Search Results/Filters    

Filters

Year

Banks




Expert Group











Full-Text


Author(s): 

Zerang Mohammad

Issue Info: 
  • Year: 

    2023
  • Volume: 

    28
  • Issue: 

    103
  • Pages: 

    173-200
Measures: 
  • Citations: 

    0
  • Views: 

    40
  • Downloads: 

    6
Abstract: 

Unauthorized Acquisition of military Computer Data causes acquisitive to use them for cyberattacks on military infrastructures, which in practice may destroy vital military systems such as offensive systems. And the defense will come. The legislator in paragraph (a) of Article 731 of the Islamic Penal Code has only provided for the Acquisition of secret Data in general, and there is no explicity about criminal title "Unauthorized Acquisition of Computer Data" in Article 131 of the Criminal Code of the Armed Forces. The importance and sensitivity of military Computer Data requires appropriate measures to be established both in the field of criminalization and punishment. In this research, how is Iran's criminal policy regarding the Unauthorized Acquisition of military Computer Data and whether there is a significant gap and deficiency in this regard or if there are other laws, such a defect or gap will be ruled out. It will be paid. The present study, while examining the relevant articles in the Criminal Law of the Armed Forces and the Law of Computer Crimes, using a descriptive-analytical method and based on library sources, concludes that Iran's criminal policy regarding the Unauthorized Acquisition of military Computer Data Both classified and unclassified by military and civilian persons, they did not enjoy the principle of deterrence and the principle of proportionality of crime and punishment, in this regard, there is a need for amendment and legal gaps that require the provision of measures that are appropriate to the importance of the Data. There are military Computers that have been presented in this direction.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 40

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 6 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

OMID M. | SHAFAEI A.

Journal: 

Issue Info: 
  • Year: 

    2004
  • Volume: 

    17
  • Issue: 

    3 (64 IN AGRONOMY AND HORTICULTURE)
  • Pages: 

    67-73
Measures: 
  • Citations: 

    0
  • Views: 

    1669
  • Downloads: 

    0
Abstract: 

In order to control greenhouse environment, a Computer-based control and monitoring system was designed and implemented. Performance of the system was evaluated by installing it in a constructed model greenhouse. The greenhouse has a floor area of 8m2, covered with 200 ?m polyethylene film. The set of experiments were carried out during December 2003 in the city of Karaj. The simulation results achieved for the air temperature and relative humidity are shown. The results indicate that the outside temperature is always less than the inside one, because the solar radiation entered the greenhouse through transparent plastic. This is a further confirmation of greenhouse effect. The fluctuations in temperature inside the model greenhouse during observation time were recorded. These fluctuations were affected by natural conditions such as surface evaporation within the greenhouse, solar radiation and ambient temperature and weather changes. Also, it was found that the rate of change of temperature in the upper part, i.e. near the plastic cover, is higher than that of the height of plants. This rise of vertical temperature is due to receiving solar incident radiation.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1669

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2022
  • Volume: 

    43
  • Issue: 

    1 (99)
  • Pages: 

    165-170
Measures: 
  • Citations: 

    0
  • Views: 

    109
  • Downloads: 

    0
Abstract: 

This research uses the portable HPGe and NaI(Tl) detectors for Compton continuum suppression. In the List mode Data Acquisition technique, we did not use timing module and complicated experimental setup that recorded the time stamp of each event. The maximum suppression factor (SF) in Cs-137 point source was 3. 8. By using this technique, we can detect samples that contain very low radioactivity. The experimental setup in this research was based on analog nuclear electronic modules. The study's main goal was the ability of list-mode Data Acquisition in Compton continuum suppression. In this way, lower levels of radioactivity can be detected in any sample.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 109

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

Legal Research

Issue Info: 
  • Year: 

    2020
  • Volume: 

    23
  • Issue: 

    90
  • Pages: 

    107-132
Measures: 
  • Citations: 

    0
  • Views: 

    414
  • Downloads: 

