A
-
Accessibility
Development of a Spatial Decision Support System Tool for Identifying Strategic Roads [Volume 5, Issue 1, 2014, Pages 49-59]
-
Active Control
Vibration Control of Frame Structures Subjected to the Blast Loading by Active Control Proposed Algorithm [Volume 5, Issue 1, 2014, Pages 43-48]
-
Actuator
Vibration Control of Frame Structures Subjected to the Blast Loading by Active Control Proposed Algorithm [Volume 5, Issue 1, 2014, Pages 43-48]
-
Algebric attack
Design and Analysis of A New Secure Stream Cipher Algorithm [Volume 5, Issue 2, 2014, Pages 81-91]
-
Analytic Hierarchy Process
A New Approach for Optimal Location of Power Dispatching Centers Based on Passive Defence Criteria Using EAHP [Volume 5, Issue 1, 2014, Pages 19-29]
-
Analytic Network Process(ANP)
An ANP Based Heuristic Method for Evaluating and Comparing Field Dress Camouflage Patterns [Volume 5, Issue 1, 2014, Pages 9-17]
-
Anti Blocker
Protection of Operation System against Spywares and Diversion Them [Volume 5, Issue 2, 2014, Pages 147-157]
-
Anti-Key Logger
Protection of Operation System against Spywares and Diversion Them [Volume 5, Issue 2, 2014, Pages 147-157]
-
Anti-Spyware
Protection of Operation System against Spywares and Diversion Them [Volume 5, Issue 2, 2014, Pages 147-157]
B
-
Battledress
An ANP Based Heuristic Method for Evaluating and Comparing Field Dress Camouflage Patterns [Volume 5, Issue 1, 2014, Pages 9-17]
-
Behavioral Analysis
A Malware Detection Method Based on Static Analysis of PE Structure [Volume 5, Issue 3, 2014, Pages 187-201]
-
Blast Load
Vibration Control of Frame Structures Subjected to the Blast Loading by Active Control Proposed Algorithm [Volume 5, Issue 1, 2014, Pages 43-48]
-
Blast Loading
Centrifuge Modeling of an Underground Structure Subjected to Blast Loading [Volume 5, Issue 1, 2014, Pages 31-41]
-
Blast Loading
Investigation of the Effects of Tunnel Cross-Section Geometry on the Performance of the Lining Structure Subjected to External Blast Loading [Volume 5, Issue 1, 2014, Pages 61-69]
-
Br-PADAP
Monitoring of Uranium (VI) in Water Samples after Preconcentration with Modified Nanoporous Silica and Color Reaction by Br-PADAP [Volume 5, Issue 1, 2014, Pages 71-79]
-
Business Continuity
A Proposed Model for Organizational Gap Analysis to Implement Continuous and Hardening of Operations Requirements Base on BS 25999 [Volume 5, Issue 2, 2014, Pages 121-131]
C
-
Camouflage Patterns
An ANP Based Heuristic Method for Evaluating and Comparing Field Dress Camouflage Patterns [Volume 5, Issue 1, 2014, Pages 9-17]
-
Catechol
Determination of Thiopental in Aqueous Media Using Catechol Electrocatalytic Properties [Volume 5, Issue 3, 2014, Pages 179-185]
-
Centrifuge
Centrifuge Modeling of an Underground Structure Subjected to Blast Loading [Volume 5, Issue 1, 2014, Pages 31-41]
-
Chaotic Map
Cryptanalysis and Improvement of a New Chaotic Image Encryption Scheme [Volume 5, Issue 4, 2014, Pages 296-287]
-
Combination of One-class Classifiers
(Detect attacks against web applications Using Combination of One-class Classifierss) [Volume 5, Issue 2, 2014, Pages 107-119]
-
Congestion Management
Optimal placement of TCSC for sensitivity reduction using heuristic methods [Volume 5, Issue 3, 2014, Pages 219-229]
-
Continious of operations
A Proposed Model for Organizational Gap Analysis to Implement Continuous and Hardening of Operations Requirements Base on BS 25999 [Volume 5, Issue 2, 2014, Pages 121-131]
