Search Results/Filters    

Filters

Year

Banks




Expert Group











Full-Text


Issue Info: 
  • End Date: 

    آبان 1373
Measures: 
  • Citations: 

    3
  • Views: 

    327
  • Downloads: 

    0
Keywords: 
Abstract: 

برای دستیابی به افزایش درصد موفقیت «I.V.F» به کارگیری روش های مختلف تحریک تخمگذاری از جمله استفاده از «آگونیست های GnRH» متداول است. مشکل بعدی ناشی از تاثیرات نامطلوب به علت مدت طولانی مصرف این داروست که پژوهشکده «رویان» برای کاهش مدت استفاده از این دارو همراه با اثربخشی بیش تر، حدود 100 بیمار را بر اساس پروتکل «Long, Short» تحت مداوا قرار دادند و موادی از قبیل درصد دوزهای تحریک تخم گذاری، مواد آمپول های استفاده شده، درصد باروری و کیفیت تخمک مورد مقایسه قرار داده شد که با توجه به نتایج به دست آمده روش «Long Protocol» ارجح و در سایر موارد که از بیمار پاسخ مناسبی گرفته نشد به خصوص از نظر تعداد تخمک روش «Short Protocol» دارای انتخاب برتر می باشد.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 327

Author(s): 

HU Z.

Issue Info: 
  • Year: 

    2011
  • Volume: 

    -
  • Issue: 

    -
  • Pages: 

    0-0
Measures: 
  • Citations: 

    1
  • Views: 

    92
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 92

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2016
  • Volume: 

    7
  • Issue: 

    3
  • Pages: 

    183-191
Measures: 
  • Citations: 

    0
  • Views: 

    1008
  • Downloads: 

    0
Abstract: 

Nowadays, RFID technology is using widely in our daily lives. This technology is used in many applications such as healthcare, military, identifying friend or foe of fighter-aircraft and etc. In order to provide Security and privacy of RFID systems, different authentication Protocols have been proposed. Pang proposed a RFID authentication Protocol based on EPC C-1 G-2 standard. They claimed that their Protocol is secure against various attacks and provides user privacy. It is shown that Protocol proposed by pang is not safe and suffer from attacks such as tag ID exposure, tag impersonation, reader impersonation and de-synchronization. Also to enhance Security of RFID users, an improved version of this Protocol is proposed, showing that it is secure against aforementioned attacks. In addition, complexity and efficiency of the improved Protocol is compared with some similar ones and it is shown that the improved Protocol is completely secure. Eventually, Security of the improved Protocol is compared with some existed Protocols.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1008

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2023
  • Volume: 

    2
  • Issue: 

    3 (پیاپی 5)
  • Pages: 

    51-61
Measures: 
  • Citations: 

    0
  • Views: 

    192
  • Downloads: 

    26
Abstract: 

Purpose: Food Security is a critical global challenge that is influenced by research and innovation in the field. Therefore, the objective of this study is to analyze the scientific output of developing countries in food Security and examine its relationship with patents and Gross Domestic Product (GDP).Methodology: This applied research utilized the Scientometric approach. A total of 8,416 papers published between 1992-2023 in the field of food Security by developing countries were included in the study using citation databases from Clarivate Analytics. Additionally, patent registrations from the WIPO database and GDP data from the World Bank were analyzed. Information was collected through note-taking, and the data was analyzed using Pearson's correlation coefficient.Findings: The findings reveal an upward trend in the publication and citation of scientific outputs related to food Security in developing countries. China has higher numbers of papers, patents, GDP, and food production index compared to Iran, Japan, and South Korea. There is also a positive correlation observed between population and the number of papers, gross production and the number of papers, food production and the number of published papers, as well as the number of patents and papers citing scientific outputs of countries.Conclusion: These results highlight the significant relationship between increasing scientific output, GDP, the number of patents, and food Security. Greater emphasis on food Security contributes to enhanced scientific output, GDP, and innovation. Similarly, increasing scientific output, GDP, and innovation positively impact food Security in countries.Value: This study emphasizes the importance of scientific outputs in driving technological advancements, innovations, and ultimately, ensuring food Security in developing countries.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 192

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 26 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2022
  • Volume: 

    20
  • Issue: 

    1
  • Pages: 

    36-46
Measures: 
  • Citations: 

    0
  • Views: 

    576
  • Downloads: 

    0
Abstract: 

Today, with the ever-expanding IoT, information technology has led the physical world to interact more with stimuli, sensors, and devices. The result of this interaction is communication "anytime, anywhere" in the real world. A research gap that can be felt in addition to providing a multi-layered and highly secure Protocol (a Protocol that simultaneously performs authentication) and at the same time has a low computational burden. Therefore, in the field of health and treatment and for the purpose of remote monitoring of patients with physical and mental disabilities (such as patients with cerebral palsy and spinal cord amputation) there is an urgent need for a very safe Protocol. The Protocol we propose in this study is a two-layer Protocol called "Identification-Authentication" which is based on EEG and fingerprint. Also, our authentication step is the modified Diffie-Hellman algorithm. This algorithm needs to be modified due to a Security problem (the presence of a third person) that the proposed method is able to authenticate the patient with very high accuracy and high speed by receiving the patient's fingerprint and EEG signal. The proposed Protocol was evaluated using data from 40 patients with spinal cord injury. The implementation results show more Security of this Protocol, Validity of the proposed Protocol is checked and the processing time of authentication stage is decrease to 0. 0215 seconds.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 576

