Search Results/Filters    

Filters

Year

Banks




Expert Group











Full-Text


Journal: 

Legal Research

Issue Info: 
  • Year: 

    2020
  • Volume: 

    23
  • Issue: 

    90
  • Pages: 

    107-132
Measures: 
  • Citations: 

    0
  • Views: 

    414
  • Downloads: 

    0
Abstract: 

Computer data is flowing in cyber space regardless the national borders. In many cases data related to crimes as electronic evidence is not accessible in territory of crime prosecuting state. In these cases, success in prosecuting the crimes requires the access of trans-border data related the crime. Traditionally this access is possible through mutual legal assistance between states based on acquiring consent of the state where the data is stored. This approach is leaded by territorial sovereignty principle but is not preparing the enough speed for gathering electronic evidence. Nowadays states access the data directly and without acquiring consent of the state where data is stored. This direct access to data has been accepted by some of the international frameworks in specific conditions. In spite of this, there is not international unique method for accessing to trans-national data. Each of the trans-border access methods has advantages and disadvantages which should be considered in initiating a new international frame by states.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 414

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2002
  • Volume: 

    4684
  • Issue: 

    -
  • Pages: 

    677-688
Measures: 
  • Citations: 

    1
  • Views: 

    93
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 93

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Issue Info: 
  • Year: 

    2022
  • Volume: 

    44
  • Issue: 

    12
  • Pages: 

    1117-1123
Measures: 
  • Citations: 

    1
  • Views: 

    3
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 3

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2018
  • Volume: 

    9
  • Issue: 

    1 (17)
  • Pages: 

    161-185
Measures: 
  • Citations: 

    0
  • Views: 

    652
  • Downloads: 

    0
Abstract: 

Along with the rapid development of information and communication technologies, a wide variety of data and electronic documents has been the subject of forgery and distortion. In order to criminalizing of Cyber forgery, Article 6 of the Cyber Crimes Law established "attributable data" as subject of Cyber forgery. Unlike traditional forgery, which the legislator determines writing, handwriting, document, signature, seal and stamped, as the subjects of crime But, the type and characteristics of data in cyber forgery has not been determined in Article 6. This deficiency has created ambiguities in practice. The massive volume and variety of data, on the one hand, and the ambiguity of the concept of "attributable data", on the other, make it difficult to determine whether the data is subject to crime of cyber forgery. In this article, we have tried to explain the characteristics of forged cyber documents and clarify ambiguities in this regard.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 652

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

MOHAMMADZADEH ASL N.

Issue Info: 
  • Year: 

    2002
  • Volume: 

    2
  • Issue: 

    5
  • Pages: 

    73-100
Measures: 
  • Citations: 

    2
  • Views: 

    3496
  • Downloads: 

    0
Keywords: 
Abstract: 

The neoclassical growth model is tested by use of panel data procedure in this research. In the econometric test, simoultanously time series and cross detection will be compared on the basis of panel data method through which their observed points increase and consequently the estimation efficiency will be increased. The examination of neoclassical growth theory has been done with reference to external & internal factors of 52 selected countries from 1960 to 2000. The independent variable of model has been selected on the basis of the result of previous research which explains the result in three separate models: developed countries, developing countries, and whole countries. These factors are such as: Gross National Products with lag of period, work force age, growth rate, education level, the change of capital accumulation and economic trade volum. The consequences of this research is that: neoclassical growth model can explain the major part of economic growth of the countries with use of internal variables. Also with the use of panel procedure of fixed effect, we can see the fundamental differences and structure of the growth process for different countries; and show how the economic, and social conditions affect on the growth.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 3496

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 2 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

SHEIKHALISHAHI M. | AZADEH A.