    0
Abstract: 

Computer Data is flowing in cyber space regardless the national borders. In many cases Data related to crimes as electronic evidence is not accessible in territory of crime prosecuting state. In these cases, success in prosecuting the crimes requires the access of trans-border Data related the crime. Traditionally this access is possible through mutual legal assistance between states based on acquiring consent of the state where the Data is stored. This approach is leaded by territorial sovereignty principle but is not preparing the enough speed for gathering electronic evidence. Nowadays states access the Data directly and without acquiring consent of the state where Data is stored. This direct access to Data has been accepted by some of the international frameworks in specific conditions. In spite of this, there is not international unique method for accessing to trans-national Data. Each of the trans-border access methods has advantages and disadvantages which should be considered in initiating a new international frame by states.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 414

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2023
  • Volume: 

    21
  • Issue: 

    1
  • Pages: 

    27-38
Measures: 
  • Citations: 

    0
  • Views: 

    156
  • Downloads: 

    30
Abstract: 

With the development of telecommunication and communication technologies, especially wireless communications, information cryptography is one of the communication necessities. Today, cryptographic algorithms are used to increase security and prevent DICOM medical images from Unauthorized access. It should be noted that changes in DICOM medical images will cause the doctor to misdiagnose the patient's treatment process. In this paper, a type of hybrid cryptographic algorithms is designed. In the proposed algorithm, DNA encryption algorithm is used to encrypt DICOM images and patient biometric information such as fingerprint or iris image is used to make digital signature and validate DICOM medical images. The designed encryption algorithm is resistant to brute force attacks and the entropy of the encrypted DICOM images is above 7. 99.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 156

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 30 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

KARIMI H. | GHOLAMI A.

Issue Info: 
  • Year: 

    2015
  • Volume: 

    41
  • Issue: 

    2
  • Pages: 

    177-191
Measures: 
  • Citations: 

    0
  • Views: 

    954
  • Downloads: 

    0
Abstract: 

In the current seismic Data Acquisition techniques, sources are fired with large time intervals in order to avoid interferences between the responses of successively firing sources, measured by the receivers. This leads to a time-consuming and expensive survey. Theoretically the waiting time between two successively firing sources has to be infinite, since the wavefield never vanishes completely. However, in practice this waiting time varies from a few seconds (s) up to 30 s. This means that the source responses are negligible after the waiting time. As an example, within the time interval of 200 s, 40 source locations can be fired with 5 s waiting time, or 20 source locations can be fired with 10 s waiting time. Since decision making at the business level are usually based on minimizing the Acquisition costs, the source domain is usually poorly sampled to limit the survey duration, causing spatial aliasing (Mahdad, 2011). On the other hand, modifying the waiting times brings flexibility in the source sampling and the survey time. The concept of simultaneous or blended Acquisition is to address the aforementioned issues by either reducing the waiting time between firing sources, leading to reduced Acquisition costs, or by increasing the number of sources within the same survey time, leading to a higher Data quality. Note that a combination of the two approaches combines these benefits. The price paid for achieving higher Data quality at lower Acquisition cost is dealing with the interfered Data, called blended Data, which are acquired in the blended Acquisition. But in order to precede further processing and imaging algorithms, one needs to first breakdown the blended Data into its original components (single source responses) by a processing step called deblending. It is a try to retrieve the Data as if they were acquired in a conventional, unblended way. In this paper, we introduce the concept of simultaneous Acquisition and examine three methods of deblending:1) The least-squares method (Pseudo-deblending) which perfectly predicts the blended Data but its solution suffers from the interference noises related to the interfering sources in the observations, the so called blending noises (crosstalk noises). These noises have different characteristics in different domains of the Data. For example, in the common-mid-point (CMP) domain they are incoherent and spike-like and thus can be tackled by a denoising algorithm.2) Noise attenuation by multidirectional vector-median filter (MD-VMF). It is a generalization of the well-known conventional median filter from a scalar implementation to a vector form. More specifically, a vector median filter is applied in many trial directions and then the median vector is selected.3) Regularization of deblending operator matrix. Deblending is by itself an underdetermined and thus ill-posed problem; meaning that, there are infinitely many solutions for the deblending problem. Therefore, constraints are necessary to solve it. A possible way is spatially band-limiting constraints which are useful when the sources are densely sampled. It has been shown that under such constraints, the deblending operator matrix can be regularized to form a well behaved direct deblending operator.Finally, by observing the wavefield from deblended synthetic and field Data we conclude that, regularization of the belending operator matrix is reliable because of its accuracy in noise attenuation and keep the signal and speed of the algorithm.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 954

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

GOLNABI H. | AZIMI P. | POSEH G.H.

