Archive

Year

Volume(Issue)

Issues

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Title: 
Author(s): 

Issue Info: 
  • Year: 

    0
  • Volume: 

    7
  • Issue: 

    3
  • Pages: 

    -
Measures: 
  • Citations: 

    0
  • Views: 

    574
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 574

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Title: 
Author(s): 

Issue Info: 
  • Year: 

    0
  • Volume: 

    7
  • Issue: 

    3
  • Pages: 

    -
Measures: 
  • Citations: 

    0
  • Views: 

    620
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 620

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2016
  • Volume: 

    7
  • Issue: 

    3
  • Pages: 

    169-181
Measures: 
  • Citations: 

    0
  • Views: 

    872
  • Downloads: 

    0
Abstract: 

In this article to investigate the blast effects on structure and its performance determination, a building with reinforced concrete frames has been designed according to Iranian earthquake standard No.2800-05 and a single frame of it has been modeled with ABAQUS package and subjected to blast loads in accordance with the Iranian National Building Code of draft Part 21 considering material and geometrical nonlinearities. The results indicate that the blast danger levels given in the Part21 do not have a reasonable relation with each other' s, neither in over pressure nor impulse. For example in the first blast danger level (the severe one), none of the columns could pass the life safety level (L.S.) of performance, but in all other blast danger levels, all column could pass Immediate Occupancy level (I.O.). Also the side way displacement is so little in the frame that in all blast loads could pass I.O. level. Also the code drift criterion is so that in all blast danger levels, I.O. level is achieved. According to these results, it seems that blast danger levels and also drift criterion should be revised.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 872

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2016
  • Volume: 

    7
  • Issue: 

    3
  • Pages: 

    183-191
Measures: 
  • Citations: 

    0
  • Views: 

    933
  • Downloads: 

    0
Abstract: 

Nowadays, RFID technology is using widely in our daily lives. This technology is used in many applications such as healthcare, military, identifying friend or foe of fighter-aircraft and etc. In order to provide security and privacy of RFID systems, different authentication protocols have been proposed. Pang proposed a RFID authentication protocol based on EPC C-1 G-2 standard. They claimed that their protocol is secure against various attacks and provides user privacy. It is shown that protocol proposed by pang is not safe and suffer from attacks such as tag ID exposure, tag impersonation, reader impersonation and de-synchronization. Also to enhance security of RFID users, an improved version of this protocol is proposed, showing that it is secure against aforementioned attacks. In addition, complexity and efficiency of the improved protocol is compared with some similar ones and it is shown that the improved protocol is completely secure. Eventually, security of the improved protocol is compared with some existed protocols.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 933

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

ALIZADEH PAHLAVANI M.R.

Issue Info: 
  • Year: 

    2016
  • Volume: 

    7
  • Issue: 

    3
  • Pages: 

    193-200
Measures: 
  • Citations: 

    0
  • Views: 

    801
  • Downloads: 

    0
Abstract: 

By increasing the penetration of distributed generation in electrical distribution networks, especially in military areas, use of directional relay becomes a necessary device for protection of these networks. Due to the absence of potential transformers, the conventional directional relays cannot be applied in distribution networks for detection of fault direction. For this purpose, a new directional relay is presented that is able to detect the fault direction using only the through-fault current. The proposed approach is not affected by power flow direction and improves the performance of the previously introduced current based on directional relays employing pre-fault current. The present approach could eliminate the cost of the potential transformer in distribution systems. The extensive simulations, under different operation condition are carried out on two different distribution systems; including bidirectional 3 bus network and IEEE 14 bus test system. The obtained results approved the high efficiency of the proposed method.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 801

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2016
  • Volume: 

    7
  • Issue: 

    3
  • Pages: 

    201-208
Measures: 
  • Citations: 

    0
  • Views: 

    944
  • Downloads: 

    0
Abstract: 

On the basis of the population and sensitive military centers in the north of Tehran and also the development of underground civil projects in this region, such as buried tunnels for the Metro lines projects and military centers, there is the possibility of military threats due to the air attacks. The penetrate missiles are of the dynamic instability factors that threaten the safety of the tunnels. In this study, by using of the numerical analysis, resistance of the considered tunnel against explosion of bunker buster GBU-28 in the various deeps has been investigated and finally the minimum distance among explosive cavity and crown of the tunnel that remained stable in the explosive tensions situations has been determined about 25m. At the distances lower than 25m, both critiques of replacement of tunnel crown and the breaking point indicated instability of tunnel under load due to the explosion.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 944

