Search Results/Filters    

Filters

Year

Banks




Expert Group











Full-Text


Writer: 

Khodayaran Ali

Issue Info: 
  • Year: 

    2022
  • Volume: 

    5
Measures: 
  • Views: 

    48901
  • Downloads: 

    173
Abstract: 

Multiprotocol Label Switching is the protocol framework on which the attention of network service provider is focused as it provides privacy and unbreakable security to the users. So, it is used by ISP Backbone Network to form the MPLS Tunneling architecture like MPLS VPN which is discussed in this paper. Providers typically offer this type of service to large corporate customers that require IP connectivity of other remote sites. The main advantage is that MPLS is used over Layer 2 and Layer 3 protocols. It also discusses the concept of Traffic Engineering that utilizes Multiprotocol Label Switching and that also proves to be advantageous over IP based Routing. This Paper also discusses various Encryption Techniques which can be used for the security of MPLS Technology.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 48901

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 173
Issue Info: 
  • Year: 

    2016
  • Volume: 

    8
  • Issue: 

    1
  • Pages: 

    53-60
Measures: 
  • Citations: 

    0
  • Views: 

    449
  • Downloads: 

    114
Abstract: 

FPGA platforms have been widely used in many modern digital applications due to their low prototyping cost, short time-to-market and flexibility. Field-programmability of FPGA bitstream has made it as a flexible and easy-to-use platform. However, access to bitstream degraded the security of FPGA IPs because there is no efficient method to authenticate the originality of bitstream by the FPGA programmer. The issue of secure transmission of configuration information to the FPGAs is of paramount importance to both users and IP providers. In this paper we presented a "Self Authentication" methodology in which the originality of sub-components in bitstream is authenticated in parallel with the intrinsic operation of the design. In the case of discovering violation, the normal data flow is obfuscated and the circuit would be locked. Experimental results show that this methodology considerably improves the IP security against malicious updates with reasonable overheads.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 449

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 114 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    1386
  • Volume: 

    1
Measures: 
  • Views: 

    298
  • Downloads: 

    0
Keywords: 
Abstract: 

شبکه های اینترنت و پروتکل مقاوم و قابل اطمینان آن (IP)، به طور گسترده ای به عنوان زیرساخت و بستر ارتباطی انتقال اطلاعات فعلی و آینده مورد ملاحظه قرار گرفته است. سرعت انتقال اطلاعات با بکارگیری فیبرهای نوری با پهنای باند زیاد به طور فوق العاده ای در حال افزایش است. با در دسترس بودن پهنای باند بسیار زیاد، توسعه سرویس های چند رسانه ای نظیر یادگیری از راه دور، کنفرانس ویدیویی، پخش رادیو و تلویزیونی، و ... امکان پذیر شده است. تکنولوژی های دسترسی موجود نظیر DSL و WiMax راه حل های مناسبی برای دسترسی کاربران خانگی به اینترنت فراهم کرده است. علاوه بر آن، با دسترسی از طریق اترنت گیگابیت بر روی فیبر نوری انتظار می رود سرعت دسترسی کاربران تجاری نیز به صورت فوق العاده ای افزایش یابد. بدیهی است که نتیجه بکارگیری تکنولوژی های دسترسی با پهنای باند گسترده موجب افزایش تقاضای پهنای باند اینترنت خواهد شد. به همین سبب، پژوهشگران همواره در پی بهبود سیستم های ارسال سریع تر و تکنولوژی های سوییچینگ سریع تر بوده اند. پیدایش تکنولوژی های فیبرهای نوری همچون همتافتگری تقسیم طول موج با چگالی بالا (DWDM)، همتافتگرهای اضافه کننده - کاهش دهنده، و ... تاثیر بسیار زیادی بر روی پایین آوردن هزینه انتقال دیجیتال داشته است.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 298

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0
Writer: 

Moazzeni Sussan

Issue Info: 
  • Year: 

    2016
  • Volume: 

    1
Measures: 
  • Views: 

    230
  • Downloads: 