-
Converter
Modeling the Reliability of Electric Power of an Energy Hub Considering Critical Situation [Volume 5, Issue 4, 2014, Pages 277-285]
-
Cross-Section of Tunnel
Investigation of the Effects of Tunnel Cross-Section Geometry on the Performance of the Lining Structure Subjected to External Blast Loading [Volume 5, Issue 1, 2014, Pages 61-69]
-
Cyber Security
(Detect attacks against web applications Using Combination of One-class Classifierss) [Volume 5, Issue 2, 2014, Pages 107-119]
D
-
Data Mining
A Malware Detection Method Based on Static Analysis of PE Structure [Volume 5, Issue 3, 2014, Pages 187-201]
-
Decryption
Breaking of Simplified-Data Encryption Standard Using optimized SPSO [Volume 5, Issue 3, 2014, Pages 203-210]
-
Detection
Monitoring of Uranium (VI) in Water Samples after Preconcentration with Modified Nanoporous Silica and Color Reaction by Br-PADAP [Volume 5, Issue 1, 2014, Pages 71-79]
-
Direct Non-Acyclic Graph
New Method to Improve Classification of Radar Object by Different Kernel of Support Vector Machine [Volume 5, Issue 1, 2014, Pages 1-8]
-
Disaster Management
Development of a Spatial Decision Support System Tool for Identifying Strategic Roads [Volume 5, Issue 1, 2014, Pages 49-59]
-
Disaster Recovery
A Proposed Model for Organizational Gap Analysis to Implement Continuous and Hardening of Operations Requirements Base on BS 25999 [Volume 5, Issue 2, 2014, Pages 121-131]
-
Displacement
Vibration Control of Frame Structures Subjected to the Blast Loading by Active Control Proposed Algorithm [Volume 5, Issue 1, 2014, Pages 43-48]
-
Distinguish attack
Design and Analysis of A New Secure Stream Cipher Algorithm [Volume 5, Issue 2, 2014, Pages 81-91]
-
Diversion Spyware
Protection of Operation System against Spywares and Diversion Them [Volume 5, Issue 2, 2014, Pages 147-157]
-
Dynamic Analysis
Investigation of the Effects of Tunnel Cross-Section Geometry on the Performance of the Lining Structure Subjected to External Blast Loading [Volume 5, Issue 1, 2014, Pages 61-69]
-
Dynamic Malware Analysis
Protection of Operation System against Spywares and Diversion Them [Volume 5, Issue 2, 2014, Pages 147-157]
E
-
Entropy Technique
A New Approach for Optimal Location of Power Dispatching Centers Based on Passive Defence Criteria Using EAHP [Volume 5, Issue 1, 2014, Pages 19-29]
F
-
FACTS Devices
Optimal placement of TCSC for sensitivity reduction using heuristic methods [Volume 5, Issue 3, 2014, Pages 219-229]
-
Finite Difference Method
Investigation of the Effects of Tunnel Cross-Section Geometry on the Performance of the Lining Structure Subjected to External Blast Loading [Volume 5, Issue 1, 2014, Pages 61-69]
-
Foam
A Comparative Investigation of the Toxic Materials Adsorbent Filters Based on Activated Carbon-Impregnated Polyurethane Foam Lining or Laminated Carbon Fiber [Volume 5, Issue 4, 2014, Pages 269-275]
-
Forced Outage Rate
Involving Defensive Approach in Unit Commitment Scheduling and Presenting Probability Model of Plants Inaccessibility [Volume 5, Issue 4, 2014, Pages 231-246]
G
-
Gap Analysis
A Proposed Model for Organizational Gap Analysis to Implement Continuous and Hardening of Operations Requirements Base on BS 25999 [Volume 5, Issue 2, 2014, Pages 121-131]
-
Geotechnical
Centrifuge Modeling of an Underground Structure Subjected to Blast Loading [Volume 5, Issue 1, 2014, Pages 31-41]
-
Glassy Carbon Electrode
Determination of Thiopental in Aqueous Media Using Catechol Electrocatalytic Properties [Volume 5, Issue 3, 2014, Pages 179-185]
