سفارش تبلیغ
صبا ویژن
[ و روایت شده است که امام علیه السلام کمتر به منبر مى‏نشست که پیش از خطبه نگوید : ] مردم از خدا بترسید که هیچ انسانى بیهوده آفریده نگردیده تا به بازى پردازد ، و او را وا ننهاده‏اند تا خود را سرگرم بى‏فایدت سازد ، و دنیایى که خود را در دیده او زیبا داشته جایگزین آخرتى نشود که آن را زشت انگاشته ، و فریفته‏اى که از دنیا به بالاترین مقصود نایل گردیده چون کسى نیست که از آخرت به کمترین نصیب رسیده . [نهج البلاغه]
لوگوی وبلاگ
 

دسته بندی موضوعی یادداشتها
 
دانلود رایگان مقاله ISI ، دانلود مقالات IEEE ، دانلود رایگان مقاله IEEE ، دانلود مقاله ، دانلود مقالات ISI ، دانلود رایگان مقاله ACM ، دنلود مقالات ISI ، دانلود رایگان مقاله Science Direct ، دانلود رایگان مقاله از ACM ، دانلود رایگان مقالات مهندسی ، دانلود رایگان مقالات ACM ، دانلود رایگان مقاله مهندسی ، دانلود رایگان مقالات IEEE ، دانلود رایگان مقاله Springer ، دانلود رایگان مقاله آی اس آی ، دانلود مقالات آی اس آی ، دانلود مقاله آی اس آی ، یوزرنیم و پسورد دانشگاه های معتبر ، دانلود مقاله از IEEE ، دانلود رایگان مقالات آی اس آی ، دانلود رایگان مقاله ، دانلود ، یوزرنیم و پسورد سایتهای علمی ، دانلود رایگان مقالات ISI ، دانلود رایگان مقاله Science Direc ، دانلود رایگان ، دانلود رایگان مقالا ، دانلود رایگان مقالات IEEE، دانلود رایگان مقالات ISI، دانلود مقال ، Free ISI Paper Download ، ISI Paper Download ، Paper Download ، انلود رایگان مقالات IEEE ، دانلود رایگان مقالات مهندسی. دانلود رایگان مقاله Springer. دانلو ، دانلود مقاله ISI ، رایگان مقالات ACM ، و پسورد سایتهای علمی ، یوزرنیم ، دانلود مقالات آی ، دانلود مقالات IEEE, دنلود مقالات ISI, دانلود رایگان مقاله IEEE, ، دانلود، مقاله، ISI، 2013، رایانش فراگیر ،

آمار و اطلاعات

بازدید امروز :167
بازدید دیروز :11
کل بازدید :257309
تعداد کل یاداشته ها : 160
103/9/1
4:52 ع

به نام خدا

Title: A Neuromorphic VLSI Grid Cell System

Authors: Tarek M Massoud , Timothy K Horiuchi

Abstract: Neurons in the medial entorhinal cortex of rats have been found to respond in a two-dimensional hexagonal grid pattern anchored to the environment.  Grid cells with different spatial frequencies are thought to contribute to the creation of unimodal place? cell responses useful for spatial navigation. In this paper we present results from an analog VLSI circuit that generates a hexagonal grid of activity using continuous attractor dynamics and transmits this pattern via neuron-like spikes. This circuit is a component of a larger system for modeling the neural circuits underlying mammalian spatial navigation.   

Publish Year: 2012

Published in: IEEE-ISCAS

موضوع: طراحی مدارهای VLSI

لینک مشاهده صفحه اول مقاله

لینک دانلود مقاله

لینک مقاله در سایت ناشر

 

ایران سای – مرجع مقالات علمی فنی مهندسی

حامی دانش بومی ایرانیان


  

به نام خدا

Title: Menger’s theorem for fuzzy graphs

Authors: Sunil Mathew, MS Sunitha

Abstract: The concept of the strongest path plays a crucial role in fuzzy graph theory. In classical graph theory, all paths in a graph are strongest, with a strength value of one. In this article, we introduce Menger’s theorem for fuzzy graphs and discuss the concepts of strength- reducing sets and t-connected fuzzy graphs. We also characterize t-connected and t-arc connected fuzzy graphs.   

Publish Year: 2013

Published in: Information Sciences - Science Direct

موضوع: نظریه گراف (Graph Theory)– منطق فازی (Fuzzy Logic)

لینک مشاهده صفحه اول مقاله

لینک دانلود مقاله

لینک مقاله در سایت ناشر

 

ایران سای – مرجع مقالات علمی فنی مهندسی

حامی دانش بومی ایرانیان


  

به نام خدا

Title: Clinical Information Systems in Private Hospitals

Author: Aini Aman

Abstract: With the tremendous developments in Information Technology (IT), many organizations in private sectors use IT to transform their services and operation. Like any other sectors, the health sector has been benefited from the adoption of IT in transforming their services for society well-being. The applications of IT have greatly improved accessibility, quality and cost-effectiveness of health care. Clinical Information Systems (CIS) are one of the examples of the applications of IT in healthcare. CIS are computer applications that support the operations of clinicians engaged in providing care to patients. However, CIS does not always improve the outcomes and performance of the health professionals, but might bring about negative impacts on their performance and practices. Studies on medical errors have shown that errors in healthcare and medicine are not rare and may bring about severe harm to patients. This paper aims to understand the use of CIS in hospitals and their impact on patient safety. Using interviews with medical practitioners in private hospitals in Malaysia, the findings provide insights for system developers and hospital managers on the usability of CIS to ensure the delivery of better patient care since error reduction is one of the dimensions of health service quality.   

