Search Results/Filters    

Filters

Year

Banks



Expert Group






Full-Text


Writer: 

Khodayaran Ali

Issue Info: 
  • Year: 

    2022
  • Volume: 

    5
Measures: 
  • Views: 

    48900
  • Downloads: 

    173
Abstract: 

Multiprotocol Label Switching is the protocol framework on which the attention of network service provider is focused as it provides privacy and unbreakable security to the users. So, it is used by ISP Backbone Network to form the MPLS Tunneling architecture like MPLS VPN which is discussed in this paper. Providers typically offer this type of service to large corporate customers that require IP connectivity of other remote sites. The main advantage is that MPLS is used over Layer 2 and Layer 3 protocols. It also discusses the concept of Traffic Engineering that utilizes Multiprotocol Label Switching and that also proves to be advantageous over IP based Routing. This Paper also discusses various Encryption Techniques which can be used for the security of MPLS Technology.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 48900

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 173
Author(s): 

XIA J.B. | LI M.H. | WAN L.J.

Issue Info: 
  • Year: 

    2008
  • Volume: 

    1
  • Issue: 

    -
  • Pages: 

    0-0
Measures: 
  • Citations: 

    1
  • Views: 

    159
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 159

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2022
  • Volume: 

    8
  • Issue: 

    4
  • Pages: 

    105-113
Measures: 
  • Citations: 

    0
  • Views: 

    49
  • Downloads: 

    8
Abstract: 

Earthquake is one of the most dangerous natural disasters of the present age, which has always shown its importance objectively. An earthquake is a natural disaster that, depending on its magnitude, can cause massive catastrophes in a short time. In this study, the authors seek to provide a simple analytical form for the propagation speed of waves, which despite previous studies, has not received much attention. Therefore, the purpose of this paper is to extract and present a model for earthquake wave velocity changes ( VPN) using Genetic Algorithm (GA).Research Methods The data used in this study were received from the National Seismological Center of the Institute of Geophysics, University of Tehran. In this study, three provinces of Kermanshah, East Azerbaijan and Kerman were selected. Earthquake event characteristics of each of these three provinces in the period between 2006 and the end of 2018, with a focal depth of up to 30 km and magnitude between 4 and 8 were selected. In order to use the Genetic Algorithm (GA), first the data received from the National Seismological Center for these three provinces were merged, which was estimated at 1863 earthquake events. After extracting the relevant data, the earthquake wave velocity (VPN ) was calculated. Then, ignoring about 25% of this data, a mathematical model for earthquake velocity was extracted. Finally, the obtained formula was applied to the initial ignored data (25%), which had similar results. To model the changes in wave velocity according to distance changes, a mathematical relation was considered as an exponential function and the unknown parameters of the model were determined using a Genetic Algorithm (GA). To find a suitable model between distance and speed, the following relation is considered for it.V(X)=a+b-kX                                                                                                                                                        (1)         In this regard, a, b and k are constant coefficients and x is the distance from the earthquake site in terms of one thousand kilometers. In the above equation, the coefficients must be determined so that the output of this model with the recorded data has the least amount of error. For this purpose, the Genetic Algorithm (GA) optimization method is used, and the error between the model output and the actual data was considered as the objective function of the optimization problem, and the optimization variables were determined with the aim of minimizing this objective function. The objective function is defined as follows:                                                                                                                                        (2)In this connection,Vi is the velocity obtained as a measure and V(Xi) the amount of speed obtained according to the Equation (1). For implementation, the Genetic Algorithm (GA) has been used 2000 populations and 30 generations. Also the coefficient of crossover is equal to 70% and coefficient mutation is equal to 2%. The output of the model for training and test data showed that the proposed model has acceptable accuracy for modeling the velocity of longitudinal waves. This model can be used to determine the arrival time of waves of an earthquake to different points. It is also possible to estimate the location of the earthquake by recording the occurrence of the earthquake at several different points and using the provided relationship.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 49

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 8 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2009
  • Volume: 

    3
  • Issue: 

    1 (8)
  • Pages: 

    33-43
Measures: 
  • Citations: 

    0
  • Views: 

    1748
  • Downloads: 

    0
Abstract: 

The expansion of Internet, increases the number of users and applications. Having higher speed and better quality are the main chalanges of computer network development. Using MPLS and proper traffic design, it is possible to improve the quality of service and reduce the possibility of congestion. It is possible to use MPLS in a BGP/MPLS VPN network for data transmition. In this paper we explain BGP/MPLS VPN and we implement an MPLS network based on Diffserv over VPN services. Using OPNET various senarios are simpulated. In most of the previous proposed systems, with incressing the number of low traffic priority sources like BE and AF, higher priority traffic like EF faces difficulty. Our simulation shows with using traffic engineering, congestion control for low priority sourses and management methods, it is possible to have better quality of services for those traffics which are sensitive to delay.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1748

