سفارش تبلیغ
صبا ویژن
بارالها ! ... می دانم برترین توشه رهرو به سوی تو، اراده استوار و فروتنی یاری خواهانه است و اینک، قلبم با اراده ای استوار و فروتنی متواضعانه با تو رازگویی می کند . [امام صادق علیه السلام ـ در دعایش هنگام رفتن نزد منصور، خلیفه عبّاسی ـ]
لوگوی وبلاگ
 

دسته بندی موضوعی یادداشتها
 
دانلود رایگان مقاله ISI ، دانلود مقالات IEEE ، دانلود رایگان مقاله IEEE ، دانلود مقاله ، دانلود مقالات ISI ، دانلود رایگان مقاله ACM ، دنلود مقالات ISI ، دانلود رایگان مقاله Science Direct ، دانلود رایگان مقاله از ACM ، دانلود رایگان مقالات مهندسی ، دانلود رایگان مقالات ACM ، دانلود رایگان مقاله مهندسی ، دانلود رایگان مقالات IEEE ، دانلود رایگان مقاله Springer ، دانلود رایگان مقاله آی اس آی ، دانلود مقالات آی اس آی ، دانلود مقاله آی اس آی ، یوزرنیم و پسورد دانشگاه های معتبر ، دانلود مقاله از IEEE ، دانلود رایگان مقالات آی اس آی ، دانلود رایگان مقاله ، دانلود ، یوزرنیم و پسورد سایتهای علمی ، دانلود رایگان مقالات ISI ، دانلود رایگان مقاله Science Direc ، دانلود رایگان ، دانلود رایگان مقالا ، دانلود رایگان مقالات IEEE، دانلود رایگان مقالات ISI، دانلود مقال ، Free ISI Paper Download ، ISI Paper Download ، Paper Download ، انلود رایگان مقالات IEEE ، دانلود رایگان مقالات مهندسی. دانلود رایگان مقاله Springer. دانلو ، دانلود مقاله ISI ، رایگان مقالات ACM ، و پسورد سایتهای علمی ، یوزرنیم ، دانلود مقالات آی ، دانلود مقالات IEEE, دنلود مقالات ISI, دانلود رایگان مقاله IEEE, ، دانلود، مقاله، ISI، 2013، رایانش فراگیر ،

آمار و اطلاعات

بازدید امروز :110
بازدید دیروز :3
کل بازدید :257893
تعداد کل یاداشته ها : 160
103/9/28
8:47 ص

به نام خدا

Title: Three-stage hybrid-flowshop model for cross-docking

Authors: Adrien Bellanger , Said Hanafl , Christophe Wilbaut

Abstract: This paper deals with the optimization of a cross-docking system. It is modeled as a three-stage hybrid flowshop, in which shipments and orders are represented as batches. The flrst stage corresponds to the receiving docks, the second stage corresponds to the sorting stations, and the third stage corresponds to the shipping docks. The objective of the problem is to flnd a schedule that minimizes the completion time of the latest batch. In order to obtain good quality feasible solutions, we have developed several heuristic schemes depending on the main stage considered, and several rules to order the batches in this stage. Then, we propose a branch-and-bound algorithm that takes into account the decomposition of the problem into three stages. To evaluate the heuristics and to reduce the tree size during the branch-and-bound computation, we also propose lower bounds. Finally, the computational experi- ments are presented to demonstrate the efflciency of our heuristics. The results show that the exact approach can solve instances containing up to 9 10 batches in each stage (i.e., up to 100 jobs). In addition, our heuristics were evaluated over instances with up to 3000 jobs, and they can provide good quality feasible solutions in a few seconds (i.e., less than 2 s per heuristic).  

Publish Year: 2013

Published in: Computers & Operations Research - Science Direct

Number of Pages: 10

مشاهده صفحه اول مقاله

دانلود مقاله

لینک مقاله در سایت ناشر

 

ایران سای – مرجع مقالات علمی فنی مهندسی

حامی دانش بومی ایرانیان


  

به نام خدا

Title: A Secure Authentication Protocol among Mobile Phone and Wireless Sensor Networks

Authors: Ndibanje Bruce, Hoon Jae Lee

Abstract: The interaction between mobile phone and wireless sensor networks has increased these days due to the WSN emergence and its ubiquitous nature. Through cellular network, a user can access gateway of wireless sensor networks and gets the data. This paper proposes a secure authentication protocol where a user is strongly verified before accessing the data. The secure authentication proposed protocol provides many security principles to the users for instance user, mutual authentication, and secure session key establishment. Furthermore, security analysis shows .that the proposed protocol possesses many advantages against popular attacks, and achieves better efficiency at low computation cost.   

