Search Results/Filters    

Filters

Year

Banks




Expert Group











Full-Text


Author(s): 

HARIS S.H.C. | AHMAD R.B.

Issue Info: 
  • Year: 

    2010
  • Volume: 

    -
  • Issue: 

    2
  • Pages: 

    0-0
Measures: 
  • Citations: 

    1
  • Views: 

    124
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 124

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    0
  • Volume: 

    8
  • Issue: 

    3 (ویژه نامه ناباروری 3)
  • Pages: 

    106-106
Measures: 
  • Citations: 

    0
  • Views: 

    851
  • Downloads: 

    0
Abstract: 

تکنولوژی جدید در زمینه ناباروری باعث شده است که برای درمان مردان عقیم که آزوسپرم بوده اند تحولی ایجاد نماید به طوری که اسپرم با تعداد محدودی که از طریق پونکسیون اپیدیدیم PESA یا با استخراج آن از نسج بیضه TESE حاصل می شود با روش میکرواینجکشن TCSI امکان باروری داشته باشد. لذا با توجه به موقعیت پیش آمده در درمان این افراد یافتن همان تعداد کم اسپرمها نیز اهمیت پیدا کرده است و از طرفی Silber مشخص کرده است که 50% موارد آزوسپرمی غیر انسدادی دارای کانونهای اسپرماتوژنر هستند. بنابراین چنانچه به روشهای مناسبی دسترسی پیدا کرد امکان یافتن تعداد کم اسپرم در بیماران و باروری وجود دارد. مطالعات مختلفی از نظر بیوفیزیکی و وضعیت ظاهری بیضه ها، میزان عروق آن، آزمایشات هورمونی، ایمونولوژی و همچنین چگونگی نمونه برداری انجام شده تا بهترین و موثرترین راه در مشخص کردن و استخراج اسپرم از بیضه شناخته شود.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 851

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

HUANG Y.A. | LEE W.

Issue Info: 
  • Year: 

    2004
  • Volume: 

    -
  • Issue: 

    7
  • Pages: 

    125-145
Measures: 
  • Citations: 

    1
  • Views: 

    98
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 98

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2020
  • Volume: 

    1
  • Issue: 

    1
  • Pages: 

    15-24
Measures: 
  • Citations: 

    0
  • Views: 

    2173
  • Downloads: 

    0
Abstract: 

The rapid growth of IT applications and providing more services on computer networks comes with security threats with malicious and business targets. One method to deal with network traffic analysis complexities is to analyze a summary of network data that is extracted from network connections. Netflow is a defacto standard for generating network flow data introduced by Cisco and integrated into Cisco switches and routers which produce flow records about underlying network traffic. In this paper, we use machine learning techniques to analyze Netflow data and classifying connections pertain to network Attacks and do respective prevention measures after the classification. Machine learning algorithms including Naï ve Bayes, SVM, and NBTree has been used to model different Attacks based on network flow data. In the evaluation phase, KDDcup99 dataset used and related features to Netflow data are selected (7 features), and then, classification has been done with both original KDDcup99 features (41 features) and our selected Netflow features. Average classification accuracy for different 22 Attack classes and one benign class shows that using just seven Netflow related features does not affect the accuracy obviously while the computation overhead is obviously decreased. Average detection accuracy for our selected features in different algorithms is 97% whereas, for the best case (i. e, SVM) with 41 features, the average accuracy is 99% which is not so much better than our less complex Netflow based method.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 2173

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2017
  • Volume: 

    46
  • Issue: 

    4 (78)
  • Pages: 

    0-0
Measures: 
  • Citations: 

    0
  • Views: 

    1931
  • Downloads: 

    0
Abstract: 

Wireless sensor networks are made from some small nodes called sensors. These nodes communicate and calibrate for some doing tasks. Various Attacks can threat these networks. A wormhole Attack is an Attack that targets network layer and causes disorder in routing protocols. In the wormhole Attack, packets of an area in the network transmit to other area through high-speed and out-of-band links. This causes nodes that are not in each other’s transmission range detect each other as neighbors unconsciously. To deal with this Attack, various methods are proposed that may require hardware or special defaults. Our proposed method is a distributed one, which uses neighborhood data and requires no special hardware. Our main idea is to use neighborhood list of each legal neighbor node (which is not Attacked) to be aware of real neighbor nodes. In the other words, the proposed method identifies transporting nodes in association with its neighbor nodes.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1931

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2022
  • Volume: 

    20
  • Issue: 

    2
  • Pages: 

    121-134
Measures: 
  • Citations: 

    0
  • Views: 

    454
  • Downloads: 

    0
Abstract: 

Recent advances in power system monitoring and control require communication infrastructure to send and receive measurement data and control commands. These cyber-physical interactions, despite increasing efficiency and reliability, have exposed power systems to cyber Attacks. The Automatic Generation Control (AGC) is one of the most important control systems in the power system, which requires communication infrastructure and has been highly regarded by cyber Attackers. Since a successful Attack on the AGC, not only has a direct impact on the system frequency, but can also affect the stability and economic performance of the power system. Therefore, understanding the impact of cyber Attacks on AGC and developing strategies to defend against them have necessity and research importance. In most of the research in the field of Attack-defense of AGC, the limitations of AGC in modeling such as governor dead band and communication network transmission delay have been ignored. On the other hand, considering two cyber Attacks on the AGC and proposing a way to defend against them simultaneously, have not been considered. In this paper, while using the improved AGC model including governor dead band and communication network transmission delay, the effect of two Attacks-data injection Attack (FDI) and delay Attack which are the most important cyber Attacks on AGC-has been investigated. Also, the simultaneous effect of these two Attacks is discussed as a combined cyber Attack. The Kalman filter-based three-step defense method has been proposed to detect, estimate and mitigate the impact of the Attacks and its effectiveness has been tested on the two-area AGC system.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 454

