاحبان کسب‌وکارهای کوچک شرایط کاری روانی-اجتماعی خوبی را در شرکت‌های خود ارتقا می‌دهند و در عین حال کمبود دانش در مورد مدیریت ایمنی و بهداشت شغلی نشان می‌دهند. این ممکن است به معنای این خطر باشد که رویکردهای سیستماتیک برای شرایط فیزیکی محیط کار در رابطه با مسائل ایمنی اعمال نشود. نتیجه‌گیری این مطالعه این است که با اعمال مدیریت بر اساس ارزش‌ها، به نظر می‌رسد که صاحبان مشاغل کوچک شرایط کاری روانی-اجتماعی خوبی را در شرکت‌های خود ارتقا می‌دهند و در عین حال کمبود دانش در مورد مدیریت ایمنی و بهداشت شغلی نشان می‌دهند. این ممکن است به معنای این خطر باشد که رویکردهای سیستماتیک برای شرایط فیزیکی محیط کار در رابطه با مسائل ایمنی اعمال نشود. نتیجه‌گیری این مطالعه این است که با اعمال مدیریت بر اساس ارزش‌ها، به نظر می‌رسد که صاحبان مشاغل کوچک شرایط کاری روانی-اجتماعی خوبی را در شرکت‌های خود ارتقا می‌دهند و در عین حال کمبود دانش در مورد مدیریت ایمنی و بهداشت شغلی نشان می‌دهند. این ممکن است به معنای این خطر باشد که رویکردهای سیستماتیک برای شرایط فیزیکی محیط کار در رابطه با مسائل ایمنی اعمال نشود.
کلید واژه ها: صاحبان مشاغل کوچک | صنعت نظافت | بهداشت و ایمنی شغلی | رهبری مسئول
مقاله ترجمه شده
5 Secure Social Internet of Things Based on Post-Quantum Blockchain
اینترنت اجتماعی ایمن اشیا بر اساس بلاک چین پس کوانتومی-2022
With the advancement of the application of Internet of Things (IoTs), the IoT technology is combining with the social network, forming a new network with private object information as the media and social entertainment as the purpose. Social Internet of things (SIoTs) is a new application of IoT technology in social network. The current SIoT systems are centralized and the user’s security and privacy is not properly protected. In order to address the challenges in SIoTs, we propose a privacy protection system for the users. First, we propose a post-quantum ring signature. Second, we propose a blockchain system based on the ring signature. Compared with the traditional SIoTs, our system is based on post-quantum techniques, which is secure against both traditional computers and quantum computers. The results of the blockchain system show that it is very suitable for SIoTs.
Index Terms—Social Internet of Things (SIoTs) | Internet of Things (IoTs) | Blockchain | Post-Quantum Signature.
مقاله انگلیسی
6 The “Cyber Security via Determinism” Paradigm for a Quantum Safe Zero Trust Deterministic Internet of Things (IoT)
پارادایم «امنیت سایبری از طریق جبرگرایی» برای اینترنت اشیا قطعی (IoT) ایمن صفر کوانتومی-2022
The next-generation Internet of Things (IoT) will control the critical infrastructure of the 21st century, including the Smart Power Grid and Smart Cities. It will also support Deterministic Communications, where ‘deterministic traffic flows’ (D-flows) receive strict Quality-of-Service (QoS) guarantees. A ‘Cybersecurity via Determinism’ paradigm for the next-generation ‘Industrial and Tactile Deterministic IoT’ is presented. A forwarding sub-layer of simple and secure ‘deterministic packet switches’ (D-switches) is introduced into layer-3. This sub-layer supports many deterministic Software Defined Wide Area Networks (SD-WANs), along with 3 new tools for improving cyber security: Access Control, Rate Control, and Isolation Control. A Software Defined Networking (SDN) control-plane configures each D-switch (ie FPGA) with multiple deterministic schedules to support D-flows. The SDN control-plane can embed millions of isolated Deterministic Virtual Private Networks (DVPNs) into layer 3. This paradigm offers several benefits: 1) All congestion, interference, and Distributed Denial-of-Service (DDOS) attacks are removed; 2) Buffer sizes in D-switches are reduced by 1000C times; 3) End-to-end IoT delays can be reduced to ultra-low latencies, i.e., the speed-of-light in fiber; 4) The D-switches do not require Gigabytes of memory to store large IP routing tables; 5) Hardware support is provided in layer 3 for the US NIST Zero Trust Architecture; 6) Packets within a DVPN can be entirely encrypted using Quantum Safe encryption, which is impervious to attacks by Quantum Computers using existing quantum algorithms; 7) The probability of an undetected cyberattack targeting a DVPN can be made arbitrarily small by using long Quantum Safe encryption keys; and 8) Savings can reach $10s of Billions per year, through reduced capital, energy and operational costs.
INDEX TERMS: Cyber security | deterministic, the Internet of Things (IoT) | quantum computing, zero trust | encryption | privacy | Software Defined Networking (SDN) | industrial internet of things (IIoT) | tactile Internet of Things | FPGA | Industry 4.0 | deterministic Internet of Things.