H
-
Heuristic Method
An ANP Based Heuristic Method for Evaluating and Comparing Field Dress Camouflage Patterns [Volume 5, Issue 1, 2014, Pages 9-17]
-
Hybrid Cellular Automata
A New Image Encryption Method with Hybrid and Reversible Cellular Automata [Volume 5, Issue 4, 2014, Pages 257-267]
I
-
Image Encryption
A New Image Encryption Method with Hybrid and Reversible Cellular Automata [Volume 5, Issue 4, 2014, Pages 257-267]
-
Image Encryption
Cryptanalysis and Improvement of a New Chaotic Image Encryption Scheme [Volume 5, Issue 4, 2014, Pages 296-287]
-
Information Security
A Proposed Model for Organizational Gap Analysis to Implement Continuous and Hardening of Operations Requirements Base on BS 25999 [Volume 5, Issue 2, 2014, Pages 121-131]
-
Inter-Packet Gap
Modeling Noisy Channel on Internet for Hybrid Covert Timing Channel Evaluation [Volume 5, Issue 2, 2014, Pages 133-145]
-
Intrusion-Tolerance
A Trust Model with Tolerance against the Behavior of Malicious Users [Volume 5, Issue 2, 2014, Pages 93-106]
K
-
Kernel Function
New Method to Improve Classification of Radar Object by Different Kernel of Support Vector Machine [Volume 5, Issue 1, 2014, Pages 1-8]
-
Keywords: Filtration
A Comparative Investigation of the Toxic Materials Adsorbent Filters Based on Activated Carbon-Impregnated Polyurethane Foam Lining or Laminated Carbon Fiber [Volume 5, Issue 4, 2014, Pages 269-275]
-
Kinetic Energy
Vibration Control of Frame Structures Subjected to the Blast Loading by Active Control Proposed Algorithm [Volume 5, Issue 1, 2014, Pages 43-48]
L
-
Laminated Carbon Fabric
A Comparative Investigation of the Toxic Materials Adsorbent Filters Based on Activated Carbon-Impregnated Polyurethane Foam Lining or Laminated Carbon Fiber [Volume 5, Issue 4, 2014, Pages 269-275]
-
Linear and Differential Approximation
Cryptanalysis and Improvement of a New Chaotic Image Encryption Scheme [Volume 5, Issue 4, 2014, Pages 296-287]
M
-
Machine Learning
A Malware Detection Method Based on Static Analysis of PE Structure [Volume 5, Issue 3, 2014, Pages 187-201]
-
Malicious Behaviors
A Trust Model with Tolerance against the Behavior of Malicious Users [Volume 5, Issue 2, 2014, Pages 93-106]
-
Malware Detection
A Malware Detection Method Based on Static Analysis of PE Structure [Volume 5, Issue 3, 2014, Pages 187-201]
-
Markov Chain
Modeling the Reliability of Electric Power of an Energy Hub Considering Critical Situation [Volume 5, Issue 4, 2014, Pages 277-285]
-
Micro Grid
Online Smart Load Shedding in Micro Grid with Presence of Wind Turbine [Volume 5, Issue 3, 2014, Pages 159-166]
-
Modeling
Modeling Noisy Channel on Internet for Hybrid Covert Timing Channel Evaluation [Volume 5, Issue 2, 2014, Pages 133-145]
-
Multi-Carrier System
Modeling the Reliability of Electric Power of an Energy Hub Considering Critical Situation [Volume 5, Issue 4, 2014, Pages 277-285]
-
Multiclasses Classification Support Vector Machine
New Method to Improve Classification of Radar Object by Different Kernel of Support Vector Machine [Volume 5, Issue 1, 2014, Pages 1-8]
N
-
Nanoporous Silica
Monitoring of Uranium (VI) in Water Samples after Preconcentration with Modified Nanoporous Silica and Color Reaction by Br-PADAP [Volume 5, Issue 1, 2014, Pages 71-79]
-
Non-Automatic Unmanned Aerial Vehicles
Ortho-Photo Generation Using Non-Metric Cameras in Non-Automatic UAVs [Volume 5, Issue 3, 2014, Pages 167-177]