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2018
  • Volume: 

    10
  • Issue: 

    2
  • Pages: 

    141-162
Measures: 
  • Citations: 

    0
  • Views: 

    1035
  • Downloads: 

    1422
Abstract: 

Nowadays, malicious URLs are the common threat to the businesses, social networks, net-banking. Existing approaches have focused on binary detection i.e., either the URL is malicious or benign. Very few literature is found which focused on the detection of malicious URLs and their Attack types. Hence, it becomes necessary to know the Attack type and adopt an effective countermeasure. This paper proposes a methodology to detect malicious URLs and the type of Attacks based on multi-class classification. In this work, we propose 42 new features of spam, phishing and malware URLs. These features are not considered in the earlier studies for malicious URLs detection and Attack types identification. Binary and multi-class dataset is constructed using 49935 malicious and benign URLs. It consists of 26041 benign and 23894 malicious URLs containing 11297 malware, 8976 phishing and 3621 spam URLs. To evaluate the proposed approach, the state-of-the-art supervised batch and online machine learning classifiers are used. Experiments are performed on the binary and multi-class dataset using the aforementioned machine learning classifiers. It is found that, confidence weighted learning classifier achieves the best 98: 44% average detection accuracy with 1: 56% error-rate in the multi-class setting and 99: 86% detection accuracy with negligible error-rate of 0: 14% in binary setting using our proposed URL features.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1035

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 1422 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2023
  • Volume: 

    11
  • Issue: 

    3
  • Pages: 

    101-118
Measures: 
  • Citations: 

    0
  • Views: 

    244
  • Downloads: 

    62
Abstract: 

Distributed Denial of Service (DDoS) Attack is the widespread sending of valid or invalid packets to a server on the Internet, occupying its bandwidth and preventing execute legitimate requests of other users. The best approach to secure the network from such Attacks is to exploit security controls such as intrusion detection and prevention systems. Cyber security researchers have significantly focused on identifying and counteracting this Attack and have increased the accuracy and performance of security systems by providing various artificial intelligence solutions. The purpose of this paper is also to provide a solution for detecting DDoS Attack, where, decision tree, multi-layer perceptron and random forest classifiers have been utilized in an ensemble method to mitigate the over-fitting problem. Also, two approache, i.e., batch learning and active learning have been implemented and evaluated in the classification phase of the proposed method. The evaluation results show that the mean value of accuracy in DDoS Attack detection is 99.81%.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 244

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 62 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    1388
  • Volume: 

    2
Measures: 
  • Views: 

    538
  • Downloads: 

    0
Abstract: 

فناوری RFID به عنوان یکی از جدیدترین فناوری های موجود در جهان جهت تشخیص هویت و شناسایی افراد و محصولات بکار برده می شود و بسیاری از شرکت ها، سازمان ها و فروشگاه های مختلف از این فناوری برای ردیابی محصولات خود و تشخیص آنها در هنگام خروج محصول استفاده می کنند. ما در این مقاله درباره کاربردهای آن و پروژه هایی که امکان پیاده سازی در ایران را دارد توضیحاتی می دهیم و در آخر طرح پیشنهادی خود را برای کاهش تصادفات جاده ای و کمک به اجرای بهتر قوانین راهنمایی و رانندگی در کشور ایران ارایه می دهیم، همچنین مقایسه ای بین چند روش امنیتی انجام می دهیم.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 538

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0
Author(s): 

Hesabi M. | Deypir M.

Issue Info: 
  • Year: 

    2022
  • Volume: 

    10
  • Issue: 

    2
  • Pages: 

    33-39
Measures: 
  • Citations: 

    0
  • Views: 

    129
  • Downloads: 

    61
Abstract: 

Nowadays, detecting unusual events in the network has been the subject of many researches. Network traffic is huge and very large, and this leads to high data size and increased noise, which makes it very difficult to extract meaningful information to detect abnormal events. Early detection of Attacks improves the stability of a system. Each Attack is a type of specific behavior,But some Attacks may behave similarly and differ only in some features. This article presents a new way to detect malware and Attacks in the cloud computing environment. In this method, data clustering separates the data from each other to provide better conditions for model construction by balancing the data in different classes. This research uses a combination of Adabost, Random Forest and Bosted Gradient Tree algorithms as ensemble learning to improve malware detection in cloud computing. In order to combine boosted learners and build a higher level model, the voting mechanism is used. In the proposed model, ensemble learning, using the strengths of various algorithms, creates a useful, high-performance system for detecting malware in cloud computing. By applying the proposed method on real data, it was observed that the accuracy of the proposed method is equal to 99. 96%, its accuracy is equal to 99. 97% and its recall is equal to 99. 95% which compared to previous methods, it has a noticeable advantage, but its computational complexity has not changed much.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 129

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 61 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button