• XML

    isc pubmed crossref medra doaj doaj
  • List of Articles


      • Open Access Article

        1 - A Mechanism for Detecting and Identifying DoS attack in VANET
        Keyvan Khajavi Navid Hajhassan
        VANET (Vehicular Ad-hoc Network) which is a hy- brid network (combination of infrastructure and infra- structure-less networks) is an emergent technology with promising future as well as great challenges especially in security. By the other hand this type of network is More
        VANET (Vehicular Ad-hoc Network) which is a hy- brid network (combination of infrastructure and infra- structure-less networks) is an emergent technology with promising future as well as great challenges especially in security. By the other hand this type of network is very sensible to safety problem. This paper focuses on a new mechanism for DoS (denial of service) attacks on the physical and MAC layers in IEEE standard 802.11p. In this proposed solution, DoS attack is detected and iden- tified by using the values of packet delivery ratio (PDR) metric. Simulation results show the acceptable perfor- mance Manuscript profile
      • Open Access Article

        2 - A Review of BlockChain
        mahboubeh heydari Ali Noroozi Narjes Akbari Masoumeh Mohammadi Kamal Yousefiyan Mohammad Hossein Ahmadzadegan
        Blockchain is an emerging technology for decentralized and transactional data sharing across a large network of untrusted participants. It enables new forms of distributed software architectures, where components can find agreements on their shared states without trusti More
        Blockchain is an emerging technology for decentralized and transactional data sharing across a large network of untrusted participants. It enables new forms of distributed software architectures, where components can find agreements on their shared states without trusting a central integration point or any particular participating components. Considering the block- chain as a software connector helps make explicitly important architectural considerations on the resulting performance and quality attributes (for example, security, privacy, scalability and sustainability) of the system. Manuscript profile
      • Open Access Article

        3 - Evaluating the quality of e-banking services in the Iranian banking network by using the Servqual model
        A. Moradi R. Alaie Bhkhsh M. Shahchra A. Ahmadian
        Today, the quality of services is an increasingly important factor in the success and survival of the banking sector. Therefore, the discovery of effective factors in the quality of services and the importance of each of these factors is very important from the point of More
        Today, the quality of services is an increasingly important factor in the success and survival of the banking sector. Therefore, the discovery of effective factors in the quality of services and the importance of each of these factors is very important from the point of view of customers due to the increasing intensity of competition. Modern com- merce requires appropriate tools and infrastructure for expanding economic processes. When we talk about the link between information technology and communication with affairs, the link between information and communi- cation technology and banking is one of the most concrete and obvious points that comes to mind. In this research, the relevant questions were studied, using the conceptu- al model presented by the correlation-survey method and the class random sampling method. In order to collect information using a questionnaire tool, we surveyed cli- ents of private banks in East of Tehran. The results of the hypothesis test showed that there is a significant correla- tion between the ease of use of banking services and the enhancement of interoperability as well as the reliability and security of information on the quality of banking ser- vices, that is, with the increase of these issues, the quality of e-services is also increased and effective in satisfaction of customers. Manuscript profile
      • Open Access Article

        4 - Identifying customer preferences in using e-banking services
        M. Shahchra A. Moradi H. Arabi A. Ahmadian
        Clients are the vital artery of every industry and business. Maintaining these customers is one of the most important tasks of any business, especially banks. The specific needs of customers and the increasing compe- tition in the banking services market have led banks More
        Clients are the vital artery of every industry and business. Maintaining these customers is one of the most important tasks of any business, especially banks. The specific needs of customers and the increasing compe- tition in the banking services market have led banks to create structures that can respond flexibly to these needs. Obviously, one of the important points is that moving to these new structures and designing new services, not only meet the needs of customers, but also expand competition in banking operations and increase the likelihood of sur- vival in the market. Today, the service industry is chang- ing in the world. New technologies have changed the way customer services are presented. Banking services have undergone major changes under the influence of informa- tion and communication technology. In this research, the effect of different levels of factors on customer orien- tation in the use of e-banking services for perceived ease of use, perceived usefulness and an additional factor of perceived security has been investigated. The result of the research showed that the effect of different levels of factors on customer orienta- tion in using e-banking services is different. This research was conducted with the aim of investigating the factors influencing the preferences of the customers of the banks and the results of the research revealed 5 factors of trust and loyalty, matching of services with the tastes, quality of services, development and expansion of tools and ser- vices, expectations of importers on customer preferences Manuscript profile
      • Open Access Article

