دانلود رایگان مقالات IEEE و Springer و Science Direct
ساعت ۱٠:٢٩ ‎ب.ظ روز یکشنبه ٢٠ اردیبهشت ،۱۳٩٤   کلمات کلیدی: دانلود رایگان ،مقاله isi ،دانلود رایگان مقاله آی اس آی ،یوزرنیم و پسورد سایتهای علمی

به نام خدا

 

برای دانلود رایگان مقالات IEEE و Springer و Science Direct می توانید از وب سایت ایران سای استفاده کنید.

ایران سای - مرجع علمی فنی مهندسی

ایران سای - مرجع مقالات علمی فنی مهندسی

با تشکر


 
محاسبات ابری
ساعت ۱٢:٠٩ ‎ب.ظ روز چهارشنبه ٩ امرداد ،۱۳٩٢   کلمات کلیدی: دانلود رایگان مقاله آی اس آی ،دانلود رایگان مقاله isi ،دانلود مقالات ieee ،یوزرنیم و پسورد سایتهای علمی

به نام خدا

Title: Green cloud computing schemes based on networks: a survey

Authors: N Xiong , W Han A Vandenberg

Abstract: The authors are particularly aware that green cloud computing (GCC) is a broad range and a hot ?eld. The distinction between ?consumer of? and ?provider of? cloud-based energy resources may very important in creating a world-wide ecosystem of GCC. A user simply submits its service request to the cloud service provider with the connection of Internet or wired/wireless networks. The result of the requested service is delivered back to the user in time, whereas the information storage and process, interoperating protocols, service composition, communications and distributed computing, are all smoothly interactive by the networks. In this study, this is a survey on GCC schemes based on networks. The concept and history of Green computing were introduced ?rst, and then focus on the challenge and requirement of cloud computing. Cloud computing needs to become green, which means provisioning cloud service while considering energy consumption under a set of energy consumption criteria and it is called GCC. Furthermore, the recent work done in GCC based on networks, including microprocessors, task scheduling algorithms, virtualisation technology, cooling systems, networks and disk storage were introduced. After that, the works on GCC from their research group was presented in Georgia State University. Finally, the conclusion and some future works were given.   

Publish Year: 2012

Published in: IET Communications

Number of Pages: 7

موضوع: محاسبات ابری

مشاهده صفحه اول مقاله

دانلود مقاله

لینک مقاله در سایت ناشر

 

ایران سای – مرجع مقالات علمی فنی مهندسی

حامی دانش بومی ایرانیان


 
رمزنگاری کوانتوم
ساعت ٥:٤٩ ‎ب.ظ روز دوشنبه ٧ امرداد ،۱۳٩٢   کلمات کلیدی: دانلود رایگان مقاله آی اس آی ،دانلود رایگان مقاله isi ،دانلود مقالات ieee ،یوزرنیم و پسورد سایتهای علمی

به نام خدا

Title: Quantum Cryptography: A New Generation of Information Technology Security System

Authors: Sharbaf, M.S.

Abstract: Quantum cryptography is an emerging technology in which two parties can secure network communications by applying the phenomena of quantum physics. The security of these transmissions is based on the inviolability of the laws of quantum mechanics. Quantum cryptography was born in the early seventies when Steven Wiesner wrote _bstagConjugate Coding_bstag, which took more than ten years to end this paper. The quantum cryptography relies on two important elements of quantum mechanics - the Heisenberg Uncertainty principle and the principle of photon polarization. The Heisenberg Uncertainty principle states that, it is not possible to measure the quantum state of any system without distributing that system. The principle of photon polarization states that, an eavesdropper can not copy unknown qubits i.e. unknown quantum states, due to no-cloning theorem which was first presented by Wootters and Zurek in 1982. This research paper concentrates on the theory of quantum cryptography, and how this technology contributes to the network security. This research paper summarizes the current state of quantum cryptography, and the real-world application implementation of this technology, and finally the future direction in which the quantum cryptography is headed forwards.   

