Search Results/Filters    

Filters

Year

Banks




Expert Group











Full-Text


Journal: 

Issue Info: 
  • Year: 

    2021
  • Volume: 

    20
  • Issue: 

    47
  • Pages: 

    243-257
Measures: 
  • Citations: 

    0
  • Views: 

    161
  • Downloads: 

    67
Abstract: 

Humans communicate with each other through words and convey the Message to the audience, in principle, words are understood by customary meanings. In the case of non-compliance with this principle, communication will confront problems, simultaneously the convey of meanings will face difficulties, and understanding the objectives will not be simply possible. Whereas the legislature aims to adopt regulations to regulate social relations, it is expected that the legislature observes the minimal principles of literature not only for choosing the words but for the way of writing them. In this study, the descriptive-analytical method is used and this question is examined that to what extent the Electronic Commerce Law has succeeded in using words and observing the fundamental principles of literature. Despite the significance of the Law, it seems that the legislator has not been succeeded in applying the rules and principles of writing. In particular, the failure is evident in the section of definitions, since some words are selected which seem pleonasm, and some words are defined which in part have an obvious meaning. Due to the weakness in passing the concepts on, in some parts of the Law the basic principles of literature are not used properly.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 161

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 67 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2011
  • Volume: 

    2
  • Issue: 

    2 (4)
  • Pages: 

    57-70
Measures: 
  • Citations: 

    0
  • Views: 

    1294
  • Downloads: 

    0
Abstract: 

In recent years, Cyber Warfare has been one of the most essential war scenes for intelligence and military organizations. As the volume of data is increased, data stream processing and data security would be the basic requirements of military enterprises. Although, by data encryption no one can have access to data contents, but adversaries can delete some records from data stream or add some counterfeit records in it without any knowledge about records contents. Such attacks are called integrity attacks. Because integrity control in DSMS is a continuous process, it may be categorized in passive defense activities. In this paper, we present a probabilistic auditing model for integrity control of received stream results via an unsecured environment. In our architecture, users and data stream owners are trusted and channels are unsecured. The server is considered a black box and auditing process is fulfilled by contribution between data stream owner and users. We exploit existing data Stream Management Systems (DSMS) without any modification. Our method has no significant cost on users side and detects integrity attacks accurately and rapidly. Correctness and convergence of our probabilistic algorithm is proved and our evaluation shows very good results.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1294

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2006
  • Volume: 

    1
  • Issue: 

    4
  • Pages: 

    421-439
Measures: 
  • Citations: 

    1
  • Views: 

    129
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 129

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

PRIVATE LAW

Issue Info: 
  • Year: 

    2018
  • Volume: 

    6
  • Issue: 

    23
  • Pages: 

    141-168
Measures: 
  • Citations: 

    0
  • Views: 

    1131
  • Downloads: 

    0
Abstract: 

Attribution of data Message, defined as appointing data Message to the originator, which is a portion of the security provision of electronic communication transactions has widely attracted attention of Electronic Commerce Act 1382, UNCITRAL Model Law on Electronic Commerce, United Nations Convention on the Use of Electronic Communications in Internet Contracts 2005 and many other similar ones. From the articles 18 to 21, Iran's Electronic Commerce Act, which are inspired by the article 13 of UNCITRAL Model law on Electronic Commerce, clarify the content of attribution of data Message in several cases, Act works on attribution of data Message subject and only determines criteria for distinguishing the conditions of attribution of data Message from the originator, for instance, according to the article 19 of Iran’s act, despite of not sending the data Message by originator, and also the principle of non- attribution of data Message, it is attributed to the originator, and in this path, it benefits from concepts that there are some ambiguities about them. In this regard, it has used concepts that either there are some ambiguities about their exact concept or their application. In this research, attempts have been made to analyze the articles 18 to 21 of Electronic Commerce Act of Iran and also obviating ambiguities of them.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1131

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

Legal Research

Issue Info: 
  • Year: 

    2022
  • Volume: 

    24
  • Issue: 

    96
  • Pages: 

    301-326
Measures: 
  • Citations: 

    0
  • Views: 

    490
  • Downloads: 

    0
Abstract: 

Today, one of the most commonly reasons use in claims, is electronic evidence. Due to being new this form of reasons, this question comes to mind that these types of reasons are new, or the template and form for the reasons proof of existence (in article 1285 civil law). If you choose second assumption, this question arises that this type of electronic Message used in the claim, the form and template what type reason (whether it is a circumstantial evidence or a document and so on) is. By investigating in the legal texts and examining the types of data Messages, it can be argued that electronic reasons is essentially as a template and form of the reasons proof of existence that can be regarded as a document or a circumstantial evidence unless in particular non-documentary reliable data Messages (such as recorded sound in black box of aircraft) that are not in template of the reasons proof of existence. That is, the new reason with its own specific proof burden, while not considered as a document, because of a reliable electronic record is not doubtful and undeniable.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 490

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2025
  • Volume: 

    22
  • Issue: 

    2
  • Pages: 

    65-78
Measures: 
  • Citations: 

    0
  • Views: 

    3
  • Downloads: 