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2016
  • Volume: 

    7
  • Issue: 

    3
  • Pages: 

    209-218
Measures: 
  • Citations: 

    0
  • Views: 

    712
  • Downloads: 

    0
Abstract: 

One of the most dangerous insider threats in a supervisory control and data acquisition (SCADA) system is operational threat. An operational threat occurs when an SCADA operator does not perform his duties, or decides to abuse the privileges in order to perform malicious operations in remote substations. An operational threat on a critical infrastructure has the potential to cause large financial losses and irreparable damages at the national level. In this paper a new alarm-based anomaly detection system has been proposed to detect operational threats in SCADA system. The proposed system uses statistical quality control techniques for detecting anomalies and estimating control limits. The value of anomaly is calculated according to the severity of longed-unresolved alarms. The simulation results in power system SCADA as a case study show effectiveness of proposed system.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 712

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2016
  • Volume: 

    7
  • Issue: 

    3
  • Pages: 

    219-232
Measures: 
  • Citations: 

    0
  • Views: 

    579
  • Downloads: 

    0
Abstract: 

Generating and processing of spatial data for positioning of critical facilities increase the passive defence capability and security index, while decreasing the effects of possible attacks, significantly. Nowadays, accessing to satellite images with higher resolutions, due to the more accurate results, is an attractive issue in the field of defence systems. In this paper, a push broom imaging system has been implemented which is capable of receiving commands, storing and reloading images. The scanning-based camera plus an improved super-resolution algorithm will result in an output super-resolved image, in comparison with initial input. The proposed algorithm which incorporates less erroneous frames in the reconstruction process has been applied on the real-world camera outputs. Visual evaluation, the Q-Metric and CPBD factors show that the performance of our algorithm is better than the other methods.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 579

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

HAGHMARAM R.

Issue Info: 
  • Year: 

    2016
  • Volume: 

    7
  • Issue: 

    3
  • Pages: 

    235-250
Measures: 
  • Citations: 

    0
  • Views: 

    633
  • Downloads: 

    0
Abstract: 

Beside various advantages of micro grids, impossibility of continuous power generation in islanding mode threats the security of electrification of sensitive loads under emergencies. This paper proposes a construction for distribution networks which is formed using micro grids connection in which the micro grids use each other power capacity when the power transfer from the utility grid is not possible. This solution can provide passive defense of next generation of distribution networks in emergency conditions. A modular bidirectional DC-DC converter for connection of a DC micro grid to a DC distribution network is proposed which provides the bidirectional power transfer. Operation principle of the proposed converter is verified using experimental measurement, and proposed power management strategy for micro grid connection to the distribution network is investigated using PSCAD/EMTDC software. Analysis results show that interconnection of micro grids increases the security of electric power for micro grid loads under emergencies, which is frequently along with micro grids islanding mode.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 633

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2016
  • Volume: 

    7
  • Issue: 

    3
  • Pages: 

    251-259
Measures: 
  • Citations: 

    0
  • Views: 

    741
  • Downloads: 

    0
Abstract: 

In recent years, compared with stream ciphers more attention has been to block ciphers because of their proved security and wide application. Design of most block ciphers are based on substitution-permutation network (SPN) or Fiestel structure. Although Fiestel structures compared with SPN has many benefits, but since they have less active S-boxes in round function, it has a security weakness. In this paper, we introduce two new methods for designing 192-bit block cipher algorithms that use Switching Structure and Recursive Diffusion Layers to increase active S-boxes. The first method is based on switching structure and 3×3 multiple Recursive Diffusion Layers and the second method used switching structure and 2×2 multiple Recursive Diffusion Layers. Security of tow structures using linear programming offered analysed with linear programming and evaluated the results show of resistance to linear and differential cryptoanalysis. Also, since the Recursive Diffusion Layers are more efficient than MDS matrices in software and hardware, thus designed algorithms with these methods have high performance in various platforms.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 741

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button