Search Results/Filters    

Filters

Year

Banks




Expert Group











Full-Text


Issue Info: 
  • Year: 

    2023
  • Volume: 

    2
  • Issue: 

    3 (پیاپی 5)
  • Pages: 

    51-61
Measures: 
  • Citations: 

    0
  • Views: 

    189
  • Downloads: 

    26
Abstract: 

Purpose: Food security is a critical global challenge that is influenced by research and innovation in the field. Therefore, the objective of this study is to analyze the scientific output of developing countries in food security and examine its relationship with patents and Gross Domestic Product (GDP).Methodology: This applied research utilized the Scientometric approach. A total of 8,416 papers published between 1992-2023 in the field of food security by developing countries were included in the study using citation databases from Clarivate Analytics. Additionally, patent registrations from the WIPO database and GDP data from the World Bank were analyzed. Information was collected through note-taking, and the data was analyzed using Pearson's correlation coefficient.Findings: The findings reveal an upward trend in the publication and citation of scientific outputs related to food security in developing countries. China has higher numbers of papers, patents, GDP, and food production index compared to Iran, Japan, and South Korea. There is also a positive correlation observed between population and the number of papers, gross production and the number of papers, food production and the number of published papers, as well as the number of patents and papers citing scientific outputs of countries.Conclusion: These results highlight the significant relationship between increasing scientific output, GDP, the number of patents, and food security. Greater emphasis on food security contributes to enhanced scientific output, GDP, and innovation. Similarly, increasing scientific output, GDP, and innovation positively impact food security in countries.Value: This study emphasizes the importance of scientific outputs in driving technological advancements, innovations, and ultimately, ensuring food security in developing countries.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 189

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 26 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2022
  • Volume: 

    52
  • Issue: 

    3
  • Pages: 

    195-204
Measures: 
  • Citations: 

    0
  • Views: 

    249
  • Downloads: 

    83
Abstract: 

Distributed Denial of Service (DDoS) attacks are among the primary concerns in internet security today. Machine learning can be exploited to detect such attacks. In this paper, a multi-layer perceptron model is proposed and implemented using deep machine learning to distinguish between malicious and normal traffic based on their behavioral patterns. The proposed model is trained and tested using the CICDDoS2019 dataset. To remove irrelevant and redundant data from the dataset and increase learning accuracy, feature selection is used to select and extract the most effective features that allow us to detect these attacks. Moreover, we use the grid search algorithm to acquire optimum values of the model’s hyperparameters among the parameters’ space. In addition, the sensitivity of accuracy of the model to variations of an input parameter is analyzed. Finally, the effectiveness of the presented model is validated in comparison with some state-of-the-art works.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 249

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 83 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Writer: 

Issue Info: 
  • End Date: 

    اسفند 1387
Measures: 
  • Citations: 

    12
  • Views: 

    241
  • Downloads: 

    0
Keywords: 
Abstract: 

-قابلیت گسترش و تغییر (Change & Scaleability -کارایی (Performance) -برگشت پذیری و افزونگی (Resilience & Redundancy) -مدیریت پذیری شبکه (network & manageability) -امنیت و خروج از بحران (security & Disaster Recovery) -هزینه متناسب (Effective Cost) -قابلیت سازگاری (Adaptability)

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 241

Issue Info: 
  • Year: 

    2020
  • Volume: 

    14
  • Issue: 

    4 (56)
  • Pages: 

    53-78
Measures: 
  • Citations: 

    0
  • Views: 

    1504
  • Downloads: 

    0
Abstract: 

Background and aim: Virtual social networks, especially the telegram messenger network, have essential functions in the transition society and have been directly linked to security and ethical issues in societies. The purpose of this study is to determine the effect of telegram messenger network on ethical security in Tehran. Research methodology: This study is a survey research using a researcher-made questionnaire tool to collect data. The statistical population of the study consistes of all users of telegram messenger network in Tehran. Data analysis was done using SPSS software and statistical tests. Findings: Findings indicate that the provision or threat of moral security is the result of the components of social behavior changes such as privacy violations (abuse of private information) and the spreading of false rumors and produced content (textual, audio, visual) about individuals and social and ethical issues. Targeted use of the telegram and ease of access to this messenger network are other influential variables. Conclusion: The results of this study shows that policy making and strategic planning (proactive and opportunistic measures) for targeted use and content guidance as well as legal and formal oversight and control levers, including filtering of some of the offending channels by responsible organizations (counter and counter measures), seems essential in order to maintain and preserve moral security.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1504

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Writer: 

Issue Info: 
  • End Date: 

    1395
Measures: 
  • Citations: 

    1
  • Views: 

    236
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 236

Author(s): 

YI N. | QI LUN Z. | HONG P.

