Search Results/Filters    

Filters

Year

Banks




Expert Group










Full-Text


Issue Info: 
  • Year: 

    1382
  • Volume: 

    9
Measures: 
  • Views: 

    2061
  • Downloads: 

    0
Abstract: 

در این مقاله به بررسی نحوه پیاده سازی الگوریتم chain Code بر روی FPGA می پردازیم. الگوریتم chainCode یکی از الگوریتم های کد کردن تصویر می باشد که برای کد کردن لبه های یک شیء در تصویر استفاده می شود همچنین این الگوریتم می تواند عرض، ارتفاع، محیط و مساحت شیء را نیز به دست آورد. این الگوریتم در پردازش تصویر و شناسایی و مقایسه شیء ها و الگوها با هم کاربرد بسیاری دارد. در این پروژه ابتدا الگوریتم chain Code با استفاده از VHDL که زبان توصیف سخت افزار می باشد، شبیه سازی شده و سپس برنامه نوشته شده به زبان VHDL بر روی مدل Spartan-II از FPGA های شرکت Xilinx پیاده سازی می شود.پردازنده مذکور قابلیت تولید chain Code را برای یک تصویر با ابعاد حداکثر 256*256 پیکسل سیاه و سفید دارا می باشد که البته در صورت نیاز این ابعاد قابل گسترش می باشند. همچنین این پردازنده، طول، عرض، محیط و مساحت شیء موجود در تصویر را نیز علاوه بر تولید کد به دست می آورد.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 2061

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0
Journal: 

خصوصی

Issue Info: 
  • End Date: 

    تیر 1373
Measures: 
  • Citations: 

    0
  • Views: 

    222
  • Downloads: 

    0
Keywords: 
Abstract: 

این طرح بخشی از طرح طراحی و ساخت دستگاه های «Bar. Code. Reader» است که برای استفاده در هتل ها، به عنوان کلید، طراحی شده اند. نمونه مورد نظر، پس از طراحی و ساخت مورد تست قرار گرفت. با توجه به نتایج مثبت آزمایش یک هزار سری از سیستم به سفارش کارفرما ساخته شد و تحویل گردید.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 222

Issue Info: 
  • Year: 

    1388
  • Volume: 

    17
Measures: 
  • Views: 

    303
  • Downloads: 

    0
Abstract: 

لطفا برای مشاهده چکیده به متن کامل (PDF) مراجعه فرمایید.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 303

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0
Author(s): 

JAVAHERI D. | HOSSEINZADEH M.

Issue Info: 
  • Year: 

    2020
  • Volume: 

    10
  • Issue: 

    4
  • Pages: 

    393-406
Measures: 
  • Citations: 

    0
  • Views: 

    852
  • Downloads: 

    0
Abstract: 

Malwares have grown drastically in recent years. Furthermore, the behavior of the newly produced malwares are getting more complex and shrewd. This paper present malware detection methods and especially focus on Code and DLL Injection attacks. Novel malwares try to obfuscate and hide their behavior through the Injection of malicious Code in allocated memory and binary file of trusted applications. By data mining on massive volume of malwares, the proposed method of the paper derive chain of API calls through installing logger hook at the kernel space of the operating system in order to model the malicious behavior of Code/DLL Injection based on linear regression function. The proposed method use association rules machine learning based on Apriori algorithm for early detection of attacks and is able to prevent completion of the attack by blocking remote thread creation. Finnaly, the accuracy of the proposed method is evaluated using dataset from valid references and the results are compared with available Antivirus tools under the same conditions. Results of the evaluation indicate that the proposed method can recognize Code/DLL Injection attacks by the accuracy of about 94%. Moreover, success coefficient of the proposed self-defense system is evaluated of 88. 88% against real Code/DLL Injection attacks.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 852

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

اعتضادی حمید

Journal: 

بندر و دریا

Issue Info: 
  • Year: 

    0
  • Volume: 

    27
  • Issue: 

    192
  • Pages: 

    0-0
Measures: 
  • Citations: 

    0
  • Views: 

    907
  • Downloads: 

    0
Keywords: 
Abstract: 

لطفا برای مشاهده متن کامل این مقاله اینجا را کلیک کنید.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 907

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2020
  • Volume: 

    28
  • Issue: 

    112
  • Pages: 

    23-30
Measures: 
  • Citations: 

    0
  • Views: 

    510
  • Downloads: 

    145
Abstract: 

Introduction: In different studies worldwide, gender ratios derived from ICSI (Assisted reproductive techniques) have been reported differently. Objective: Evaluation of neonatal gender in ICSI women referred to Mehr Infertility Research Center of Rasht. Materials and Methods: In this descriptive-analytical study, the cases of infertile women referred to Mehr Infertility Research Center in Rasht for ICSI were examined to determine the sex ratio of the neonates. Data were analyzed using SPSS 21 and descriptive and an alytical (Chi-square and independent t) tests. Results: The results showed that 52% of single-born neonates, 60% of multiple pregnancies (single sex) and 52. 5% of multiple pregnancy (two sexes) were male. Conclusion: The ratio of male in single and multiple pregnancies in ICSI was higher than female.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 510

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 145 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2015
  • Volume: 

    -
  • Issue: 

    8
  • Pages: 

    55-86
Measures: 
  • Citations: 

    0
  • Views: 

    739
  • Downloads: 

    0
Abstract: 

Terrorism is a phenomenon which considerable attention has been focused on in recent years. In this respect, the criminal Code is one of mechanisms has been regarded to combat terrorism. Although the penal Code is a tool to response the crimes of punishments of offenders, political entity of terrorism can separate the criminal Code from its basic principles in order to combat terrorism procedures and establishing Tool-using for politicians. Notwithstanding this danger (risk), the criminal Code has many privileges to the non-legal alternatives which based on the criminal Code; it can be preferred to other methods like war. Still, the suggested method is creating a comprehensive method to combat terrorism entities which it is to employ every of these methods besides the others.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 739

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2017
  • Volume: 

    9
  • Issue: 

    1
  • Pages: 

    17-26
Measures: 
  • Citations: 

    0
  • Views: 

    570
  • Downloads: 

    109
Abstract: 

Embedded systems are suggestive targets for Code Injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics of embedded systems and their applicability in Code Injection attack detection. The architectural simulation for execution time, power usage and temperature on benchmarks shows that these parameters disclose meaningful and distinguishable behaviours in case of attack.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 570

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 109 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

MAHMOUDZADEH KAMBIZ

Journal: 

Translation Studies

Issue Info: 
  • Year: 

    2004
  • Volume: 

    2
  • Issue: 

    6
  • Pages: 

    25-42
Measures: 
  • Citations: 

    0
  • Views: 

    1618
  • Downloads: 

    0
Abstract: 

Communication between and among bilinguals does not always take place in the same manner. In fact, interaction among bilingual individuals depends on the circumstances, topics under discussion, and even the mood of the interlocutors. For this reason, upon careful consideration of the communication between and among bilinguals, one will definitely have to deal with bilingualism in general and Code-switching and Code-mixing in particular. It is the objective of the present paper to introduce bilingualism in brief, and deal with Code-switching and Code mixing in detail, for bilinguals may follow different patterns in their conversation and adhere to one of the possible choices. Attempts will also be made to provide examples in either one of the cases when deemed necessary.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1618

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button