به نام خدا
به دنبال طرح معلم که تخفیف های ارزنده ای را برای کاربران ارائه کرده است تعدادی از کاربران خواستار دریافت تخفیف های بدون محدودیت زمانی بودند لذا با موافقت مدیریت محترم مجموعه ایران سای و در راستای هر چه بیشتر یاری رساندن به کاربران محترم، تعرفه هایی به شرح زیر ارائه می گردد. امیدواریم با این گام بسیار کوچک کمکی به کاربران ایران سای کرده باشیم.
کلیه تعرفه های زیر بدون محدودیت زمانی می باشند و این اطلاعیه تا پایان اردیبهشت ماه 1392 در قالب طرح معلم2 معتبر خواهد بود.
کاربرانی که 10 امتیاز خریداری می کنند 12 امتیاز دریافت خواهند کرد.
کاربرانی که 20 امتیاز خریداری می کنند 25 امتیاز دریافت خواهند کرد.
کاربرانی که 30 امتیاز خریداری می کنند 38 امتیاز دریافت خواهند کرد.
کاربرانی که 40 امتیاز خریداری می کنند 51 امتیاز دریافت خواهند کرد.
کاربران که 50 امتیاز خریداری می کنند 65 امتیاز دریافت خواهند کرد.
کاربران گرامی پس از خرید امتیاز، لطفا ایمیلی را به Financial@IranSci.ir با عنوان تخفیف طرح معلم 2 ارسال نمایند (یا به پشتیبانی آنلاین اطلاع دهند) تا نسبت به ارتقاء امتیازشان اقدام شود.
ایران سای – مرجع مقالات علمی فنی مهندسی
حامی دانش بومی ایرانیان
به نام خدا
Title: A Neuromorphic VLSI Grid Cell System
Authors: Tarek M Massoud , Timothy K Horiuchi
Abstract: Neurons in the medial entorhinal cortex of rats have been found to respond in a two-dimensional hexagonal grid pattern anchored to the environment. Grid cells with different spatial frequencies are thought to contribute to the creation of unimodal place? cell responses useful for spatial navigation. In this paper we present results from an analog VLSI circuit that generates a hexagonal grid of activity using continuous attractor dynamics and transmits this pattern via neuron-like spikes. This circuit is a component of a larger system for modeling the neural circuits underlying mammalian spatial navigation.
Publish Year: 2012
Published in: IEEE-ISCAS
موضوع: طراحی مدارهای VLSI
ایران سای – مرجع مقالات علمی فنی مهندسی
حامی دانش بومی ایرانیان
به نام خدا
Title: Menger’s theorem for fuzzy graphs
Authors: Sunil Mathew, MS Sunitha
Abstract: The concept of the strongest path plays a crucial role in fuzzy graph theory. In classical graph theory, all paths in a graph are strongest, with a strength value of one. In this article, we introduce Menger’s theorem for fuzzy graphs and discuss the concepts of strength- reducing sets and t-connected fuzzy graphs. We also characterize t-connected and t-arc connected fuzzy graphs.
Publish Year: 2013
Published in: Information Sciences - Science Direct
موضوع: نظریه گراف (Graph Theory)– منطق فازی (Fuzzy Logic)
ایران سای – مرجع مقالات علمی فنی مهندسی
حامی دانش بومی ایرانیان
به نام خدا
Title: Clinical Information Systems in Private Hospitals
Author: Aini Aman
Abstract: With the tremendous developments in Information Technology (IT), many organizations in private sectors use IT to transform their services and operation. Like any other sectors, the health sector has been benefited from the adoption of IT in transforming their services for society well-being. The applications of IT have greatly improved accessibility, quality and cost-effectiveness of health care. Clinical Information Systems (CIS) are one of the examples of the applications of IT in healthcare. CIS are computer applications that support the operations of clinicians engaged in providing care to patients. However, CIS does not always improve the outcomes and performance of the health professionals, but might bring about negative impacts on their performance and practices. Studies on medical errors have shown that errors in healthcare and medicine are not rare and may bring about severe harm to patients. This paper aims to understand the use of CIS in hospitals and their impact on patient safety. Using interviews with medical practitioners in private hospitals in Malaysia, the findings provide insights for system developers and hospital managers on the usability of CIS to ensure the delivery of better patient care since error reduction is one of the dimensions of health service quality.
Publish Year: 2013
Published in: ICACT – IEEE
موضوع: سیستمهای اطلاعاتی بیمارستانی (Hospital Information Systems)
ایران سای – مرجع مقالات علمی فنی مهندسی
حامی دانش بومی ایرانیان
به نام خدا
Title: Leveraging a Crowd Sourcing Methodology to Enhance Supply Chain Integrity
Authors: Han Lin, Moses Schwartz, John Michalski, Mayuri Shakamuri, Philip Campbell
Abstract: Supply chain integrity (SCI) is emerging as one of the top security issues facing critical systems. The government’s reliance on commercial off-the-shelf (COTS) products is apparent, as is the threat of critical systems being designed and manufactured overseas. To date, few tools or capabilities exist to prevent or even detect these classes of attacks. Programs, such as DARPA Trust, exist to identify solutions; however, alternative strategies must be explored. It is extremely challenging to establish the trustworthiness of a supply chain for a product or system in today’s globalized climate, especially given the complexity and variability of the hardware and software, and the diverse geographical areas where they are made. Counterfeit items, from individual chips to entire systems, have been found both in commercial and government sectors. Supply chain attacks can be inserted at any point during the product or system life cycle and can have detrimental effects to mission success. We hypothesize that wisdom of crowds techniques may be applicable to the analysis of supply chain integrity. Current supply chain security efforts are hindered by a lack of detailed information on a product’s entire supply chain. End-users have virtually no access to supply chain information, and even major manufacturers may have difficulty getting access to their suppliers’ Sub suppliers. Component testing and even reverse engineering can be used to mitigate risks, but these approaches are imperfect, time consuming, and expensive. This paper will discuss the development of a semi-automated supply chain integrity risk analysis framework to assist the supply chain security analysts in assessing the level of risk associated with a component of a mission critical system. This capability can provide the system designer a more rigorous and efficient approach to assess the security of the components in the design. By fusing all of these tools into a centralized framework, we hypothesis that we can create a capability that will enable analysts to more effectively interrogate the data and extract trending as well as critical information.
Publish Year: 2012
Published in: ICCST – IEEE
موضوع: مدیریت زنجیره تامین (Supply Chain Management)
ایران سای – مرجع مقالات علمی فنی مهندسی
حامی دانش بومی ایرانیان