Journal: 

Scientia Iranica

Issue Info: 
  • Year: 

    2007
  • Volume: 

    14
  • Issue: 

    5
  • Pages: 

    467-473
Measures: 
  • Citations: 

    0
  • Views: 

    357
  • Downloads: 

    282
Keywords: 
Abstract: 

The goal of this paper is to describe a simple method for the automated Data Acquisition and analysis of Data taken by programmable instruments. Device controls and communication method are explained and some typical illustrative examples showing the potential applications of the method in real experiments are presented. This method offers a quick and flexible way to control many instruments by using a multi-device arrangement of a stacking method in a parallel operation. The General-Purpose Interface Bus (GPIB) is used here for remote control of the devices. By using Excel and Visa interactive programs and using GPIB interface, easy communication and Data transfer between instruments and a PC is accomplished. A special probe system is devised for the small resistant measuring experiments and the DC resistance measurements are performed by using the four-probe method. The related temperatures are measured by using a silicone diode as a resistance thermometer detector. Using this Data Acquisition method, short circuit voltage measurement, resistance measurements and the temperature dependence of resistance for a thin platinum wire are reported.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 357

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 282 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 1
Author(s): 

BERANGI R.

Issue Info: 
  • Year: 

    2005
  • Volume: 

    16
  • Issue: 

    3
  • Pages: 

    9-13
Measures: 
  • Citations: 

    0
  • Views: 

    603
  • Downloads: 

    0
Abstract: 

This article analyses different design issues of digital to analog interfacing for the uplink of a mobile communication system with smart antennas in the context of third generation (3G) mobile communication systems. The work initially targets a smart antenna test bed with non-real time processing, but the results can be employed for both real time and none-real time cases. The article also presents the novel idea of calculating the required quantization levels based on the combination of clipping and quantization noise.      

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 603

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

CHENG FA F.L.

Issue Info: 
  • Year: 

    2003
  • Volume: 

    -
  • Issue: 

    2
  • Pages: 

    8-10
Measures: 
  • Citations: 

    1
  • Views: 

    137
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 137

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Writer: 

ESMAEILI SOBHAN

Issue Info: 
  • Year: 

    2017
  • Volume: 

    1
Measures: 
  • Views: 

    169
  • Downloads: 

    0
Abstract: 

THE APPLICATION OF A WIRELESS SENSOR NETWORK (WSN) IS MOSTLY LIMITED BASED ON THE LIFETIME OF SENSORS USED IN IT AND THE LIFETIME OF A SENSOR NODE IS BASICALLY RELATED TO THE VOLUME OF Data SENSED, PROCESSED AND PUBLISHED BY THE NODE. CONSIDERING THAT ONE OF THE MAJOR ISSUES IN WIRELESS SENSOR NETWORKS IS THE ISSUE OF ENERGY CONSTRAINTS, TODAY, VARIOUS METHODS ARE PROPOSED RELATED TO THE OPTIMIZATION OF ENERGY CONSUMPTION IN WIRELESS SENSOR NETWORKS AND IN THIS PAPER, WE ARE INTENDED TO INVESTIGATE AND COMPARE THESE METHODS. AT THE END, WE PROPOSE A METHOD BASED ON NEURAL NETWORKS AND DISCUSS ITS EFFECT AS AN EFFICIENT TOOL ON REDUCING ENERGY CONSUMPTION IN ALL FIELDS OF TASKS CYCLE, Data-DRIVEN METHODS AND MOBILITY-BASED METHODS.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 169

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button