Archive

Year

Volume(Issue)

Issues

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Issue Info: 
  • Year: 

    2013
  • Volume: 

    1
  • Issue: 

    3 (3)
  • Pages: 

    1-6
Measures: 
  • Citations: 

    0
  • Views: 

    1341
  • Downloads: 

    0
Abstract: 

Recognition of the modulation type of hostile signals is an important task in electronic war measures. Regarding the growth of satellite applications in military communications, in this paper a novel modulation recognition method is developed for classification of satellite communications signals used in 2nd generation of Digital Video Broadcasting via Satellite (DVB-S2) standard. The proposed method extracts fourth and sixth order cumulants from the received signal as its features. The features are given to a SVM pairwise coupling algorithm in which there is one binary SVM for each pair of modulation types. Finally the algorithm selects the modulation type chosen by the maximal number of pairwise SVMs as final decision. The simulation results show that the proposed method provides higher recognition rates in comparison with some previous methods, especially at low SNRs.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1341

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

NASERI ALI

Issue Info: 
  • Year: 

    2013
  • Volume: 

    1
  • Issue: 

    3 (3)
  • Pages: 

    7-12
Measures: 
  • Citations: 

    0
  • Views: 

    1329
  • Downloads: 

    0
Abstract: 

Electronic support (ES) isadivision of electronic warfare. and is responsible for identification of tele communication and electronic systems. The most important part of electronic systems is radars. Therefore, Radar Identification is very essential importance, such that can determine the electronic warfare power. Up to now, many algorithm shave been presented for radar identification whose maximum accuracyis 93% with 5% missing pulse and 5% noise. In this paper has been suggested an algorithm based on extended Kalman filter with the accuracy of97.2% and computation complexity of 3.23 N2. Duetothe recursiveequation, it can be implemented with parallel processing systems (systolic array).

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1329

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2013
  • Volume: 

    1
  • Issue: 

    3 (3)
  • Pages: 

    13-24
Measures: 
  • Citations: 

    0
  • Views: 

    1706
  • Downloads: 

    0
Abstract: 

Inattention to the security of Web-service based software systems has more damage results and using of them has harmful consequences, due to this kind of software systems have most important security challenges. So far, security standards by traditional security mechanisms, such as encryption and digital signatures for security of Web service based systems have been discussed. The classical techniques of fault tolerance, the conventional method to enhance the security of Web services security are exploitable. In spite of the security standards and techniques were mentioned, so far have not provided complete security of Web services and we are witnessing the continuing influence. Whereas traditional security mechanisms and techniques could not respond the security requirements of Web services, so "intrusion tolerance technology" that means continuing delivery of services in presence of attack is a fundamental approach for increasing the security of Web services. In this paper, we propose a new approach for intrusion-tolerant Web services design, based on combination of fault-tolerance techniques and traditional security methods with emphasis on design diversity techniques. We have modeled the proposed software design by Markov chains in two cases. In the first case, the model uses redundant components, while in the second case, the model uses non-redundant components. Then, we have solved models using Maple software. The evaluation results show that the system throughput is considerably increased in the case of using redundant components.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1706

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2013
  • Volume: 

    1
  • Issue: 

    3 (3)
  • Pages: 

    25-31
Measures: 
  • Citations: 

    0
  • Views: 

    1499
  • Downloads: 

    0
Abstract: 

Digital signature is the most important validation issue on the digital documents, particularly for electronic cheques because the most massive transactions in electronic commerce, utilize them. In digital signatures variety. proxy signature is an instance which an original sign owner gives his/her signing ability to an agent to generate a delegation signature on behalf of him/her. Therefore the original signer must have prevention ability for unwanted signatures or fast revocation ability for misuses by agents. In this paper, we proposed a Threshold proxy signature scheme for electronic cheques. which has fast revocation ability for threshold proxy signature. This scheme is secure against the original signer's forgery attack and also proxy sign Owner sforgery attach Moreover, we show that the proposed scheme satisfies the following security Requirements: Verifiability, Nonrepudiation, Identification ability and Prevention of misuse, which allare Essential for a threshold proxy signature scheme.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1499

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2013
  • Volume: 

