Keyword Index

A

  • Accessibility Development of a Spatial Decision Support System Tool for Identifying Strategic Roads [Volume 5, Issue 1, 2014, Pages 49-59]
  • Active Control Vibration Control of Frame Structures Subjected to the Blast Loading by Active Control Proposed Algorithm [Volume 5, Issue 1, 2014, Pages 43-48]
  • Actuator Vibration Control of Frame Structures Subjected to the Blast Loading by Active Control Proposed Algorithm [Volume 5, Issue 1, 2014, Pages 43-48]
  • Algebric attack Design and Analysis of A New Secure Stream Cipher Algorithm [Volume 5, Issue 2, 2014, Pages 81-91]
  • Analytic Hierarchy Process A New Approach for Optimal Location of Power Dispatching Centers Based on Passive Defence Criteria Using EAHP [Volume 5, Issue 1, 2014, Pages 19-29]
  • Analytic Network Process(ANP) An ANP Based Heuristic Method for Evaluating and Comparing Field Dress Camouflage Patterns [Volume 5, Issue 1, 2014, Pages 9-17]
  • Anti Blocker Protection of Operation System against Spywares and Diversion Them [Volume 5, Issue 2, 2014, Pages 147-157]
  • Anti-Key Logger Protection of Operation System against Spywares and Diversion Them [Volume 5, Issue 2, 2014, Pages 147-157]
  • Anti-Spyware Protection of Operation System against Spywares and Diversion Them [Volume 5, Issue 2, 2014, Pages 147-157]

B

  • Battledress An ANP Based Heuristic Method for Evaluating and Comparing Field Dress Camouflage Patterns [Volume 5, Issue 1, 2014, Pages 9-17]
  • Behavioral Analysis A Malware Detection Method Based on Static Analysis of PE Structure [Volume 5, Issue 3, 2014, Pages 187-201]
  • Blast Load Vibration Control of Frame Structures Subjected to the Blast Loading by Active Control Proposed Algorithm [Volume 5, Issue 1, 2014, Pages 43-48]
  • Blast Loading Centrifuge Modeling of an Underground Structure Subjected to Blast Loading [Volume 5, Issue 1, 2014, Pages 31-41]
  • Blast Loading Investigation of the Effects of Tunnel Cross-Section Geometry on the Performance of the Lining Structure Subjected to External Blast Loading [Volume 5, Issue 1, 2014, Pages 61-69]
  • Br-PADAP Monitoring of Uranium (VI) in Water Samples after Preconcentration with Modified Nanoporous Silica and Color Reaction by Br-PADAP [Volume 5, Issue 1, 2014, Pages 71-79]
  • Business Continuity A Proposed Model for Organizational Gap Analysis to Implement Continuous and Hardening of Operations Requirements Base on BS 25999 [Volume 5, Issue 2, 2014, Pages 121-131]

C

  • Camouflage Patterns An ANP Based Heuristic Method for Evaluating and Comparing Field Dress Camouflage Patterns [Volume 5, Issue 1, 2014, Pages 9-17]
  • Catechol Determination of Thiopental in Aqueous Media Using Catechol Electrocatalytic Properties [Volume 5, Issue 3, 2014, Pages 179-185]
  • Centrifuge Centrifuge Modeling of an Underground Structure Subjected to Blast Loading [Volume 5, Issue 1, 2014, Pages 31-41]
  • Chaotic Map Cryptanalysis and Improvement of a New Chaotic Image Encryption Scheme [Volume 5, Issue 4, 2014, Pages 296-287]
  • Combination of One-class Classifiers (Detect attacks against web applications Using Combination of One-class Classifierss) [Volume 5, Issue 2, 2014, Pages 107-119]
  • Congestion Management Optimal placement of TCSC for sensitivity reduction using heuristic methods [Volume 5, Issue 3, 2014, Pages 219-229]
  • Continious of operations A Proposed Model for Organizational Gap Analysis to Implement Continuous and Hardening of Operations Requirements Base on BS 25999 [Volume 5, Issue 2, 2014, Pages 121-131]
  • Converter Modeling the Reliability of Electric Power of an Energy Hub Considering Critical Situation [Volume 5, Issue 4, 2014, Pages 277-285]
  • Cross-Section of Tunnel Investigation of the Effects of Tunnel Cross-Section Geometry on the Performance of the Lining Structure Subjected to External Blast Loading [Volume 5, Issue 1, 2014, Pages 61-69]
  • Cyber Security (Detect attacks against web applications Using Combination of One-class Classifierss) [Volume 5, Issue 2, 2014, Pages 107-119]