    127
Abstract: 

MOBILE IP IS A PROTOCOL TO SUPPORT THE MOBILITY OF A HOST, CHANGING ITS POINT OF ATTACHMENT TO THE INTERNET. THIS PROTOCOL INTRODUCES DIFFERENT MECHANISMS, TO SUCCESSFULLY ROUTE PACKETS DESTINED TO THE MOBILE NODE [5]. BUT, SOME OF THESE INTRODUCED MECHANISMS SUFFER FROM THE LACK OF PROPER EFFICIENCY. ONE OF THESE MECHANISMS IS TRIANGLE ROUTING. IN THIS METHOD; PACKETS ARE ROUTED TO THE HOME NETWORK OF MN AND THEN TUNNELED TO MOBILE NODE (MN) BY HOME AGENT (HA) [1]. THIS INDIRECT ROUTING IS FAR FROM OPTIMAL, BECAUSE OF THE EXISTENCE OF GREAT DELAY IN DELIVERY OF THE PACKETS TO MN. ROUTE OPTIMIZATION IS A PROTOCOL TO OVERCOME DELAY IN TRIANGLE ROUTING. IN ROUTE OPTIMIZATION, MN INFORMS CORRESPONDENT NODE (CN) WITH ITS CURRENT LOCATION AND THEN, THE PACKETS ARE DIRECTLY SENT TO MN BY CORRESPONDENT NODE [1], [4]. IN THIS SIMULATION, WE HAVE COMPARED LINEAR AND STAR TOPOLOGIES WITH & WITHOUT ROUTE OPTIMIZATION. WE HAVE USED NETWORK SIMULATOR (NS) AND MOBIWAN, TO VERIFY SIMULATION RESULTS [2], [3]. IT IS NOTICEABLE THAT, DIFFERENT SIMULATIONS REGARDING DELAY PERFORMANCE OF ROUTE OPTIMIZATION, HAVE BEEN DONE BY DIFFERENT GROUPS, BUT MOST OF THEM HAVE USED UNREAL TOPOLOGY MODELS. TOPOLOGY MODEL HAS IMPORTANT EFFECTS ON RESULTS OF THE SIMULATION. GT-ITM MODEL HAS BEEN USED IN OUR TOPOLOGIES FOR HAVING A BETTER JUDGMENT ON PERFORMANCE OF ROUTE OPTIMIZATION. FEATURES OF THIS MODEL WILL BE DISCUSSED IN THIS PAPER [6]. BY EVALUATING THE RESULTS OF THE SIMULATION, WE FOUND THAT, JITTER IS NOT JUST THE FUNCTION OF ROUTE OPTIMIZATION. THE STRUCTURE OF TOPOLOGY ALSO, HAS SOME IMPORTANT EFFECTS ON IT. FINALLY WE CONCLUDED THAT, ROUTE OPTIMIZATION STRATEGIES IN STAR TOPOLOGY, REDUCES JITTER, BUT THE SAME STRATEGIES IN LINEAR MODEL INCREASE JITTER. NOTE THAT ROUTE OPTIMIZATION IMPROVES DELAY, REGARDLESS OF THE TOPOLOGY USED.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 230

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 127
Issue Info: 
  • Year: 

    2008
  • Volume: 

    7
  • Issue: 

    -
  • Pages: 

    0-0
Measures: 
  • Citations: 

    1
  • Views: 

    141
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 141

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Writer: 

VOSOUGHI NIRI IRAJ

Issue Info: 
  • Year: 

    2006
  • Volume: 

    12
Measures: 
  • Views: 

    180
  • Downloads: 

    91
Abstract: 

THROUGH LABORATORY AND FIELD MEASUREMENTS OF SOME SELECTED SAMPLES OF THE STUDY AREA AND BY NUMERICAL CALCULATION, A GEOPHYSICAL MODEL AT THE TANGHUPING DISTRICT WAS BUILT. GRADIENT AND POLE-DIPOLE DUAL-FREQUENCY IP WERE USED TO ACQUIRE DATA. INTERPRETATION OF THE PROCESSED DATA SHOWS A PROSPEROUS GOLD MINERALIZATION ZONE IN THE EAST OF THE STUDY AREA.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 180

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 91
Issue Info: 
  • Year: 

    2018
  • Volume: 

    8
  • Issue: 

    4
  • Pages: 

    249-261
Measures: 
  • Citations: 

    0
  • Views: 

    2981
  • Downloads: 

    0
Abstract: 

Application of sunscreens is one of the most important ways for skin Protection against sunburn, early skin aging and skin cancer.Due to variety of sunscreen products, it is necessary to assure their Protection ability against the suns damages. Performance assessment of sunscreens against UVB expressed by sun Protection factor. Due to great cost of determination methods of this factor in foreign countries, developing a comprehensive protocol for in vivo SPF determination in Iran would have distinct benefits.In this study four international standards have been reviewed and compared for Sun Protection Factor (SPF) determination including ISO24444, FDA2011, AS/NZS 2604: 2012 and CEN 2006. The general process of in vivo SPF determination is similar in these protocols but there are some obvious differences in details that leading to advantages and disadvantages for each of them.In this study a complete document were collected, then regarding to available facilities and with cooperation of Iran food and drug organization a comprehensive in vivo SPF determination protocol will be developed.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 2981

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 1
Issue Info: 
  • Year: 

    1395
  • Volume: 

    1
Measures: 
  • Views: 

    524
  • Downloads: 

    0
Abstract: 

امروزه تحولات عظیمی در تکنولوژی بوقوع پیوسته و شاهد انقلابات بزرگ در زمینه فن آوری ارتباطات فراملی طی چند دهه اخیر بوده ایم. اینترنت علیرغم تمامی امکانات و اطلاع رسانی در عرصه بین المللی که برای ما به ارمغان آورده است متاسفانه باعث شده است که بعضی از افراد سودجو و فرصت طلب با فرا گرفتن دانش و مهارت لازم، راههای ورود به سیستم های کامپیوترهای دولتی، خصوصی و... را به دست آورده و موجب بروز مشکلات و خسارات فراوانی گردیده اند...

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 524

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0
Author(s): 

CAO FENG | JENNINGS CULLEN

Issue Info: 
  • Year: 

    2006
  • Volume: 

    1
  • Issue: 

    -
  • Pages: 

    0-0
Measures: 
  • Citations: 

    1
  • Views: 

    120
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 120

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

KEROMYTIS ANGELOS D.

Issue Info: 
  • Year: 

    2009
  • Volume: 

    -
  • Issue: 

    -
  • Pages: 

    0-0
Measures: 
  • Citations: 

    1
  • Views: 

    142
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 142

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button