Publish Year: 2013

Published in: ICACT – IEEE

موضوع: سیستمهای اطلاعاتی بیمارستانی (Hospital Information Systems)

لینک مشاهده صفحه اول مقاله

لینک دانلود مقاله

لینک مقاله در سایت ناشر

 

ایران سای – مرجع مقالات علمی فنی مهندسی

حامی دانش بومی ایرانیان


  

به نام خدا

Title: Leveraging a Crowd Sourcing Methodology to Enhance Supply Chain Integrity

Authors: Han Lin, Moses Schwartz, John Michalski, Mayuri Shakamuri, Philip Campbell

Abstract: Supply chain integrity (SCI) is emerging as one of the top security issues facing critical systems. The government’s reliance on commercial off-the-shelf (COTS) products is apparent, as is the threat of critical systems being designed and manufactured overseas. To date, few tools or capabilities exist to prevent or even detect these classes of attacks. Programs, such as DARPA Trust, exist to identify solutions; however, alternative strategies must be explored. It is extremely challenging to establish the trustworthiness of a supply chain for a product or system in today’s globalized climate, especially given the complexity and variability of the hardware and software, and the diverse geographical areas where they are made. Counterfeit items, from individual chips to entire systems, have been found both in commercial and government sectors. Supply chain attacks can be inserted at any point during the product or system life cycle and can have detrimental effects to mission success. We hypothesize that wisdom of crowds techniques may be applicable to the analysis of supply chain integrity. Current supply chain security efforts are hindered by a lack of detailed information on a product’s entire supply chain. End-users have virtually no access to supply chain information, and even major manufacturers may have difficulty getting access to their suppliers’ Sub suppliers. Component testing and even reverse engineering can be used to mitigate risks, but these approaches are imperfect, time consuming, and expensive. This paper will discuss the development of a semi-automated supply chain integrity risk analysis framework to assist the supply chain security analysts in assessing the level of risk associated with a component of a mission critical system. This capability can provide the system designer a more rigorous and efficient approach to assess the security of the components in the design. By fusing all of these tools into a centralized framework, we hypothesis that we can create a capability that will enable analysts to more effectively interrogate the data and extract trending as well as critical information.   

Publish Year: 2012

Published in: ICCST – IEEE

موضوع: مدیریت زنجیره تامین (Supply Chain Management)

لینک مشاهده صفحه اول مقاله

لینک دانلود مقاله

لینک مقاله در سایت ناشر

 

ایران سای – مرجع مقالات علمی فنی مهندسی

حامی دانش بومی ایرانیان


  

به نام خدا

Title: Data mining agent conversations: A qualitative approach to multi-agent systems analysis

Authors: Emilio Serrano, Michael Rovatsos, Juan A Botia

Abstract: This paper presents a novel method for analyzing the behavior of multivalent systems on the basis of the semantically rich information provided by agent communication languages and interaction protocols specified at the knowledge level. More low-level communication mechanisms only allow for a quantitative analysis of the occurrence of message types, the frequency of message sequences, and the empirical distributions of parameter values. Quite differently, the semantics of languages and protocols in multi-agent systems can help to extract qualitative properties of observed conversations among agents. This can be achieved by interpreting the logical constraints associated with protocol execution paths or individual messages as the context of an observed interaction, and using them as features of learning samples. The contexts mined from such analyses, or context models, can then be used for various tasks, e.g. for predicting others future responses (useful when trying to make strategic communication decisions to achieve a particular outcome), to support ontological alignment (by comparing the properties of logical constraints attached to messages across participating agents), or to assess the trustworthiness of agents (by verifying the logical coherence of their behavior). This paper details a formal approach that describes our notion of context models in multi-agent conversations, an implementation of this approach in a practical tool for mining qualitative context models, and experimental results to illustrate its use and utility.   

Publish Year: 2013

Published in: Information Sciences - Science Direct

موضوع: داده کاوی (Data Mining) – عاملهای هوشمند (Intelligent Agents)

لینک مشاهده صفحه اول مقاله

لینک دانلود مقاله

لینک مقاله در سایت ناشر

 

ایران سای – مرجع مقالات علمی فنی مهندسی

حامی دانش بومی ایرانیان

 


  
<      1   2   3   4   5   >>   >