    0
Abstract: 

With the rapid rise of cybersecurity threats and the increasing complexity of digital security, event log data serves as a critical source for identifying and analyzing cyberattacks and threats. This data provide key insights into system activities, essential for detecting unauthorized intrusions, analyzing suspicious behaviors, and conducting security investigations. However, any alteration or tampering with the data can disrupt the analysis and detection processes, leading to incorrect security decisions. Blockchain technology, with its unique features such as decentralization, immutability, and transparency, has been recognized as a reliable and secure platform for storing and protecting data. This technology enables the storage of data hashes in a way that any changes can be easily detected. However, directly storing the vast volume of event log data on the blockchain faces challenges such as high costs and storage space limitations. In this research, an innovative model has been presented to automate the assurance of event log data integrity and confidentiality using the public Ethereum blockchain and smart contracts. Instead of storing event log data directly, only their hashes have been saved on the blockchain. This approach not only reduces storage costs but also ensures data confidentiality. The automated data integrity assurance process in this model occurs in two stages: Stage One: Event log data hashes have been periodically stored on the blockchain and compared with previous hashes. Stage Two: Over longer intervals, all stored hashes have been reviewed and validated to prevent any potential tampering. In this study, the costs associated with implementing this model on the Ethereum Sepolia test network had been precisely calculated. The analysis indicates that operational costs and computational overhead have been optimized across different time intervals, demonstrating the model's feasibility for large-scale deployment. Ultimately, this research tries to introduce a novel and practical model, taking a significant step toward automating the assurance of event log data integrity and confidentiality, providing a reliable solution for real-world applications.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 3

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Title: 
Author(s): 

TOGHYANI E. | MOKHTARI KH.

Issue Info: 
  • Year: 

    2011
  • Volume: 

    NEW
  • Issue: 

    28 (25)
  • Pages: 

    139-155
Measures: 
  • Citations: 

    0
  • Views: 

    1000
  • Downloads: 

    0
Abstract: 

Investigation of poems written by Persian litreture high ranking poets and even world litreture such as Ferdowsi. Nezami, saadi, Molavi. Hafez, sepehri, Shakes pear, T.s. Elliot, Jobran khalill Jobran and others shows that in fauaurable artistic and literary works, elements such as imagination, beauty, innovation style and Message have a basic role in their attraction and desirability and mean while the Message of the artistic and or literary word which is affered based on a special world view, influnces more and better than other element on addressees.Parvin Etesami (1258 - 1320), esteemed and able persion contemporary poet is among those poets that her simple expressive, attractive and lovely poems / words influence extraordinarily on her addressees and penetrate in their heart and soul agreeable and marvelously.It seems that such deep influences are more due to valuable Message and theme hidden beyond this high ranking poets affective and beautiful words. Besides, attention to literary arrangement and fluent skills also is not of less importance in this in fluence on addressees.In this study, the writers have decided to investigate and analayze moral, Social, educational and training them of parvin poems and also To determine how much her poems oriented Message and theme. have roles in attracting the addresses and what is the correlation of this theme with exogenous elements of poem such as beauty, imagination, style. Innovation and etc and with what amount.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1000

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

ELECTRONIC INDUSTRIES

Issue Info: 
  • Year: 

    2016
  • Volume: 

    6
  • Issue: 

    4
  • Pages: 

    5-11
Measures: 
  • Citations: 

    0
  • Views: 

    1481
  • Downloads: 

    0
Abstract: 

The human face of evil and criminal incidents in life is unavoidable, and mankind is always in need of understanding their environment. The use of systematic methods to identify, detect and prevent crime in society to reach a resolution mass analysis is increasing. Due to the expansion and development of information systems in organizations, In this paper we use data mining techniques to analyze crime data set in databases has been. Using tools and data mining algorithms to the complex nature of the crime, Crime and the subtle relationship s between data models and identify crime patterns, to detect and prevent. Classification algorithms optimized model to predict future characteristic s of the crimes committed and clustering algorithms to identify the type of crime the data sets were collected.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1481

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

MOHAMMADZADEH ASL N.

Issue Info: 
  • Year: 

    2002
  • Volume: 

    2
  • Issue: 

    5
  • Pages: 

    73-100
Measures: 
  • Citations: 

    2
  • Views: 

    3496
  • Downloads: 

    0
Keywords: 
Abstract: 

The neoclassical growth model is tested by use of panel data procedure in this research. In the econometric test, simoultanously time series and cross detection will be compared on the basis of panel data method through which their observed points increase and consequently the estimation efficiency will be increased. The examination of neoclassical growth theory has been done with reference to external & internal factors of 52 selected countries from 1960 to 2000. The independent variable of model has been selected on the basis of the result of previous research which explains the result in three separate models: developed countries, developing countries, and whole countries. These factors are such as: Gross National Products with lag of period, work force age, growth rate, education level, the change of capital accumulation and economic trade volum. The consequences of this research is that: neoclassical growth model can explain the major part of economic growth of the countries with use of internal variables. Also with the use of panel procedure of fixed effect, we can see the fundamental differences and structure of the growth process for different countries; and show how the economic, and social conditions affect on the growth.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 3496

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 2 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2020
  • Volume: 

    1
  • Issue: 

    2
  • Pages: 

    1-16
Measures: 
  • Citations: 

    0
  • Views: 

    634
  • Downloads: 

    0
Abstract: 

IoT can be used for many applications in various fields. The field of health will be one of the main applications of the Internet of Things in the future. However, if the IoT is fully implemented in the field of health, we will face many challenges, one of which is data integrity. data integrity assures us that any data sent by the sender, the same data is received by the recipient without any changes. In this paper, a integrity data control protocol based on space and time chaos theory is proposed to be used in the smart health network. In the proposed protocol, the process of integrity control takes place in two phases of sequence sharing and data exchange. In the sequence sharing phase, the parties to the secure exchange of identity information using a space-time chaos model generate a common sequence series, according to this sequence series the sending time of validation packages in the data exchange phase will be determined. The performance of the proposed method has been evaluated from different aspects and its efficiency has been compared with the traditional data integrity control protocol. Reducing time complexity, reducing closed overhead, and reducing energy consumption compared to the traditional data integrity control protocol are some of the benefits of the proposed method. The results also show that the proposed method is safe against all types of attacks and can be used as an efficient integrity control system in real applications.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 634

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button