مقاله انگلیسی
7 Tunneling Current Through a Double Quantum Dots System
جریان تونل زنی از طریق سیستم دو نقطه کوانتومی-2022
Electrostatically confined quantum dots in semiconductors hold the promise to achieve high scalability and reliability levels for practical implementation of solid-state qubits where the electrochemical potentials of each quantum dot can be independently controlled by the gate voltages.In this paper, the current and charge stability diagram of two-well potentials arising from electrostatically defined double quantum dot (DQD) are analytically realized. We propose to apply the Generalized Hubbard model to find the Hamiltonian of the system. The proposed analysis takes the tunnel coupling between the dots, Coulomb interaction, and Zeeman energy arising from an external magnetic field into account. Using quantum master equations to predict the probability of the final states in a DQD system, we study the tunneling current through two quantum dots coupled in series with two conducting leads, and therefore, the charge stability diagram is theoretically investigated. The impact of the tunnel coupling and Zeeman energy on the charge stability diagram is deeply discussed. The validity of the presented analysis is confirmed by experimental data as well as the classical capacitance model.
INDEX TERMS: Double quantum dot | hubbard model | zeeman energy | charge stability diagram | master equation.
مقاله انگلیسی
8 Secure firmware Over-The-Air updates for IoT: Survey, challenges, and discussions
به روز رسانی ایمن میان افزار خارج از هوا برای اینترنت اشیا: بررسی، چالش ها و بحث ها-2022
The Internet of Things (IoT) market has shown strong growth in recent years, where many manufacturers of IoT devices and IoT-related service providers are competing. Time to market has become essential to be competitive. The faster a competitor develops and integrates his product, the more likely he is to dominate the market. This competition could lead to critical security issues due to the lack of testing or the short development time. Moreover, lots of IoT devices present some vulnerabilities that can be exploited by attackers. They are also constantly subject to Zero-days, which require quick intervention to maintain the security of the environments in which they are deployed in. For these purposes, the quick update of the firmware image of these IoT devices is an effective way to counter most of these attacks. This document starts by defining the firmware update mechanisms for IoT, and in particular the ones done Over-The-Air. Then presents a state-of-the-art of the currently proposed solutions, with the particularity of surveying from the literature, the standardization bodies and from some well known industrial solutions. It also proposes a new classification of the different types of System on Chip (SoC) present in the marketed IoT devices together with an analysis of the different challenges and threats related to the OTA update. The objective is to open up the horizon for future research directions.
keywords: دستگاه های اینترنت اشیا | نرم افزار | به روز رسانی | خارج از هوا | امنیت | حریم خصوصی | بررسی | مرور | چالش ها | تهدیدات | زنجیره اعتماد | IoT devices | Firmware | Updates | Over-The-Air | Security | Privacy | State of the art | Survey | Challenges | Threats | Trust chain
مقاله انگلیسی
9 Securing wireless communications from the perspective of physical layer: A survey
ایمن سازی ارتباطات بی سیم از دیدگاه لایه فیزیکی: یک مرور-2022
Ultra-reliability low-latency communication (uRLLC) is a new service category of the fifthgeneration (5G) mobile wireless networks, also plays a crucial role in the sixth-generation (6G) networks. Given the openness of the wireless environment, the security and confidentiality of uRLLC are of utmost important. Since traditional cryptography methods often feature significant complex designs and processing delays, physical layer security (PLS) technologies exploiting the inherent properties of the wireless medium have become a promising solution to secure wireless communications. However, most existing PLS methods assume a finite block-length regime, which cannot cater to uRLLC with short block-lengths. In this paper, the PLS technologies for uRLLC were comprehensively investigated. First, we reviewed the typical characteristics of the next-generation mobile networks and analyzed the threats faced by the physical layer. Then, we introduced the traditional solutions and performance metrics of PLS with a finite blocklength regime. Furthermore, we discussed several physical layer technologies and observed their influence on PLS. Additionally, this study also analyzed the impact of the unique characteristics of 5G networks on communication securit, such as the mobility.
Keywords: uRLLC | Wireless networks | Security and confidentiality | PLS | Finite block-length
مقاله انگلیسی
10 Sensible and secure IoT communication for digital twins, cyber twins, web twins
ارتباط معقول و ایمن IoT برای زوج های دیجیتال، زوج های سایبری، زوج های وب-2022
In order to effectively solve the current security problems encountered by smart wireless terminals in the digital twin biological network, to ensure the stable and efficient operation of the wireless communication network. This research aims to reduce the interference attack in the communication network, an interference source location scheme based on Mobile Tracker in the communication process of the Internet of Things (IoT) is designed. Firstly, this paper improves Attribute-Based Encryption (ABE) to meet the security and overhead requirements of digital twin networking communication. The access control policy is used to encrypt a random key, and the symmetric encryption scheme is used to hide the key. In addition, in the proposed interference source location technology, the influence of observation noise is reduced based on the principle of unscented Kalman filter, and the estimated interference source location is modified by the interference source motion model. In order to further evaluate the performance of the method proposed as the interference source, this paper simulates the jamming attack scenario. The Root Mean Square Error (RMSE) value of the proposed algorithm is 0.245 m, which is better than the ErrMin algorithm (0.313 m), and the number of observation nodes of the proposed algorithm is less than half of the ErrMin algorithm. To sum up, satisfactory results can be achieved by taking the Jamming Signal Strength (JSS) information as the observation value and estimating the location of the interference source and other state information based on the untracked Kalman filter algorithm. This research has significant value for the secure communication of the digital twins in the IoT.
keywords: زوج دیجیتال | سیستم فیزیکی-سایبری | زوج وب | ارتباطات اینترنت اشیا | امنیت ارتباطات | Digital twin | Cyber-physical system | Web twins | IoT communication | Communication security
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 3749 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 3749 :::::::: افراد آنلاین: 80