Search Results/Filters    

Filters

Year

Banks




Expert Group











Full-Text


Issue Info: 
  • Year: 

    0
  • Volume: 

    8
  • Issue: 

    3 (ویژه نامه ناباروری 3)
  • Pages: 

    106-106
Measures: 
  • Citations: 

    0
  • Views: 

    851
  • Downloads: 

    0
Abstract: 

تکنولوژی جدید در زمینه ناباروری باعث شده است که برای درمان مردان عقیم که آزوسپرم بوده اند تحولی ایجاد نماید به طوری که اسپرم با تعداد محدودی که از طریق پونکسیون اپیدیدیم PESA یا با استخراج آن از نسج بیضه TESE حاصل می شود با روش میکرواینجکشن TCSI امکان باروری داشته باشد. لذا با توجه به موقعیت پیش آمده در درمان این افراد یافتن همان تعداد کم اسپرمها نیز اهمیت پیدا کرده است و از طرفی Silber مشخص کرده است که 50% موارد آزوسپرمی غیر انسدادی دارای کانونهای اسپرماتوژنر هستند. بنابراین چنانچه به روشهای مناسبی دسترسی پیدا کرد امکان یافتن تعداد کم اسپرم در بیماران و باروری وجود دارد. مطالعات مختلفی از نظر بیوفیزیکی و وضعیت ظاهری بیضه ها، میزان عروق آن، آزمایشات هورمونی، ایمونولوژی و همچنین چگونگی نمونه برداری انجام شده تا بهترین و موثرترین راه در مشخص کردن و استخراج اسپرم از بیضه شناخته شود.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 851

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2023
  • Volume: 

    17
  • Issue: 

    4
  • Pages: 

    31-44
Measures: 
  • Citations: 

    0
  • Views: 

    48
  • Downloads: 

    4
Abstract: 

The advent of cloud computing has made it simpler for users to gain access to data regardless of their physical location. It works for as long as they have access to the internet through an approach where the users pay based on how they use these resources in a model referred to as “pay-as-per-usage”. Despite all these advantages, cloud computing has its shortcomings. The biggest concern today is the security risks associated with the cloud. One of the biggest problems that might arise with cloud services availability is Distributed Denial of Service attacks (DDoS). DDoS attacks work by multiple machines attacking the user by sending packets with large data overhead. Therefore, the network is overwhelmed with unwanted traffic. This paper proposes an intrusion detection framework using Ensemble feature selection with RNN (ERNN) to tackle the problem at hand. It combines an Ensemble of multiple Machine Learning (ML) algorithms with a Recurrent Neural Network (RNN).  The framework aims to address the issue by selecting the most relevant features using the ensemble of six ML algorithms. These selected features are then used to classify the network traffic as either normal or attack, employing RNN. The effectiveness of the proposed model is evaluated using the CICDDoS2019 dataset, which contains new types of attacks. To assess the performance of the model, metrics like precision, accuracy, F-1 score, and recall are taken into consideration.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 48

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 4 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2015
  • Volume: 

    1
Measures: 
  • Views: 

    123
  • Downloads: 

    148
Abstract: 

THE SECURITY OF cloud COMPUTING IS THE MOST IMPORTANT CONCERNS THAT MAY DELAY ITS WELL-KNOWN ADOPTION. AUTHENTICATION IS THE CENTRAL PART OF SECURITY IN cloud COMPUTING MODEL, AIMING TO GUARANTEE THAT STORED DATA ARE PERMITTED TO BE ACCESSED ONLY BY VALID/CERTIFIED USERS. THERE ARE SEVERAL AUTHENTICATION SCHEMES THAT BASED ON USERNAME/PASSWORD, BUT THEY ARE CONSIDERED WEAK METHODS OF cloud AUTHENTICATION. IN THE OTHER SIDE, IMAGE’S DIGITIZATION BECOMES HIGHLY VULNERABLE TO MALICIOUS ATTACKS OVER cloud COMPUTING. IN THIS PAPER, WE PROPOSE TWO-FACTOR AUTHENTICATION SCHEME BASED ON IMAGE PARTIAL ENCRYPTION TO OVERCOME ABOVE AFOREMENTIONED ISSUES AND DRAWBACKS OF AUTHENTICATION SCHEMES. ADDITIONALLY, WE USE A FAST PARTIAL IMAGE ENCRYPTION SCHEME USING CANNY’S EDGE detection WITH SYMMETRIC ENCRYPTION IS DONE AS A SECOND FACTOR. IN THIS SCHEME, THE EDGE PIXELS OF IMAGE ARE ENCRYPTED USING THE STREAM CIPHER AS IT HOLDS MOST OF THE IMAGE’S DATA AND THEN WE APPLIED THIS WAY TO AUTHENTICATE VALID USERS. THE RESULTS OF SECURITY ANALYSIS AND EXPERIMENTAL RESULTS VIEW THAT THE PROPOSED SCHEME SUPPORTS AN EFFICIENT AND SECURE SCHEME FOR REAL-TIME IMAGE ENCRYPTION AND TRANSMISSION. ...