Publish Year: 2009

Published in: ITNG - IEEE

Number of Pages: 5

موضوع: رمزنگاری کوانتوم

مشاهده صفحه اول مقاله

دانلود مقاله

لینک مقاله در سایت ناشر

 

ایران سای – مرجع مقالات علمی فنی مهندسی

حامی دانش بومی ایرانیان

 

 


 
کاربرد پردازش تصویر
ساعت ٩:۱٢ ‎ق.ظ روز یکشنبه ٦ امرداد ،۱۳٩٢   کلمات کلیدی: دانلود رایگان مقاله آی اس آی ،دانلود رایگان مقاله isi ،دانلود مقالات ieee ،یوزرنیم و پسورد سایتهای علمی

به نام خدا

Title: Noise Induced Segmentation of Noisy Color Image

Authors: Onkar Krishna, Rajib Kumar Jha, Anil Kumar Tiwari, Badal Soni

Abstract: In this paper we have proposed Noise Induced HSI model based noisy and blurred colour image segmentation technique. This approach uses additive noise to suppress the effect of internal noise present in an image for proper detection of objects from such images. In this algorithm we decompose a given image in Hue, Saturation and Intensity (HSI) components and then apply processing on intensity component of the decomposed image. We measured performance of proposed algorithm in terms of correlation coefficient and number of mismatch pixels. The effectiveness of the proposed algorithm is compared with the different existing techniques. It is observed that the computational complexity of our algorithm is less in comparison with several existing techniques, because it deals only with intensity component of the decomposed image. Furthermore, an additional advantage, our technique of segmentation gives better performance as compared to SSR based segmentation using RGB model, SR-extended, integrated region matching, watershed and marker controlled watershed based segmentation method.   

Publish Year: 2013

Published in: NCC - IEEE

Number of Pages: 5

موضوع: کاربرد پردازش تصویر

مشاهده صحفه اول مقاله

دانلود مقاله

لینک مقاله در سایت ناشر

 

ایران سای – مرجع مقالات علمی فنی مهندسی

حامی دانش بومی ایرانیان


 
کاربرد وب سرویسها
ساعت ٩:٤٠ ‎ق.ظ روز شنبه ٥ امرداد ،۱۳٩٢   کلمات کلیدی: یوزرنیم و پسورد دانشگاه های معتبر ،دانلود رایگان مقاله آی اس آی ،یوزرنیم و پسورد سایتهای علمی ،دانلود رایگان مقاله isi

به نام خدا

Title: Automatic Abstract Service Generation from Web Service Communities

Authors: Xumin Liu,Hua Liu

Abstract: The concept of abstract services has been widelyadopted in service computing to specify the functionality ofcertain types of Web services. It significantly benefits keyservice management tasks, such as service discovery andcomposition, as these tasks can be first applied to a smallnumber of abstract services and then mapped to the large scaleactual services. However, how to generate abstract services isnon-trivial. Current approaches either assume the existenceof abstract services or adopt a manual process that demandsintensive human intervention. We propose a novel approach tofully automate the generation of abstract services from a servicecommunity that consists of a set of functionally similar services.A set of candidate outputs are first discovered based on prede-fined support ratio, which determines the minimum number ofservices that produce the outputs. Then, the matching inputsare identified to form the abstract services. We propose a setof heuristics to effectively prune a large number of candidateabstract services. An comprehensive experimental study onreal world web service data is conducted to demonstrate theeffectiveness and efficiency of the proposed approach.   

Publish Year: 2012

Publisher: ICWS - IEEE

Number of Pages: 8

موضوع: کاربرد وب سرویسها

مشاهده صحفه اول مقاله

دانلود مقاله

لینک مقاله در سایت ناشر

 

ایران سای – مرجع مقالات علمی فنی مهندسی

حامی دانش بومی ایرنیان


 
Tracking On-line Radicalization Using Investigative Data Mining
ساعت ٢:٢٦ ‎ب.ظ روز جمعه ٤ امرداد ،۱۳٩٢   کلمات کلیدی: دانلود رایگان مقاله آی اس آی ،مقاله isi ،یوزرنیم و پسورد سایتهای علمی ،دانلود رایگان مقاله isi

به نام خدا

Title: Tracking On-line Radicalization Using Investigative Data Mining

Authors: Pooja Wadhwa, MPS Bhatia

Abstract: The increasing complexity and emergence of Web 2.0 applications have paved way for threats arising out of the use of social networks by cyber extremists (Radical groups). Radicalization (also called cyber extremism and cyber hate propaganda) is a growing concern to the society and also of great pertinence to governments & law enforcement agencies all across the world. Further, the dynamism of these groups adds another level of complexity in the domain, as with time, one may witness a change in members of the group and hence has motivated many researchers towards this field. This proposal presents an investigative data mining approach for detecting the dynamic behavior of these radical groups in online social networks by textual analysis of the messages posted by the members of these groups along with the application of techniques used in social network analysis. Some of the preliminary results obtained through partial implementation of the approach are also discussed.   