Issue Info: 
  • Year: 

    2016
  • Volume: 

    49
  • Issue: 

    2
  • Pages: 

    211-222
Measures: 
  • Citations: 

    0
  • Views: 

    3122
  • Downloads: 

    0
Abstract: 

Many serious accidents have happened in the world, in which systems have been large-scale and complex, and caused heavy damage and a social sense of instability. Furthermore, advanced nations have almost finished public infrastructure and rushed into a maintenance period. Since maintenance is more important than production and construction, then more maintenance for environmental considerations and protection of natural resources is required. So, in the past four decades, valuable contributions to maintenance policies in the reliability theory have been made. In this paper, a maintenance planning problem is considered. First, maintenance activities are simulated via Awesim. Production and maintenance functions are estimated using historical data. Then simulation is carried out for different scenarios which are combinations of periodic maintenance, and outputs are computed. Since the problem is multi-criteria decision making, a data envelopment analysis (DEA) method is used to select the preferred policy. Finally the preferred alternative is selected to optimize the cost, reliability, availability, queue length and machine utilization.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 3122

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    1395
  • Volume: 

    3
Measures: 
  • Views: 

    3156
  • Downloads: 

    0
Abstract: 

لطفا برای مشاهده چکیده به متن کامل (PDF) مراجعه فرمایید.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 3156

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0
Author(s): 

Zerang Mohammad

Issue Info: 
  • Year: 

    2023
  • Volume: 

    28
  • Issue: 

    103
  • Pages: 

    173-200
Measures: 
  • Citations: 

    0
  • Views: 

    40
  • Downloads: 

    6
Abstract: 

Unauthorized acquisition of military Computer data causes acquisitive to use them for cyberattacks on military infrastructures, which in practice may destroy vital military systems such as offensive systems. And the defense will come. The legislator in paragraph (a) of Article 731 of the Islamic Penal Code has only provided for the acquisition of secret data in general, and there is no explicity about criminal title "unauthorized acquisition of Computer data" in Article 131 of the Criminal Code of the Armed Forces. The importance and sensitivity of military Computer data requires appropriate measures to be established both in the field of criminalization and punishment. In this research, how is Iran's criminal policy regarding the unauthorized acquisition of military Computer data and whether there is a significant gap and deficiency in this regard or if there are other laws, such a defect or gap will be ruled out. It will be paid. The present study, while examining the relevant articles in the Criminal Law of the Armed Forces and the Law of Computer Crimes, using a descriptive-analytical method and based on library sources, concludes that Iran's criminal policy regarding the unauthorized acquisition of military Computer data Both classified and unclassified by military and civilian persons, they did not enjoy the principle of deterrence and the principle of proportionality of crime and punishment, in this regard, there is a need for amendment and legal gaps that require the provision of measures that are appropriate to the importance of the data. There are military Computers that have been presented in this direction.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 40

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 6 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    1977
  • Volume: 

    80
  • Issue: 

    -
  • Pages: 

    319-324
Measures: 
  • Citations: 

    1
  • Views: 

    203
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 203

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2019
  • Volume: 

    8
  • Issue: 

    4 (supplement)
  • Pages: 

    311-318
Measures: 
  • Citations: 

    0
  • Views: 

    460
  • Downloads: 

    0
Abstract: 

Todays gamma knife radiosurgery is used widely for treatment of very small brain tumors. In order to investigate accuracy of dosimetry and treatment planning calculations, using Monte Carlo simulation with dedicated code named as beamnrc including non-CT data and CT data options is necessary. The aim of this study is choosing the best options in order to have an accurate tools based on their advantages and disadvantages. In this study, gamma knife unit 4C along with standard water equivalent phantom and EBT3 films were used to obtain dose distributions. Monte Carlo simulation was done with non-CT data and CT data options of the code and their resulting dose were compared. Comparison the calculated and measured dose distributions at X, Y and Z axis showed gamma value below 1 which verified Monte Carlo simulations. Also comparing the dose distributions from both non-CT data and CT data with each other implies that there is no significant difference between two methods. Based on the obtained results using non-CT data and CT data results in the same dose distribution. So for simplicity, using non CT data for regular phantom shapes is preferred.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 460

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button