Articles
803 Documents
Attacks and Intrusion Detection in Cloud Computing Using Neural Networks and Particle Swarm Optimization Algorithms
Shokuh Saljoughi, Ahmad;
Mehrvarz, Mehrdad;
Mirvaziri, Hamid
Emerging Science Journal Vol 1, No 4 (2017): December
Publisher : Ital Publication
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (810.202 KB)
|
DOI: 10.28991/ijse-01120
Today, cloud computing has become popular among users in organizations and companies. Security and efficiency are the two major issues facing cloud service providers and their customers. Since cloud computing is a virtual pool of resources provided in an open environment (Internet), cloud-based services entail security risks. Detection of intrusions and attacks through unauthorized users is one of the biggest challenges for both cloud service providers and cloud users. In the present study, artificial intelligence techniques, e.g. MLP Neural Network sand particle swarm optimization algorithm, were used to detect intrusion and attacks. The methods were tested for NSL-KDD, KDD-CUP datasets. The results showed improved accuracy in detecting attacks and intrusions by unauthorized users.
An Offset-free High linear Low Power High Speed Four-Quadrant MTL Multiplier
Jafari, HoseinAli;
Abbasi, Zahra;
Azhari, Seyed Javad
Emerging Science Journal Vol 1, No 3 (2017): October
Publisher : Ital Publication
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (736.215 KB)
|
DOI: 10.28991/ijse-01115
In this paper a new CMOS current-mode four-quadrant analog multiplier circuit is proposed. The major advantages of this design are high linearity, high speed and low power consumption. Removing dc offset is the most important improvement in this topology. The circuit is designed with 1.8V supply voltage and is simulated using HSPICE simulator by level 49 parameters in 0.18µm standard CMOS TSMC technology. The aspect ratios of the MOSFETs are optimized using Evolutionary algorithm by MATLAB. The simulation results of this analog multiplier demonstrate a maximum linearity error of 2.6%, a THD of 1.77%, maximum power consumption of 157 µW, -3dB bandwidth of 241MHz and almost free from dc offset.
Study of Loneliness and Identity Styles among Internet Addicted Students in Faculty of Engineering, Islamic Azad University, Central Tehran Branch
Bnirostam, Touraj;
Saberi, Hayedeh
Emerging Science Journal Vol 1, No 2 (2017): August
Publisher : Ital Publication
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (543.101 KB)
|
DOI: 10.28991/esj-2017-01119
Application of new technologies is an obvious effects of today world. Internet as a newborn tool of contemporary technology world, plays an important role in change of people's life. Internet now is a necessary tool of modern era which makes it an inevitable component of everyday life. The present study aims to investigate level of sense of loneliness, identity styles and Internet Problematic Use among students. This is a descriptive survey study whose statistical population is all of the students of Technical - Engineering Faculties of Islamic Azad University in 1394-95 (2015-2016) in Tehran, using Multistage Cluster sampling method. 3 questionnaires, sense of loneliness, identity styles and internet addiction, have been selected for gathering data. Data analysis have been carried out by SPSS software. The results indicate that sense of loneliness is higher than two other variances which in turn end in internet addiction and identity disorders.
Dynamic Detection of Secure Routes in Ad hoc Networks
Movahedian Attar, Niloofar
Emerging Science Journal Vol 1, No 4 (2017): December
Publisher : Ital Publication
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (671.378 KB)
|
DOI: 10.28991/ijse-01127
The present paper focused on ad hoc networks with an emphasis on their dynamic nature. After an introduction to ad hoc networks, there are the AODV (Ad hoc On-demand Distance Vector) routing protocol with the node malicious behaviour and consequent damages to ad hoc networks. Then, trust is described as one of the solutions for identifying secure routes when there are malicious nodes in the network. Accordingly, the paper focuses on the proposed solutions that are based on the parameter trust and the prevention of the impact of malicious networks and vulnerable connections to identify a secure route. Then, an equation is presented to calculate trust using packet forwarding rate to select a secure route for sending data packets. The proposed model was implemented on OMNET++ to evaluate the network performance. The feature of the proposed method is better performance than of the methods TVAODV and AODV. Using the proposed method, packet delivery rate increases more significantly when malicious nodes increases than that of the basic method AODV and TVAODV. There is thus a lower packet dropping rate.
A Research on the effect of social media on tendency to entrepreneurship and business establishment (Case Study: Active Iranian Entrepreneurs in Social Media)
Tosifyan, Masoud;
Tosifyan, Saeed
Emerging Science Journal Vol 1, No 1 (2017): June
Publisher : Ital Publication
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (648.214 KB)
|
DOI: 10.28991/esj-2017-01115
This research was done with the aim to investigate the effect of social media on tendency to entrepreneurship and business establishment. The aim of applied research and methods used in this survey was a descriptive survey research. A standard questionnaire was used to collect relevant data in this study. The reliability of each questionnaire was estimated 0.779, 0.806 and 0.798. The population study is Iranian entrepreneurs who are active in social media and number of them is uncertain; A sample of 120 active Iranian entrepreneurs were selected as target and a questionnaire was distributed among these individuals. To collect the information and necessary data to evaluate the hypotheses of the research, a questionnaire and SPSS and LISREL software were evaluated. At inferential comprehension level, techniques of Kolmogorov-Smirnov test for being normal, Pearson correlation test and structural equation modelling were used to test the hypotheses. Based on the results, the hypotheses were accepted.