    1
  • Issue: 

    3 (3)
  • Pages: 

    33-41
Measures: 
  • Citations: 

    0
  • Views: 

    941
  • Downloads: 

    0
Abstract: 

The optimal control is very important in electronic warfare, and has a critical role to achieve military successes. In this paper, we have tried to help decision support for this part by focusing on some important issues in the management of electronic warfare. We introduce and improve three efficient algorithms including based on "Random", "Auction" and "Game Theory-Based" for radar jamming resource assignment. and, we want to know whichof our jammers have to allocate to which enemy radars to create maximum jamming in them? We use principles of dynamic game theory to develop Auction algorithm and introduce Random algorithm to illustrate the performance of two other algorithms by making possibility to compare. In other effort, we improve the algorithms by cost-based and time-based algorithms for non real time and real time combats. Eventually, we have supposed some scenarios to demonstrate that our efforts are operational through simulations such as our jammers located on vehicles. Therefore they can move in the battlefield to increase the effectiveness of group jamming, and also in the other scenario we have enough jammers. Hence, we can switch them on and off to achieve the best jamming condition with regard to economic considerations.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 941

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2013
  • Volume: 

    1
  • Issue: 

    3 (3)
  • Pages: 

    43-51
Measures: 
  • Citations: 

    0
  • Views: 

    2157
  • Downloads: 

    0
Abstract: 

The most important and difficult step in producing Expert System is the production of Knowledge Base. This step requires the most of the costs in such production for assumption of human resource, assets, time, accuracy and etc. The best way to reduce costs is designing special tools which expand the acquisition of expert knowledge. These tools are single purpose in each specific field, and can help the experts in production of knowledge base of expert system with reasonable costs. This paper aim is to designing Network Security Knowledge Modeling Abstract Language (NSKMAL) and to mention Network Security Knowledge Tool (NSKTOOL) graphical environment. They are designed and implemented especially for production of knowledge base of Network Security Test Analysis Expert System. Network Security experts can formulate and save knowledge at the Knowledge Base with use of graphical environment of NSKTOOL. The result of interaction between experts and NSKTOOL is a set of NSKMAL instructions, which will be subsequently interpreted with NSKMAL interpreter and necessary changes in the Knowledge Base are applied.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 2157

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2013
  • Volume: 

    1
  • Issue: 

    3 (3)
  • Pages: 

    53-61
Measures: 
  • Citations: 

    0
  • Views: 

    2975
  • Downloads: 

    0
Abstract: 

As a result of increasing penetration of mobile phone and M-commerce development, cell phone usage is growing as a means of payment My by My. Considering tire importance of security in commerce and payment. due to the characteristics of wireless networks and constraints of cell phones, proposed protocols in payment area require security in addition to efficiency. In this paper. in order to achieve the mentioned goals. a secure and efficient payment protocol is proposedbased on vendor-centric communication scenario. In this proposal; we toke advantage of self-certified public keys (SCPKs) based on elliptic curve, schnorr digital signature and sign-encryption scheme in order to provide a solution for an authenticated encryption. Applying the proposed solutions in this protocol leads to reduaion in computational load time complexity comparing to other public-key encryption schemes. in addition. the offered protocol is resistance to known security attacks and also provides privacy and fair payment transaction for clients.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 2975

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2013
  • Volume: 

    1
  • Issue: 

    3 (3)
  • Pages: 

    63-71
Measures: 
  • Citations: 

    0
  • Views: 

    1075
  • Downloads: 

    0
Abstract: 

In Data Outsourcing, the owner surrenders his data management operations to an external provider which receives user queries and answers them. Besides, data may be of great importance to owners while the external provider may not be trustworthy. Thus, providing data privacy and integrity of user queries have to be considered. Here data privacy means that owner's data must not be revealed to service provider; and query integrity means that the result set returned to users must be sound, complete, and up-to-date. Different methods are proposed to handle mentioned goals with their own advantages and disadvantage, namely encryption usage, private information retrieval (PIR) and data distribution. In this article, we have proposed an approach to gain mentioned goals. Our approach provides better performance and it also provides data privacy and integrity of queries.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1075

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button