ترجمه مقاله In Search of the “Perfect One”: How accounting as a maieutic machine

ترجمه مقاله In Search of the “Perfect One”: How accounting as a maieutic machine

ترجمه مقاله In Search of the “Perfect One”: How accounting as a maieutic machine

In Search of the “Perfect One”: How accounting as a maieutic machine sustains inventions through generative ‘in-tensions a b s t r a c t The paper contributes to the debate regarding the incompleteness of accounting representations and performance measures by highlighting the role that such incompleteness plays by prompting and sustaining a continuous search for perfection which, however, is never achieved. Thanks to the information collected through a longitudinal case study of an Italian mid-size fashion firm, we illustrate how accounting visualizations offer a visual space that generates productive tensions, which sustain this process of scrutiny, questioning and continual search. Theoretically, we draw on the notion of epistemic objects combined with the findings of visual rhetoric in order to explain the role of the intrinsic incompleteness of accounting representations and the visualizations that are produced and referred

ترجمه مقاله Security for the Robot Operating System

ترجمه مقاله Security for the Robot Operating System

ترجمه مقاله Security for the Robot Operating System

Security for the Robot Operating System امنیت برای سیستم عامل ربات Abstract Future robotic systems will be situated in highly networked environments where they communicate with industrial control systems, cloud services or other systems at remote locations. In this trend of strong digitization of industrial systems (also sometimes referred to as Industry 4.0), cyber attacks are an increasing threat to the integrity of the robotic systems at the core of this new development. It is expected, that the Robot Operating System (ROS) will play an important role in robotics outside of pure research-oriented scenarios. ROS however has significant security issues which need to be addressed before such products should reach mass markets. In this paper we present the most common vulnerabilities of ROS, attack vectors to exploit those and several approaches to secure ROS

ترجمه مقاله Fire behavior of steel and partially encased composite columns embedded on walls

ترجمه مقاله Fire behavior of steel and partially encased composite columns embedded on walls

ترجمه مقاله Fire behavior of steel and partially encased composite columns embedded on walls

Fire behavior of steel and partially encased composite columns embedded on walls رفتار آتش‌سوزی ناشی از ستون ‎ های کامپوزیت فولادی و نسبتا جاسازی شده در دیوارها This paper presents the results of an experimental research on steel and composite partially encased steel columns embedded on brick walls and subjected to fire. The specimens were made of HEA 100 and HEA 220 steel profiles, with the web parallel and orthogonal to the wall's surface. The thickness of the tested walls was 7, 11, and 15 cm depending on the steel profile used in the column. Due to the generated thermal gradient, this type of columns experienced thermal bowing, bending first towards the exposed side and then to the opposite side of the fire.When the column'sweb is