-
Nonmetric Cameras
Ortho-Photo Generation Using Non-Metric Cameras in Non-Automatic UAVs [Volume 5, Issue 3, 2014, Pages 167-177]
O
-
Ortho-Photo
Ortho-Photo Generation Using Non-Metric Cameras in Non-Automatic UAVs [Volume 5, Issue 3, 2014, Pages 167-177]
P
-
Packet Loss
Modeling Noisy Channel on Internet for Hybrid Covert Timing Channel Evaluation [Volume 5, Issue 2, 2014, Pages 133-145]
-
Packet Reordering
Modeling Noisy Channel on Internet for Hybrid Covert Timing Channel Evaluation [Volume 5, Issue 2, 2014, Pages 133-145]
-
Passive Defence
An ANP Based Heuristic Method for Evaluating and Comparing Field Dress Camouflage Patterns [Volume 5, Issue 1, 2014, Pages 9-17]
-
Passive Defence
A New Approach for Optimal Location of Power Dispatching Centers Based on Passive Defence Criteria Using EAHP [Volume 5, Issue 1, 2014, Pages 19-29]
-
Passive Defence
A Proposed Model for Organizational Gap Analysis to Implement Continuous and Hardening of Operations Requirements Base on BS 25999 [Volume 5, Issue 2, 2014, Pages 121-131]
-
Passive Defense
Online Smart Load Shedding in Micro Grid with Presence of Wind Turbine [Volume 5, Issue 3, 2014, Pages 159-166]
-
Passive Defense
Involving Defensive Approach in Unit Commitment Scheduling and Presenting Probability Model of Plants Inaccessibility [Volume 5, Issue 4, 2014, Pages 231-246]
-
Penetration Depth
Prediction of UXOâs Penetration Depth Using Numerical Simulation Bomb Trajectory with Case Study [Volume 5, Issue 4, 2014, Pages 247-256]
-
PE Structure
A Malware Detection Method Based on Static Analysis of PE Structure [Volume 5, Issue 3, 2014, Pages 187-201]
-
Petri-Net
Modeling Noisy Channel on Internet for Hybrid Covert Timing Channel Evaluation [Volume 5, Issue 2, 2014, Pages 133-145]
-
Physical Modeling
Centrifuge Modeling of an Underground Structure Subjected to Blast Loading [Volume 5, Issue 1, 2014, Pages 31-41]
-
Power Dispatching Centers
A New Approach for Optimal Location of Power Dispatching Centers Based on Passive Defence Criteria Using EAHP [Volume 5, Issue 1, 2014, Pages 19-29]
-
Projectile Trajectory
Prediction of UXOâs Penetration Depth Using Numerical Simulation Bomb Trajectory with Case Study [Volume 5, Issue 4, 2014, Pages 247-256]
Q
-
Quadrotor
Ortho-Photo Generation Using Non-Metric Cameras in Non-Automatic UAVs [Volume 5, Issue 3, 2014, Pages 167-177]
R
-
Reliability Evaluation
Modeling the Reliability of Electric Power of an Energy Hub Considering Critical Situation [Volume 5, Issue 4, 2014, Pages 277-285]
-
Renewable Resources
Modeling the Reliability of Electric Power of an Energy Hub Considering Critical Situation [Volume 5, Issue 4, 2014, Pages 277-285]
-
Reversible Cellular Automata
A New Image Encryption Method with Hybrid and Reversible Cellular Automata [Volume 5, Issue 4, 2014, Pages 257-267]
-
Road Capacity
Development of a Spatial Decision Support System Tool for Identifying Strategic Roads [Volume 5, Issue 1, 2014, Pages 49-59]
-
Road importance
Development of a Spatial Decision Support System Tool for Identifying Strategic Roads [Volume 5, Issue 1, 2014, Pages 49-59]
S
-
Sensor
Vibration Control of Frame Structures Subjected to the Blast Loading by Active Control Proposed Algorithm [Volume 5, Issue 1, 2014, Pages 43-48]
-
Simplified-Data Encryption Standard(S-DES)
Breaking of Simplified-Data Encryption Standard Using optimized SPSO [Volume 5, Issue 3, 2014, Pages 203-210]
-
Simulation