Publish Year: 2013

Published in: NCC - IEEE

Number of Pages: 5

موضوع: کاربردهای داده کاوی

مشاهده صفحه اول مقاله

دانلود مقاله

لینک مقاله در سایت ناشر

 

ایران سای – مرجع مقالات علمی فنی مهندسی

حامی دانش بومی ایرانیان


 
Query-Specific Visual Semantic Spaces for Web Image Re-ranking
ساعت ٥:٥٧ ‎ب.ظ روز چهارشنبه ٢ امرداد ،۱۳٩٢   کلمات کلیدی: دانلود رایگان مقاله isi ،دانلود مقالات ieee ،دانلود رایگان مقاله مهندسی ،دانلود رایگان مقاله آی اس آی

به نام خدا

Title: Query-Specific Visual Semantic Spaces for Web Image Re-ranking

Authors: Xiaogang Wang,Ke Liu,Xiaoou Tang,

Abstract: Image re-ranking, as an effective way to improve the re-sults of web-based image search, has been adopted by cur-rent commercial search engines. Given a query keyword, apool of images are first retrieved by the search engine basedon textual information. By asking the user to select a queryimage from the pool, the remaining images are re-rankedbased on their visual similarities with the query image. Amajor challenge is that the similarities of visual features donot well correlate with images_ semantic meanings whichinterpret users_ search intention. On the other hand, learn-ing a universal visual semantic space to characterize highlydiverse images from the web is difficult and inefficient.In this paper, we propose a novel image re-rankingframework, which automatically offline learns different vi-sual semantic spaces for different query keywords throughkeyword expansions. The visual features of images are pro-jected into their related visual semantic spaces to get se-mantic signatures. At the online stage, images are re-rankedby comparing their semantic signatures obtained from thevisual semantic space specified by the query keyword. Thenew approach significantly improves both the accuracy andefficiency of image re-ranking. The original visual featuresof thousands of dimensions can be projected to the seman-tic signatures as short as 25 dimensions. Experimental re-sults show that 20% - 35% relative improvement has beenachieved on re-ranking precisions compared with the state-of-the-art methods.   

Publish Year: 2011

Published in: CVPR - IEEE

Number of Pages: 8

موضوع: وب معنایی

مشاهده صفحه اول مقاله

دانلود مقاله

لینک مقاله در سایت ناشر

 

ایران سای – مرجع مقالات علمی فنی مهندسی

حامی دانش بومی ایرانیان


 
Video Based Palmprint Recognition
ساعت ٥:٤٦ ‎ب.ظ روز سه‌شنبه ۱ امرداد ،۱۳٩٢   کلمات کلیدی: دانلود رایگان مقاله آی اس آی ،دانلود رایگان مقاله isi ،دانلود مقالات ieee ،یوزرنیم و پسورد سایتهای علمی

به نام خدا

Title: Video Based Palmprint Recognition

Authors: Chhaya Methani and Anoop M Namboodiri

Abstract: The use of camera as a biometric sensor is desir-able due to its ubiquity and low cost, especially for mo-bile devices. Palmprint is an effective modality in suchcases due to its discrimination power, ease of presen-tation and the scale and size of texture for capture bycommodity cameras. However, the unconstrained na-ture of pose and lighting introduces several challengesin the recognition process. Even minor changes in poseof the palm can induce significant changes in the vis-ibility of the lines. We turn this property to our ad-vantage by capturing a short video, where the naturalpalm motion induces minor pose variations, providingadditional texture information. We propose a method toregister multiple frames of the video without requiringcorrespondence, while being efficient. Experimental re-sults on a set of different 100 palms show that the use ofmultiple frames reduces the error rate from 12.75% to4.7%. We also propose a method for detection of poorquality samples due to specularities and motion blur,which further reduces the EER to 1.8%.   

Publish Year: 2010

Publisher: ICPR - IEEE

Number of Pages: 4

موضوع: تشخیص اثر کف دست

مشاهده صفحه اول مقاله

دانلود مقاله

لینک مقاله در سایت ناشر

 

ایران سای – مرجع مقالات علمی فنی مهندسی

حامی دانش بومی ایرانیان


 
← صفحه بعد