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 4
Issue Info: 
  • Year: 

    1392
  • Volume: 

    28
Measures: 
  • Views: 

    489
  • Downloads: 

    0
Abstract: 

لطفا برای مشاهده چکیده به متن کامل (pdf) مراجعه فرمایید.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 489

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0
Issue Info: 
  • Year: 

    2023
  • Volume: 

    15
  • Issue: 

    2
  • Pages: 

    203-232
Measures: 
  • Citations: 

    0
  • Views: 

    88
  • Downloads: 

    0
Abstract: 

Background and objectives: In order to protect Iranian users in cyberspace, in recent years, some social networks such as Facebook and Telegram have been filtered by the relevant authorities of our country. But still some users use filtered networks in different ways and using tools such as VPNs. The present research was conducted with the aim of investigating the effect of social network filtering policies on the general sense of security of users.Methodology: The present research was conducted in a quasi-experimental way. The method of data collection was field study and the tool was a researcher-made questionnaire. The statistical population of the research was 402,453 citizens aged 18 to 65 living in the 22nd district of Tehran in 2015, and 384 people were selected for the sample size based on Cochran's formula.Findings: The use of tools such as VPN and the use of unethical sites and undesirable content in cyberspace can affect the sense of identity, collective, cultural and intellectual security of users.Results: The results showed that the policy of filtering social networks has not only led to an increase in the public security of users who have not used VPN, but to some extent, it has also provided a sense of public security in some of the users who have used VPN.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 88

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2014
  • Volume: 

    1
  • Issue: 

    1
  • Pages: 

    26-30
Measures: 
  • Citations: 

    0
  • Views: 

    321
  • Downloads: 

    101
Abstract: 

Primary systemic vasculitis in pre-capillary arteries is associated with peripheral neuropathy. In some types of systematic vasculitis about 60% of patients have peripheral nervous system (PNS) involvement. In vasculitic peripheral neuropathies (VPN) a necrotizing and inflammatory process leads to narrowing of vasa nervorum lumen and eventually the appearance of ischemic lesions in peripheral nerves. Some features might be suggestive of VPN, like: axonal nerve degeneration, wallerian-like degeneration, and diameter irregularity of nerve.Peripheral nervous system (PNS) destruction during systemic vasculitides should be considered, due to its frequency and early occurrence in vasculitis progression. The first line treatment of non systematic VPNs is corticosteroid agents, but these drugs might worsen the VPNs or systemic vasculitis.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 321

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 101 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2013
  • Volume: 

    2
Measures: 
  • Views: 

    127
  • Downloads: 

    70
Keywords: 
Abstract: 

VITEX PSEUDO-NEGUNDO (VPN) AND CALOTROPIS PERSICA (CP) ARE THE NATIVE PLANTS IN THE NORTHEAST AND SOUTH OF IRAN. IN THE PRESENT STUDY, AFTER COLLECTING AND DRYING THE SEEDS, ESSENTIAL OIL EXTRACTED BY STEAM DISTILLATION AND THEN ANTI-MICROBIAL EFFECTS OF...

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 127

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 70
Issue Info: 
  • Year: 

    2022
  • Volume: 

    8
Measures: 
  • Views: 

    162
  • Downloads: 

    0
Abstract: 

With growing use of internet and online applications, network traffic classification could be much more useful nowadays, because managing network services and quality assurance, two key points in network structure, could be done easily using this kind of classification. Different methods are used for this task, including port-based classification, machine learning and some other algorithms that each of them had its own advantages and disadvantages. For eliminating such disadvantages, deep learning methods are new ways for doing this task due to the power and excellent performance they showed. Furthermore, most of the work done in this field are using non-encrypted traffic or encrypted traffic in mobile networks, but as we know, privacy of data is very important these days. In this article, with the use of deep learning neural network, encrypted traffic of non-mobile data is being classified. For this purpose, we use the UNB ISCX VPN-non-VPN dataset that includes encrypted and unencrypted traffic of different applications. Then we design an algorithm based on DNN that could classify these traffics effectively. Performance of the model was evaluated and 0. 86 accuracy and 0. 78 f1-score showed that model works well compared to other algorithms used in this area.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 162

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button