D

  • Data Mining A Malware Detection Method Based on Static Analysis of PE Structure [Volume 5, Issue 3, 2014, Pages 187-201]
  • Decryption Breaking of Simplified-Data Encryption Standard Using optimized SPSO [Volume 5, Issue 3, 2014, Pages 203-210]
  • Detection Monitoring of Uranium (VI) in Water Samples after Preconcentration with Modified Nanoporous Silica and Color Reaction by Br-PADAP [Volume 5, Issue 1, 2014, Pages 71-79]
  • Direct Non-Acyclic Graph New Method to Improve Classification of Radar Object by Different Kernel of Support Vector Machine [Volume 5, Issue 1, 2014, Pages 1-8]
  • Disaster Management Development of a Spatial Decision Support System Tool for Identifying Strategic Roads [Volume 5, Issue 1, 2014, Pages 49-59]
  • Disaster Recovery A Proposed Model for Organizational Gap Analysis to Implement Continuous and Hardening of Operations Requirements Base on BS 25999 [Volume 5, Issue 2, 2014, Pages 121-131]
  • Displacement Vibration Control of Frame Structures Subjected to the Blast Loading by Active Control Proposed Algorithm [Volume 5, Issue 1, 2014, Pages 43-48]
  • Distinguish attack Design and Analysis of A New Secure Stream Cipher Algorithm [Volume 5, Issue 2, 2014, Pages 81-91]
  • Diversion Spyware Protection of Operation System against Spywares and Diversion Them [Volume 5, Issue 2, 2014, Pages 147-157]
  • Dynamic Analysis Investigation of the Effects of Tunnel Cross-Section Geometry on the Performance of the Lining Structure Subjected to External Blast Loading [Volume 5, Issue 1, 2014, Pages 61-69]
  • Dynamic Malware Analysis Protection of Operation System against Spywares and Diversion Them [Volume 5, Issue 2, 2014, Pages 147-157]

E

  • Entropy Technique A New Approach for Optimal Location of Power Dispatching Centers Based on Passive Defence Criteria Using EAHP [Volume 5, Issue 1, 2014, Pages 19-29]

F

  • FACTS Devices Optimal placement of TCSC for sensitivity reduction using heuristic methods [Volume 5, Issue 3, 2014, Pages 219-229]
  • Finite Difference Method Investigation of the Effects of Tunnel Cross-Section Geometry on the Performance of the Lining Structure Subjected to External Blast Loading [Volume 5, Issue 1, 2014, Pages 61-69]
  • Foam A Comparative Investigation of the Toxic Materials Adsorbent Filters Based on Activated Carbon-Impregnated Polyurethane Foam Lining or Laminated Carbon Fiber [Volume 5, Issue 4, 2014, Pages 269-275]
  • Forced Outage Rate Involving Defensive Approach in Unit Commitment Scheduling and Presenting Probability Model of Plants Inaccessibility [Volume 5, Issue 4, 2014, Pages 231-246]

G

  • Gap Analysis A Proposed Model for Organizational Gap Analysis to Implement Continuous and Hardening of Operations Requirements Base on BS 25999 [Volume 5, Issue 2, 2014, Pages 121-131]
  • Geotechnical Centrifuge Modeling of an Underground Structure Subjected to Blast Loading [Volume 5, Issue 1, 2014, Pages 31-41]
  • Glassy Carbon Electrode Determination of Thiopental in Aqueous Media Using Catechol Electrocatalytic Properties [Volume 5, Issue 3, 2014, Pages 179-185]

H

  • Heuristic Method An ANP Based Heuristic Method for Evaluating and Comparing Field Dress Camouflage Patterns [Volume 5, Issue 1, 2014, Pages 9-17]
  • Hybrid Cellular Automata A New Image Encryption Method with Hybrid and Reversible Cellular Automata [Volume 5, Issue 4, 2014, Pages 257-267]

I

  • Image Encryption A New Image Encryption Method with Hybrid and Reversible Cellular Automata [Volume 5, Issue 4, 2014, Pages 257-267]
  • Image Encryption Cryptanalysis and Improvement of a New Chaotic Image Encryption Scheme [Volume 5, Issue 4, 2014, Pages 296-287]
  • Information Security A Proposed Model for Organizational Gap Analysis to Implement Continuous and Hardening of Operations Requirements Base on BS 25999 [Volume 5, Issue 2, 2014, Pages 121-131]
  • Inter-Packet Gap Modeling Noisy Channel on Internet for Hybrid Covert Timing Channel Evaluation [Volume 5, Issue 2, 2014, Pages 133-145]
  • Intrusion-Tolerance A Trust Model with Tolerance against the Behavior of Malicious Users [Volume 5, Issue 2, 2014, Pages 93-106]