Publish Year: 2013

Published in:  ICACT - IEEE

Number of Pages: 8

موضوع: امنیت شبکه (Network Security) – احراز هویت (Authentication)

مشاهده صفحه اول مقاله

دانلود مقاله

لینک مقاله در سایت ناشر

 

ایران سای – مرجع مقالات علمی فنی مهندسی

حامی دانش بومی ایرانیان


  

به نام خدا

Title: Graph Semantic Based Design of XML Data Warehouse: A Conceptual Perspective

Authors: Anirban Sarkar Sankhayan Choudhury Narayan C Debnath

Abstract: This paper has proposed a Graph � semantic based conceptual data model for XML based Data Warehouse (DW) system called GXDW model, to conceptualize the different facets of multidimensional databases which may contain semi- structured data. The model is an extension of object oriented paradigm and defines a set of graph based formal constructs, variety of relationship types with participation constraints. It is accompanied with a rich set of graphical notations those are used to specify the conceptual level design of semi-structured data based DW system. The proposed approach facilitates modeling multidimensional data with the existence of irregular, heterogeneous, partially organized and unordered data set. Moreover, a transformation mechanism also has been proposed for guiding the transformation of GXDW model schema into the related set of XML documents.   

Publish Year: 2012

Published in: INDIN - IEEE

Number of Pages: 6

موضوع: انباره داده (Data Warehouse)

مشاهده صفحه اول مقاله

دانلود مقاله

لینک مقاله در سایت ناشر

 

ایران سای – مرجع مقالات علمی فنی مهندسی

حامی دانش بومی ایرانیان


  

به نام خدا

Title: Reconstructing a Fragmented Face from a Cryptographic Identification Protocol

Authors: Andy Luong, Michael Gerbush, Brent Waters, Kristen Grauman

Abstract: Secure Computation of Face Identification (SCiFI) [20]is a recently developed secure face recognition system that ensures the list of faces it can identify (e.g., a terrorist watch list) remains private. In this work, we study the consequences of malformed input attacks on the system-from both a security and computer vision standpoint. In particular, we present 1) a cryptographic attack that allows dishonest user to undetectably obtain a coded representation of faces on the list, and 2) a visualization approach that exploits this breach, turning the lossy recovered codes into human-identifiable face sketches. We evaluate our approach on two challenging datasets, with face identification tasks given to a computer and human subjects. Whereas prior work considered security in the setting of honest in-puts and protocol execution, the success of our approach underscores the risk posed by malicious adversaries to to-days automatic face recognition systems.  

Publish Year: 2013

Published in: WACV - IEEE

Number of Pages: 8

موضوع: پردازش تصویر، رمزنگاری

مشاهده صفحه اول مقاله

دانلود مقاله

لینک مقاله در سایت ناشر

 

ایران سای – مرجع مقالات علمی فنی مهندسی

حامی دانش بومی ایرانیان


  

به نام خدا

Title: Online Advertising and its Security and Privacy Concerns

Authors: Angelia, Davar Pishva

Abstract: Commercial advertising has greatly benefitted from Internet services and online advertising can even be considered as the foundation of web economy. However, despite the availability of many books on how to create, use and make profit from online advertisement; there is little in-depth study on its true nature, security and privacy concerns. Through this research, the authors were able to establish an in-depth understanding of online advertising by collecting and analyzing numerous data on online advertising, with the hope that it could serve as a basis for further study on the field. The authors have also examined the security and privacy concerns of online advertising and the various gimmicks used to victimize innocent people. On the positive side, the paper explains the attractiveness of free online advertising services and the mechanism though which website owners profit from hosting online advertisements despite the fact that neither advertisers nor users pay for the services. On the negative side, the paper shows how online advertising hosts could be victimized by some shroud users for their money making purposes by continuous clicking of online advertisements without any intention of purchase. It also cites cases in which some website owners have marketed users_ private information behind the scene. The paper concludes by highlighting pros and cons of online advertising, Le., despite its numerous advantages, such as efficiency and range, it presents many dangers to advertisers, providers, website owners, and users.   

Publish Year: 2013

Published in: ICACT - IEEE

Number of Pages: 6

موضوع: امنیت اطلاعات (Information Security)

مشاهده صفحه اول مقاله

دانلود مقاله

لینک مقاله در سایت ناشر

 

ایران سای – مرجع مقالات علمی فنی مهندسی

حامی دانش بومی ایرانیان


  
<   <<   16   17   18   19   20   >>   >