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2021
  • Volume: 

    9
  • Issue: 

    1
  • Pages: 

    25-36
Measures: 
  • Citations: 

    0
  • Views: 

    101
  • Downloads: 

    50
Abstract: 

Background and Objectives: Radio Frequency Identification (RFID) systems use radio frequency waves to exchange information between a legitimate sender and a receiver. One of the important features of RFID systems is to find and track a specific tag among a large number of tags. Numerous works have been done about authentication and ownership Protocols, but the number of researches done in the tag searching area is much less. Although Security is a paramount factor in search Protocols, but these days designers are looking for a secure search Protocol that is also low cost. One way to have a low cost search Protocol is that to be compatible with EPC C1G2 standard, which is an electronic product code class 1 generation 2 that works in the 860-960 MHz frequency range. Methods: Most recently, Sundaresan et al. have proposed an RFID tag search Protocol based on quadratic residues and 128-bit pseudo random number generators and XOR operation that can be easily implemented on passive tags and is compatible with EPC C1G2 standard. We show that this Protocol is not immune against tag tracing, and try to improve the Protocol in a way that traceability attack will not be applicable and the Protocol stays low cost and EPC compatible. Results: Since the problem in Sundaresan et al. 's search Protocol is due to the tag not being able to recognize the used queries from the new ones, we improved the Protocol using a counter within the queries, so the tag will realize that the query is used or not. Then we analyze the Security of the improved Protocol and prove its formal and informal Security against known attacks. Conclusion: In this paper, we firstly analyze the Security of Sundaresan et al. 's search Protocol and show that the search Protocol is vulnerable to traceability attack with two different scenarios. Then we propose an improved search Protocol that is secure against tracing the tags. Following that, we analyze the Security of the improved search Protocol.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 101

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 50 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

Roshd-e-Fanavari

Issue Info: 
  • Year: 

    2023
  • Volume: 

    19
  • Issue: 

    supp2
  • Pages: 

    1-13
Measures: 
  • Citations: 

    0
  • Views: 

    534
  • Downloads: 

    178
Abstract: 

Security in cloud computing is very important, cloud computing Security is a set of computer Security and network Security in general is information Security and when a processing task by using the virtual machine scheduling algorithm in the cloud for processing Unloading will be This virtual machine will not be able to distinguish the normal mobile user from attackers, thus violating the privacy and Security of the transmitted data, so after determining the unloading strategy, the China block can be used in information Security. And the information of each server is encapsulated and unloaded in the form of a block. In this research, a proposed solution is presented, which is the combination of China blockchain and cloud computing to increase Security and efficiency. The proposed solution is implemented and evaluated in order to evaluate its efficiency increase compared to other existing solutions.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 534

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 178 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

ELECTRONIC INDUSTRIES

Issue Info: 
  • Year: 

    2017
  • Volume: 

    8
  • Issue: 

    3
  • Pages: 

    145-149
Measures: 
  • Citations: 

    0
  • Views: 

    756
  • Downloads: 

    73
Abstract: 

These days, many researchers work on RFID EPC-C1 G2 authentication Protocols designing with the use of 16-bit PRNGs. However, thanks to short input/output length of such PRNG functions that makes it feasible to convert it, most of such Protocols are vulnerable against full secret disclosure attacks. Recently, Moradi et al. in [1] analyzed an EPC-C1 G2 authentication Protocol named 𝑆 𝑆 𝑆 𝑆 𝑆 𝑆 + and presented a revised version of the 𝑆 𝑆 𝑆 𝑆 𝑆 𝑆 + Protocol. In this paper, we show that unfortunately the revised version of 𝑆 𝑆 𝑅 𝑅 𝑅 𝑅 +Protocol, same as its predecessor i. e. 𝑆 𝑆 𝑆 𝑆 𝑆 𝑆 + Protocol, is still vulnerable against full secret disclosure attack. In the presented attack, adversary discloses all secrets of the Protocol only by eavesdropping one run of the Protocol, impersonating the reader in one run of the Protocol and doing only 3 × 216 off-line PRNG function evaluations.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 756

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 73 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    1394
  • Volume: 

    1
Measures: 
  • Views: 

    1033
  • Downloads: 

    0
Abstract: 

لطفا برای مشاهده چکیده به متن کامل (pdf) مراجعه فرمایید.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1033

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0
Author(s): 

ISLAM R. | GHOSH S.

Issue Info: 
  • Year: 

    2011
  • Volume: 

    1
  • Issue: 

    1
  • Pages: 

    0-0
Measures: 
  • Citations: 

    1
  • Views: 

    144
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 144

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button