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 123

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 148
Issue Info: 
  • Year: 

    2023
  • Volume: 

    15
  • Issue: 

    Special Issue
  • Pages: 

    1-18
Measures: 
  • Citations: 

    0
  • Views: 

    28
  • Downloads: 

    7
Abstract: 

An administrator is employed to identify network security breaches in their organizations by using a Network Intrusion detection and Prevention System (NIDPS), which is presented in this paper that can detect and preventing a wide range of well-known network attacks. It is now more important than ever to recognize different cyber-attacks and network abnormalities that build an effective intrusion detection system plays a crucial role in today's security. NSL-KDD benchmark data set is extensively used in literature, although it was created over a decade ago and will not reflect current network traffic and low-footprint attacks. Canadian Institute of Cyber security introduced a new data set, the CICIDS2017 network data set, which solved the NSL-KDD problem. With our approach, we can apply a variety of machine learning techniques like linear regression, Random Forest and ID3. The efficient IDPS is indeed implemented and tested in a network environment utilizing several machine learning methods. A model that simulates an IDS-IPS system by predicting whether a stream of network data is malicious or benign is our objective. An Enhanced ID3 is proposed in this study to identify abnormalities in network activity and classify them. For benchmark purposes, we also develop an auto encoder network, PCA, and K-Means Clustering. On CICIDS2017, a standard dataset for network intrusion, we apply Self-Taught Learning (STL), which is a deep learning approach. To compare, we looked at things like memory, Recall, Accuracy, and Precision.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 28

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 7 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2025
  • Volume: 

    21
  • Issue: 

    2
  • Pages: 

    3663-3663
Measures: 
  • Citations: 

    0
  • Views: 

    7
  • Downloads: 

    0
Abstract: 

Building fixtures like lighting are very important to be modelled, especially when a higher level of modelling details is required for planning indoor renovation. LIDAR is often used to capture these details due to its capability to produce dense information. However, this led to the high amount of data that needs to be processed and requires a specific method, especially to detect lighting fixtures. This work proposed a method named Size Density-Based Spatial Clustering of Applications with Noise (SDBSCAN) to detect the lighting fixtures by calculating the size of the clusters and classifying them by extracting the clusters that belong to lighting fixtures. It works based on Density-Based Spatial Clustering of Applications with Noise (DBSCAN), where geometrical features like size are incorporated to detect and classify these lighting fixtures. The final results of the detected lighting fixtures to the raw point cloud data are validated by using F1-score and IoU to determine the accuracy of the predicted object classification and the positions of the detected fixtures. The results show that the proposed method has successfully detected the lighting fixtures with scores of over 0.9. It is expected that the developed algorithm can be used to detect and classify fixtures from any 3D point cloud data representing buildings.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 7

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2016
  • Volume: 

    6
Measures: 
  • Views: 

    165
  • Downloads: 