Prediction of UXOâs Penetration Depth Using Numerical Simulation Bomb Trajectory with Case Study [Volume 5, Issue 4, 2014, Pages 247-256]
-
Smart Load Shedding
Online Smart Load Shedding in Micro Grid with Presence of Wind Turbine [Volume 5, Issue 3, 2014, Pages 159-166]
-
Smart Structure
Vibration Control of Frame Structures Subjected to the Blast Loading by Active Control Proposed Algorithm [Volume 5, Issue 1, 2014, Pages 43-48]
-
S-OWA Operator
(Detect attacks against web applications Using Combination of One-class Classifierss) [Volume 5, Issue 2, 2014, Pages 107-119]
-
SPSO
Breaking of Simplified-Data Encryption Standard Using optimized SPSO [Volume 5, Issue 3, 2014, Pages 203-210]
-
Static Analysis
A Malware Detection Method Based on Static Analysis of PE Structure [Volume 5, Issue 3, 2014, Pages 187-201]
-
Storage
Modeling the Reliability of Electric Power of an Energy Hub Considering Critical Situation [Volume 5, Issue 4, 2014, Pages 277-285]
-
Strategic Roads
Development of a Spatial Decision Support System Tool for Identifying Strategic Roads [Volume 5, Issue 1, 2014, Pages 49-59]
-
Stream Cipher
Design and Analysis of A New Secure Stream Cipher Algorithm [Volume 5, Issue 2, 2014, Pages 81-91]
-
Support vector machine
New Method to Improve Classification of Radar Object by Different Kernel of Support Vector Machine [Volume 5, Issue 1, 2014, Pages 1-8]
T
-
Thermal Expansion Coefficient
Experimental investigation of thermal characteristics of Ultra high performance concrete [Volume 5, Issue 4, 2014, Pages 297-305]
-
Thiopental
Determination of Thiopental in Aqueous Media Using Catechol Electrocatalytic Properties [Volume 5, Issue 3, 2014, Pages 179-185]
-
Toxic
A Comparative Investigation of the Toxic Materials Adsorbent Filters Based on Activated Carbon-Impregnated Polyurethane Foam Lining or Laminated Carbon Fiber [Volume 5, Issue 4, 2014, Pages 269-275]
-
Trust
A Trust Model with Tolerance against the Behavior of Malicious Users [Volume 5, Issue 2, 2014, Pages 93-106]
U
-
Underground Structure
Centrifuge Modeling of an Underground Structure Subjected to Blast Loading [Volume 5, Issue 1, 2014, Pages 31-41]
-
Unit Commitment
Involving Defensive Approach in Unit Commitment Scheduling and Presenting Probability Model of Plants Inaccessibility [Volume 5, Issue 4, 2014, Pages 231-246]
-
Uranium (VI)
Monitoring of Uranium (VI) in Water Samples after Preconcentration with Modified Nanoporous Silica and Color Reaction by Br-PADAP [Volume 5, Issue 1, 2014, Pages 71-79]
-
UXO
Prediction of UXOâs Penetration Depth Using Numerical Simulation Bomb Trajectory with Case Study [Volume 5, Issue 4, 2014, Pages 247-256]
V
-
Virus Header
A Malware Detection Method Based on Static Analysis of PE Structure [Volume 5, Issue 3, 2014, Pages 187-201]
-
Voltammetry
Determination of Thiopental in Aqueous Media Using Catechol Electrocatalytic Properties [Volume 5, Issue 3, 2014, Pages 179-185]
-
Vulnerability
Development of a Spatial Decision Support System Tool for Identifying Strategic Roads [Volume 5, Issue 1, 2014, Pages 49-59]
W
-
Web-Applications
(Detect attacks against web applications Using Combination of One-class Classifierss) [Volume 5, Issue 2, 2014, Pages 107-119]
-
Wind Turbine
Online Smart Load Shedding in Micro Grid with Presence of Wind Turbine [Volume 5, Issue 3, 2014, Pages 159-166]
-
Word-Oriented Shift Register
Design and Analysis of A New Secure Stream Cipher Algorithm [Volume 5, Issue 2, 2014, Pages 81-91]
Your query does not match with any item