Issue Info: 
  • Year: 

    2006
  • Volume: 

    -
  • Issue: 

    7
  • Pages: 

    0-0
Measures: 
  • Citations: 

    1
  • Views: 

    147
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 147

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2016
  • Volume: 

    6
Measures: 
  • Views: 

    137
  • Downloads: 

    65
Abstract: 

COMPUTER networkS CONSIST OF SEVERAL ASSETS SUCH AS HARDWARE, SOFTWARE, AND DATA SOURCES. THESE ASSETS HAVE OFTEN SOME VULNERABILITIES WHICH CAN BE EXPLOITED BY ATTACKERS THAT VIOLATE security POLICIES IN THE network. CONSIDERING THE LIMITED BUDGET, THE network ADMINISTRATOR SHOULD ANALYZE AND PRIORITIZE THESE VULNERABILITIES TO BE ABLE TO EFFICIENTLY PROTECT A network BY MITIGATING THE MOST RISKY ONES. SO FAR, SEVERAL security PARAMETERS ARE OFFERED TO ANALYZE security RISKS FROM THE network security ADMINISTRATOR’S PERSPECTIVE. THE MAJOR DRAWBACK OF THESE METHODS IS THAT THEY DO NOT CONSIDER ATTACKER’S MOTIVATION.DEPENDING ON THE MOTIVATION OF POTENTIAL ATTACKERS, DIFFERENT ATTACK PATH MAY BE SELECTED FOR network security COMPROMISE. SO, ATTACKER’S MOTIVATION IS A KEY FACTOR IN PREDICTING THE ATTACKER’S BEHAVIOR. IN THIS PAPER, THE ATTACKER’S MOTIVATION IS CONSIDERED IN THE PROCESS OF security RISK ANALYSIS, SO network ADMINISTRATORS ARE ABLE TO ANALYZE security RISKS MORE ACCURATELY. THE PROPOSED METHOD IS APPLIED ON A network AND THE RESULTS ARE COMPARED WITH NOVEL WORKS IN THIS AREA. THE EXPERIMENTAL RESULTS SHOW THAT network ADMINISTRATOR WILL BE ABLE TO PRECISELY PREDICT THE BEHAVIOR OF ATTACKERS AND APPLY COUNTERMEASURES MORE EFFICIENTLY.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 137

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 65
Author(s): 

JADID SH. | KHAZAEI MOHAMMAD

Issue Info: 
  • Year: 

    2004
  • Volume: 

    15
  • Issue: 

    3
  • Pages: 

    253-265
Measures: 
  • Citations: 

    0
  • Views: 

    778
  • Downloads: 

    0
Keywords: 
Abstract: 

This paper presents a novel method to combine neural network and Ward equivalent external network modeling to achieve advantages of both methods for on-line voltage security assessment. The demonstrated method includes simplicity of Ward equivalent model and due to application of neural network techniques it is very fast and accurate. In this method ANN is used to obtain boundary buses power injections. The developed method in applied to IEEE 30 bus test system and results highlighted the anticipated speed and accuracy.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 778

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2024
  • Volume: 

    12
  • Issue: 

    1
  • Pages: 

    37-55
Measures: 
  • Citations: 

    0
  • Views: 

    20
  • Downloads: 

    4
Abstract: 

IoT devices has witnessed a substantial increase due to the growing demand for smart devices. Intrusion Detection Systems (IDS) are critical components for safeguarding IoT networks against cyber threats. This study presents an advanced approach to IoT network intrusion detection, leveraging deep learning techniques and pristine data. We utilize the publicly available CICIDS2017 dataset, which enables comprehensive training and testing of intrusion detection models across various attack scenarios, such as Distributed Denial of Service (DDoS) attacks, port scans, botnet activity, and more. Our goal is to provide a more effective method than the previous methods. Our proposed deep learning model incorporates dense transition layers and LSTM architecture, designed to capture both spatial and temporal dependencies within the data. We employed rigorous evaluation metrics, including sparse categorical cross-entropy loss and accuracy, to assess model performance. The results of our approach show outstanding accuracy, reaching a peak of 0.997 on the test data. Our model demonstrates stability in loss and accuracy metrics, ensuring reliable intrusion detection capabilities. Comparative analysis with other machine learning models confirms the effectiveness of our approach. Moreover, our study assesses the model's resilience to Gaussian noise, revealing its capacity to maintain accuracy in challenging conditions. We provide detailed performance metrics for various attack types, offering insights into the model's effectiveness across diverse threat scenarios.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 20

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 4 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2019
  • Volume: 

    9
  • Issue: 

    33
  • Pages: 

    7-24
Measures: 
  • Citations: 

    0
  • Views: 

    720
  • Downloads: 

    0
Keywords: 
Abstract: 

Today, the establishment of a national information security network is considered as an essential strategy for the enforcement of cyberspace, and most countries have focused on creating and providing services on this platform. Determining the security of national information networks requires quantifying and providing an evaluation model that can be used to assess and design or select a national information security network. In this regard, the purpose of this study is to achieve the National Geospatial Information network Assessment Model for JHA. So the main question of the research is, "What is the National Information network's National Information network Assessment Model? " The type of research is also in terms of applied-developmental purpose and the mixed research method has been used. Based on this, firstly, in the library studies section, by referring to valid sources, the most important indicators and variables affecting the assessment of the National Information network for Secure Data were extracted and, according to their nature and role, these variables were classified. The following questionnaire was designed and made available to experts, experts and cyber experts. Based on the analysis of the questionnaires, the most important variables and indicators for assessing the national security information network for JHA were counted. Finally, based on the findings of the library and field studies, as well as the analyzes made, the suggested conceptual model for assessing the national information security network for JHA was presented in three dimensions, nineteen components and seventy one indicators after the final validation of the cyber elites.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 720

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button