    362
Abstract: 

cloud COMPUTING IS A NEW WAY TO ADDRESS A WIDE RANGE OF RESOURCE NEEDS. cloud ENVIRONMENT PROVIDES A FRAMEWORK FOR DYNAMIC AND SALEABLE USE OF SERVICES. IT PROVIDES ACCESS TO COMPUTING AND DATA STORAGE RESOURCES ON A PAY PER USAGE MODEL.ALTHOUGH THERE ARE MANY KNOWN ADVANTAGES FOR cloud, SECURITY IS STILL ONE OF ITS MOST CHALLENGING ISSUES. INTRUSION detection SYSTEMS ARE A COMMON SECURITY TOOL WHICH CAN ALSO BE USED IN cloud ENVIRONMENT TO INCREASE THE LEVEL OF SECURITY. BUT CONVENTIONAL INTRUSION detection SYSTEMS ARE NOT ABLE TO FULLY HANDLE THE FEATURES OF THE cloud, SUCH AS HIGHLY DISTRIBUTED OR THE VARIETY OF SERVICES. ALSO THERE ARE DIFFERENCES IN SECURITY NEEDS FOR EACH SERVICE OR USER OF DIFFERENT cloud SERVICE PROVIDERS. IN THIS STUDY WE PROPOSED A MULTI-LEVEL ARCHITECTURE FOR INTRUSION detection SYSTEM BASED ON DIFFERENT LEVELS OF RISK LEVEL IDENTIFIED FOR EACH USER. USER’S RISK LEVEL CAN BE DEFINED THROUGH THE COMPUTED TRUST LEVEL; AS RISK LEVEL CAN BE REVERES OF TRUST LEVEL FOR EACH USER. WITH IDENTIFIED TRUST LEVEL, USERS ARE CATEGORIZED IN TO THREE GROUPS OF “HIGH RISK”, “MEDIUM RISK” AND “LOW RISK”. AFTER THE RISK LEVELS ARE IDENTIFIED AND USERS ARE ASSIGNED TO A SECURITY GROUP, PRE-CONFIGURED IDS AGENT IS ASSIGNED TO USER’S VIRTUAL MACHINE.IDS ARE CONFIGURED IN THREE TYPES OF HIDS, MIDS AND LIDS IN PROPORTION TO THE SECURITY GROUPS DESCRIBED BEFORE. THESE THREE TYPES OF IDS AGENTS VARY IN NUMBER OF RULES IN THEIR RULE SET, AND CONFIGURATION OF RULES IN EACH LEVEL. A HIGHER LEVEL AGENT FOR EACH TYPE OF IDS CONTROLS THE PERFORMANCE AND UPDATES RULE SETS. THERE IS A GLOBAL AGENT WHICH COLLECTS ALERT LOGS TO ANALYZE THEM FOR DETECTING CORRELATION IN ALERTS. THIS ARCHITECTURE IMPROVES RESOURCE USAGE, TIME AND PACKET DROP WITHOUT A TANGIBLE IMPACT ON ACCURACY.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 165

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 362
Author(s): 

Hesabi M. | Deypir M.

Issue Info: 
  • Year: 

    2022
  • Volume: 

    10
  • Issue: 

    2
  • Pages: 

    33-39
Measures: 
  • Citations: 

    0
  • Views: 

    129
  • Downloads: 

    61
Abstract: 

Nowadays, detecting unusual events in the network has been the subject of many researches. Network traffic is huge and very large, and this leads to high data size and increased noise, which makes it very difficult to extract meaningful information to detect abnormal events. Early detection of attacks improves the stability of a system. Each attack is a type of specific behavior,But some attacks may behave similarly and differ only in some features. This article presents a new way to detect malware and attacks in the cloud computing environment. In this method, data clustering separates the data from each other to provide better conditions for model construction by balancing the data in different classes. This research uses a combination of Adabost, Random Forest and Bosted Gradient Tree algorithms as ensemble learning to improve malware detection in cloud computing. In order to combine boosted learners and build a higher level model, the voting mechanism is used. In the proposed model, ensemble learning, using the strengths of various algorithms, creates a useful, high-performance system for detecting malware in cloud computing. By applying the proposed method on real data, it was observed that the accuracy of the proposed method is equal to 99. 96%, its accuracy is equal to 99. 97% and its recall is equal to 99. 95% which compared to previous methods, it has a noticeable advantage, but its computational complexity has not changed much.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 129

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 61 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2023
  • Volume: 

    11
  • Issue: 

    2
  • Pages: 

    17-39
Measures: 
  • Citations: 

    0
  • Views: 