Design of the Low Noise Amplifier Circuit in Band L for Improve the Gain and Circuit Stability
Omidi, Arash;
Karami, Rohalah;
Emadi, Parisa Sadat;
Moradi, Hamed
Emerging Science Journal Vol 1, No 4 (2017): December
Publisher : Ital Publication
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (813.784 KB)
|
DOI: 10.28991/ijse-01122
In this paper, focuses on the design of Low Noise Amplifier circuitry in the frequency band L. This circuit is designed using the 0.18 nm CMOS transistor technology, which consists of two transistor Stage. The purpose of this research is to improve the cost of: Increase Gain - Increase circuit linearization - Create an integrative matching network for system stability. The application of this circuit can be used in wireless and GPS systems. The CMOS LNA exhibits a gain greater than 23 dB from 1.1 to 2.0 GHz, and a noise figure of 2.7 to 3.3 dB from 1.2 to 2.4 GHz. At 1.575 GHz, the 1-dB compression point (P1dB) is 1.73 dBm, with an input third-order intercept point (IIP3) of -3.98 dBm. This circuit is designed using ADS software.
Three-Phase Multistage System (DC-AC-DC-AC) for Connecting Solar Cells to the Grid
Mahmudreza Changizian;
Ali Zakerian;
Araz Saleki
Emerging Science Journal Vol 1, No 3 (2017): October
Publisher : Ital Publication
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1445.526 KB)
|
DOI: 10.28991/ijse-01116
Inverter systems that feed electrical power from photovoltaic (PV) system into the grid must convert the direct current of the PV array into the alternating current of the grid. In many applications, it is important for a converter to be lightweight, highly reliable, input/output isolated, flexible and operable in a boost mode. These features can be achieved by using a High-Frequency inverter which involves an isolated DC-DC stage and DC-AC section, which provides AC output. This paper proposes a new three phase topology, based on multi stage converter and PV system in order to use in medium and high power applications. The Perturb and Observe (P&O) method is used for maximum power point tracking (MPPT) control of PV array. The switching control signals for three-phase inverter are provided by hysteresis control method. Also, the comparison between the proposed topology and traditional structures has been conducted and finally the simulation researches are performed in a closed-loop control system by MATLAB/Simulink software to verify the operation of the proposed structure. The results represent better performance of the introduced system over traditional topologies.
Mosaic and Trencadís in the Palau De La Música Catalana
Cristina Martí Robledo
Emerging Science Journal Vol 2, No 2 (2018): April
Publisher : Ital Publication
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (2145.453 KB)
|
DOI: 10.28991/esj-2018-01134
Modernism has provided Catalonia with buildings of great artistic value, such as the Palau de la Música Catalana located in the heart of Barcelona. Its architect, Lluís Domènech i Montaner, approached ornamentation as a thorough integration of arts and crafts: ceramic is treated as the ¨key¨ element, decorating the entire building while coating and protecting its internal metallic structure at the same time.During Modernisme, the classic mosaic technique, based on the use of small tiles (or tesserae) made of ceramics or glass paste, incorporated a new method called trencadís (A procedure carried out using irregular pieces of tiles fragmented randomly and put together in an abstract way).
Recent Issues in the Implementation of the New Basel Minimum Capital Requirements for Market Risk
J. Orgeldinger
Emerging Science Journal Vol 2, No 2 (2018): April
Publisher : Ital Publication
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1433.969 KB)
|
DOI: 10.28991/esj-2018-01129
The Basel Committee suggested new ways of dealing with market risk in banks’ trading and banking books, in its October 2013 consultative paper, and subsequent versions published thereafter, for revised market risk framework FRTB. The Basel Committee estimates that the new rules will result in an approximate median capital increase of 22% and a weighted average capital increase of 40% (BCBS 2016), compared with the current framework. Budget reports on FRTB implementation range from costs of 5-million USD to 250-million USD. Key changes can be found in the internal model approach, in the standard rules and in the approval process. Significant changes introduced by the FRTB include stricter separation of the trading and banking book. Regardless of whether they use standardized or internal models, banks will need to review their portfolios to determine if existing classifications of instruments and desks as trading or banking book are still applicable, or whether a revision of desk structure is needed. In its article ‘Critical appraisal of the Basel fundamental review of the trading book regulation’ (Orgeldinger 2017) the theoretical foundations of the internal model approach IMA were analysed and the criticisms for FRTB risk models were investigated. A recent onslaught of rules is rendering the existing timeline for implementation practically impossible. In this article we present and critically evaluate different approaches to implement the new rules suggested by academics and major consulting companies.
Investigating and Ranking Barriers to Strategic Implementation in Telecommunication Center of Tehran Province
Shirin Javaheri;
Ahmad Abdolvand;
Aghdam Mohammadloo
Emerging Science Journal Vol 2, No 1 (2018): February
Publisher : Ital Publication
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (842.185 KB)
|
DOI: 10.28991/esj-2018-01124
This study sought to investigate and rank the barriers to strategic implementation in Telecommunication Center in Tehran province. In terms of the objectives, it is an applied study and with regard to the methodology, it is descriptive as it describes the conditions of phenomena. The statistical population consisted of 140 managers, senior experts and elites of Telecommunication Center of Tehran province. Using Morgan's table, a total of 90 people were selected as the study sample. The instrument to collect the required data was a researcher-made questionnaire. The validity of the questionnaire was confirmed by the experts in the field and the reliability within the pilot study was 0.87. In this research, four barriers were raised including: system and management barriers, barriers related to employees, barriers to strategic planning, and barriers to non-allocation of resources.Investigating the capability of fitting the strategic barriers model in Telecommunication Center of Tehran province revealed that all the barriers were within the acceptable limits. In this study, content validity was assessed using expert judgment and construct validity using the confirmatory factor analysis. The TOPSIS technique was then run to prioritize the barriers. Findings indicate that whereas the system and management barriers have the highest rank, the barriers related to employees have the lowest rank.