Author Index

A

  • Abdolmaleky, Shahab Identification of Security Weaknesses on MAP Authentication Protocol and Presentation of Improved Protocol [Volume 7, Issue 3, 2016, Pages 183-191]
  • Afifi, Ahmad Experimental Evaluation of Super-Resolution Technique in Satellite Images Based on a Camera Prototype Implementation [Volume 7, Issue 3, 2016, Pages 219-232]

B

  • Bagheri, Nasor FPGA Implementation of Cryptographic Systems Based on Tate Pairing on Binary Field [Volume 7, Issue 2, 2016, Pages 95-106]
  • Behtooei, vahid Geomagnetic Anomalies Modeling to Determine the Best Location for Construction of Buried Magnetic Structures in South of Zanjan [Volume 7, Issue 4, 2016, Pages 305-314]

E

  • Etezadifar, Pouryia Scalable Videos Summarization Using Sparse Dictionary Selection [Volume 7, Issue 4, 2016, Pages 315-326]

F

  • Farsi, Hassan Scalable Videos Summarization Using Sparse Dictionary Selection [Volume 7, Issue 4, 2016, Pages 315-326]

G

  • Gooran Oorimi, Amir An Optimal and Transparent Framework for Automatic Analysis of Malware [Volume 7, Issue 1, 2016, Pages 71-80]

H

  • Haghmaram, Reza Design of power supply for electromagnetic induction-coil launchers with matrix converter [Volume 7, Issue 2, 2016, Pages 127-138]
  • Haghmaram, Reza Application of Interconnected Microgrids for Increasing of Electrification Continuation in Distribution Networks under Emergencies [Volume 7, Issue 3, 2016, Pages 233-250]
  • HajGhassem, Hassan Experimental Evaluation of Super-Resolution Technique in Satellite Images Based on a Camera Prototype Implementation [Volume 7, Issue 3, 2016, Pages 219-232]
  • Hoseini, Mohsen Design and Simulation of a New DC/DC Converter for Avionic System According to Military Standards [Volume 7, Issue 4, 2016, Pages 351-364]

I

  • Izadifard, Ramezanali Performance of Reinforced Concrete Frame Designed According to Iranian Earthquake Code, Subjected to Blast Loading [Volume 7, Issue 3, 2016, Pages 169-181]

J

  • Jahanbani, Mohsen FPGA Implementation of Cryptographic Systems Based on Tate Pairing on Binary Field [Volume 7, Issue 2, 2016, Pages 95-106]

K

  • Kamjoo, Mohammad Javad Simulation of Kerr Lens Behavior in a Ti:Sapphire Oscillator with Symmetric and Asymmetric Resenator [Volume 7, Issue 1, 2016, Pages 59-70]
  • Khandaze, Mohammd Hosein Design and Simulation of a New DC/DC Converter for Avionic System According to Military Standards [Volume 7, Issue 4, 2016, Pages 351-364]

M

  • Mahmoudi Nasr, Payam An Anomaly Detection System for Operational Threats in SCADA System [Volume 7, Issue 3, 2016, Pages 209-218]
  • Malakzadeh, Abdollah Simulation of Kerr Lens Behavior in a Ti:Sapphire Oscillator with Symmetric and Asymmetric Resenator [Volume 7, Issue 1, 2016, Pages 59-70]
  • Malek, MohammadReza Vulnerability Assessment of Critical infrastructure against Acoustic Sensor of Smart and Unmanned aerial threats [Volume 7, Issue 2, 2016, Pages 149-157]
  • Mardani Shahrbabak, Mohammad Identification of Security Weaknesses on MAP Authentication Protocol and Presentation of Improved Protocol [Volume 7, Issue 3, 2016, Pages 183-191]
  • Mofidi, Mehdi Experimental Evaluation of Super-Resolution Technique in Satellite Images Based on a Camera Prototype Implementation [Volume 7, Issue 3, 2016, Pages 219-232]

N

  • Najafi, Mostafa Sensing Properties Investigation of Graphene Oxide Reduced by Various Agents for Detection of DMMP [Volume 7, Issue 4, 2016, Pages 269-276]
  • Noroozi, Zeynolabedin FPGA Implementation of Cryptographic Systems Based on Tate Pairing on Binary Field [Volume 7, Issue 2, 2016, Pages 95-106]
  • Nourizadeh, Ali Performance of Reinforced Concrete Frame Designed According to Iranian Earthquake Code, Subjected to Blast Loading [Volume 7, Issue 3, 2016, Pages 169-181]

P

  • Parsa, Saeed An Optimal and Transparent Framework for Automatic Analysis of Malware [Volume 7, Issue 1, 2016, Pages 71-80]
  • Pirayesh, Abolfazl Optimal Reserve Power Allocation of Power System in Critical Situation for Preparation against Threats [Volume 7, Issue 2, 2016, Pages 159-167]

R

  • Radan, Mohammad Yaser Geomagnetic Anomalies Modeling to Determine the Best Location for Construction of Buried Magnetic Structures in South of Zanjan [Volume 7, Issue 4, 2016, Pages 305-314]
  • Ramezani, Abouzar Vulnerability Assessment of Critical infrastructure against Acoustic Sensor of Smart and Unmanned aerial threats [Volume 7, Issue 2, 2016, Pages 149-157]
  • Ranjbar, Mohammad Hossein Optimal Reserve Power Allocation of Power System in Critical Situation for Preparation against Threats [Volume 7, Issue 2, 2016, Pages 159-167]
  • R. Danaee, M. An MCMC-baesd Particle Filter for Multitarget Tracking within Raw Measurements [Volume 7, Issue 1, 2016, Pages 81-94]
  • Rostami Fajr, Mehdi Design of power supply for electromagnetic induction-coil launchers with matrix converter [Volume 7, Issue 2, 2016, Pages 127-138]

S

  • Sahami, Habib Vulnerability Assessment of Critical infrastructure against Acoustic Sensor of Smart and Unmanned aerial threats [Volume 7, Issue 2, 2016, Pages 149-157]
  • Sarvghadmoghadam, A. R. Vulnerability Analysis Concrete Tanks Liquid Storage under Air Blast [Volume 7, Issue 1, 2016, Pages 45-58]

Y

  • Yazdian Varjani, Ali An Anomaly Detection System for Operational Threats in SCADA System [Volume 7, Issue 3, 2016, Pages 209-218]

Z

  • Zare Kalate, Seyed Reza Simulation of Kerr Lens Behavior in a Ti:Sapphire Oscillator with Symmetric and Asymmetric Resenator [Volume 7, Issue 1, 2016, Pages 59-70]
  • Ziaei, M. Vulnerability Analysis Concrete Tanks Liquid Storage under Air Blast [Volume 7, Issue 1, 2016, Pages 45-58]