        5 - An Investigation of LTE Broadcast
        H. Khanmirzaei Gh. Farsi V. Asgari Azad
        Broadcast and broadband communications have undoubt- edly become a part of today’s social life. Accessibility of content of interest to the audience at any place and at any time regardless of the type of content consumer device can have an effective contribution t More
        Broadcast and broadband communications have undoubt- edly become a part of today’s social life. Accessibility of content of interest to the audience at any place and at any time regardless of the type of content consumer device can have an effective contribution to the desire of the audience to use of the broadcast content. The HD and Ultra HD qualities, the desire for demand-driven applications, the interactive content usage and the diversity of broadcast content-usage devices have raised the challenge of both broadcast communications and broadband communica- tions to meet the audience’s future needs. This paper tries to explain approaches to overcome these challenges using the inherent capabilities of broadcast and broadband. Of course, the exact prediction of when this technology will come to full maturity is almost impossible. Manuscript profile
      • Open Access Article

        6 - Privacy and Security of Big Data in THE Cloud
        Narges Naderi Hasan Alizadeh
        Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One More
        Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many organizations de- mand efficient solutions to store and analyze huge amount of information. Cloud computing as an enabler provides scalable resources and significant economic benefits in the form of reduced operational costs. This paradigm raises a broad range of security and privacy issues that must be taken into consideration. Multi-tenancy, loss of control, and trust are key challenges in cloud computing environments. In this paper, the recent research and de- velopment on security and privacy in big data is surveyed and reviews the existing technologies and a wide array of both earlier and state-of- the-art projects on cloud securi- ty and privacy. First, the effects of characteristics of big data on information security and privacy are described. Second, topics and issues on security are discussed and reviewed. Third, privacy-preserving trajectory data pub- lishing is studied due to its future utilization, especially in telecom operation. Forth, present an overview of the battle ground by defining the roles and operations of privacy systems. Fifth, we review the milestones of the current two major research categories of privacy: data clustering and privacy frameworks. Finally, we discuss the effort of privacy study from the perspectives of different disci- plines, respectively. Manuscript profile
      • Open Access Article

        7 - SDN Security: A Survey
        Iman Hassani Abdolreza Moayeri
        The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will More
        The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the market, security in SDN must be raised on the agenda. This paper presents a comprehensive sur- vey of the research relating to security in software defined networking that has been carried out to date. Both the security enhancements to be derived from using the SDN framework and the security challenges introduced by the framework are discussed. By categorizing the ex- isting work, a set of conclusions and proposals for future research directions are presented. Manuscript profile
      • Open Access Article

        8 - Discussion And Review In Vanet
        VANET are becoming active area of research and devel- opment because it has potential to increase road safety, convenience and comfort to drivers & passengers. A Lot of research work on VANET have done in area of Quali- ty of Service (QoS), routing and security. These c More
        VANET are becoming active area of research and devel- opment because it has potential to increase road safety, convenience and comfort to drivers & passengers. A Lot of research work on VANET have done in area of Quali- ty of Service (QoS), routing and security. These concepts relate the facing challenges for technology in VANET. We present a overview of challenges in VANET. Firstly ,we have discussed about VANET technology and routing methods. The aspects related to security have explored with challenges related to threats. Further there is discus- sion about Quality of Service, routing and technical issues as well as social and economic challenges. Manuscript profile
      • Open Access Article

        9 - Evaluation of the performance of intelligent vehicles and their role in controlling and reducing urban traffic in North Khorasan Province
        Mojtaba Arabi Payam Porkar Rezaeie M. H. Ahmadzadegan
        Nowadays, one of the problems of human life is popula- tion congestion and the lack of ability to meet their needs. One of the important infrastructures affected by this issue is the transportation infrastructure. Moreover, increasing transportation facilities through c More
        Nowadays, one of the problems of human life is popula- tion congestion and the lack of ability to meet their needs. One of the important infrastructures affected by this issue is the transportation infrastructure. Moreover, increasing transportation facilities through conventional methods, due to the need for macro investment and much time, cannot be nowadays considered as a proper and practi- cal strategy. Thus, in recent years, the tendency to use the mechanisms to employ new technologies, the optimal use of available resources, the use of modern technologies in automobiles in most countries have been considered as the best solution for metropolitan traffic managers. One of the newest and most effective traffic management solu- tions deriving from information technology is the idea of using intelligent vehicles, which can lead to a non-traffic city, mobility in the community, and providing better ser- vices to citizens. After examining the need for modern technologies in the transportation area, this paper defines intelligent systems, performance, types of services, and modern technologies in intelligent vehicles. Then, it will refer to measures required in planning and establishing ITS and the localization of this system in each region. Manuscript profile