    69
  • Downloads: 

    10
Abstract: 

Due to their significant impact on the balance of energy on the surface and in the atmosphere, the clouds have always been considered by various researchers in the meteorological and climatological fields. The ability to remotely measure the characteristics and parameters of the cloud has been proven to examine their changes in different locations and times. One of the most important aspects of cloud research is cloud detection in remotely sensed images. The purpose of the present study is to provide a stereographic based technique for detecting clouds according to the height of the clouds with the highest possible spatial resolution and using Geostationary meteorological images. First, a stereo pair is selected on board two platforms of the Meteosat-8 (IODC) and the Meteosat-10, using the SEVIRI Sensor with high resolution spatial resolution (HRV). Then, with respect to the different viewing geometry of the two sensors, both images are reprojected into a similar reference grid and finally, by forming line of sight (LOS) of the two sensors in an epipolar sheet, the parallax value in two images on the clouds is estimated. The advantage of this method in estimating cloud height is that the stereo measurements only depend on the fundamental geometric relationships between observations of the visible components of the clouds. Other estimation methods, require the assumption that the cloud has a local thermodynamic equilibrium and some knowledge about the apparent temperature, etc. But in most cases, the amount of cloud emission is unknown, the temperature profile of the atmosphere is unavailable, and the cloud does not have thermodynamic equilibrium with its surroundings. In this study, a new method for revealing cloud pixels based on cloud height is presented. After estimating the height of the clouds, it is possible to separate the pixels of clouds from the intersection pixels based on the existing altitude difference, and in fact, it is possible to detect the cloud based on the estimated height in pixels. The results of this study indicate the high accuracy and the feasibility of using stereography to detect cloud pixels in satellite imagery. The advantage of our proposed method is the use of cloud-height information that not only increases the spatial resolution, but also helps to extract 3D cloud information, which is of particular importance in the studies of solar irradiance, and other cloud research applications. And finally, having a knowledge in this regard in Iran is also very important, because a new branch of meteorological studies, entitled "Meteorological stereography" will be established in the country and will help to lead to more extensive research in this area.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 69

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 10 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2024
  • Volume: 

    21
  • Issue: 

    1
  • Pages: 

    33-49
Measures: 
  • Citations: 

    0
  • Views: 

    15
  • Downloads: 

    0
Abstract: 

Nowadays the cloud computing environment is widely utilized for transmitting and receiving data securely. Inorder to secure the data the encryption method is used but still due to some limitations the security process is diminished. Therefore, this paper proposes a new algorithm to provide better security while transmitting data through the network. At first, the sensitivity of data is determined using a lightweight convolutional neural network (LWCNN) model which is used to categorize the unclassified data into two categories normal sensitive data and highly sensitive data. After determining the level of data sensitivity, the encryption process is performed further. The efficient hash function-based duplication detection approach is employed to maintain confidential information before outsourcing it to a cloud server. Subsequently, the ideal keys are generated for each data based on its sensitivity level using the proposed fuzzy tuna swarm (FTS) algorithm. Finally, the data is encrypted by converting plain text into ciphertext which is only visible to authorized users. The experimental results show that the LWCNN model utilized for data sensitivity classification achieved 94% accuracy and the FTS algorithm proposed for optimal key generation took much less communication time of about 1800μs than other compared techniques.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 15

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2010
  • Volume: 

    3
  • Issue: 

    9
  • Pages: 

    51-54
Measures: 
  • Citations: 

    1
  • Views: 

    946
  • Downloads: 

    0
Abstract: 

Snow as one of the precipitation forms has important effect in hydrological cycle and water resources management. Snow monitoring particularly in mountainous basin without modern technology is very difficult according to temporal and spatial variation of snow property. Remote sensing is one of advanced technology in measurement of snow properties. MODIS imagery is one of new sensors that provide the possibility of snow cover measurement.In this research, the ability of MODIS imagery for detection of snow cover from other earth phenomena such as cloud has been assessed. Some methods of snow cover detection have been applied in Haraz basin that is one of important basin in North of Iran. Results showed that false color image of moderate infrared bands has ability of snow and cloud detection and the best algorithm is the one that can envisage digital number of pixels deviation.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 946

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button