K

  • Kernel Function New Method to Improve Classification of Radar Object by Different Kernel of Support Vector Machine [Volume 5, Issue 1, 2014, Pages 1-8]
  • Keywords: Filtration A Comparative Investigation of the Toxic Materials Adsorbent Filters Based on Activated Carbon-Impregnated Polyurethane Foam Lining or Laminated Carbon Fiber [Volume 5, Issue 4, 2014, Pages 269-275]
  • Kinetic Energy Vibration Control of Frame Structures Subjected to the Blast Loading by Active Control Proposed Algorithm [Volume 5, Issue 1, 2014, Pages 43-48]

L

  • Laminated Carbon Fabric A Comparative Investigation of the Toxic Materials Adsorbent Filters Based on Activated Carbon-Impregnated Polyurethane Foam Lining or Laminated Carbon Fiber [Volume 5, Issue 4, 2014, Pages 269-275]
  • Linear and Differential Approximation Cryptanalysis and Improvement of a New Chaotic Image Encryption Scheme [Volume 5, Issue 4, 2014, Pages 296-287]

M

  • Machine Learning A Malware Detection Method Based on Static Analysis of PE Structure [Volume 5, Issue 3, 2014, Pages 187-201]
  • Malicious Behaviors A Trust Model with Tolerance against the Behavior of Malicious Users [Volume 5, Issue 2, 2014, Pages 93-106]
  • Malware Detection A Malware Detection Method Based on Static Analysis of PE Structure [Volume 5, Issue 3, 2014, Pages 187-201]
  • Markov Chain Modeling the Reliability of Electric Power of an Energy Hub Considering Critical Situation [Volume 5, Issue 4, 2014, Pages 277-285]
  • Micro Grid Online Smart Load Shedding in Micro Grid with Presence of Wind Turbine [Volume 5, Issue 3, 2014, Pages 159-166]
  • Modeling Modeling Noisy Channel on Internet for Hybrid Covert Timing Channel Evaluation [Volume 5, Issue 2, 2014, Pages 133-145]
  • Multi-Carrier System Modeling the Reliability of Electric Power of an Energy Hub Considering Critical Situation [Volume 5, Issue 4, 2014, Pages 277-285]
  • Multiclasses Classification Support Vector Machine New Method to Improve Classification of Radar Object by Different Kernel of Support Vector Machine [Volume 5, Issue 1, 2014, Pages 1-8]

N

  • Nanoporous Silica Monitoring of Uranium (VI) in Water Samples after Preconcentration with Modified Nanoporous Silica and Color Reaction by Br-PADAP [Volume 5, Issue 1, 2014, Pages 71-79]
  • Non-Automatic Unmanned Aerial Vehicles Ortho-Photo Generation Using Non-Metric Cameras in Non-Automatic UAVs [Volume 5, Issue 3, 2014, Pages 167-177]
  • Nonmetric Cameras Ortho-Photo Generation Using Non-Metric Cameras in Non-Automatic UAVs [Volume 5, Issue 3, 2014, Pages 167-177]

O

  • Ortho-Photo Ortho-Photo Generation Using Non-Metric Cameras in Non-Automatic UAVs [Volume 5, Issue 3, 2014, Pages 167-177]

P

  • Packet Loss Modeling Noisy Channel on Internet for Hybrid Covert Timing Channel Evaluation [Volume 5, Issue 2, 2014, Pages 133-145]
  • Packet Reordering Modeling Noisy Channel on Internet for Hybrid Covert Timing Channel Evaluation [Volume 5, Issue 2, 2014, Pages 133-145]
  • Passive Defence An ANP Based Heuristic Method for Evaluating and Comparing Field Dress Camouflage Patterns [Volume 5, Issue 1, 2014, Pages 9-17]
  • Passive Defence A New Approach for Optimal Location of Power Dispatching Centers Based on Passive Defence Criteria Using EAHP [Volume 5, Issue 1, 2014, Pages 19-29]
  • Passive Defence A Proposed Model for Organizational Gap Analysis to Implement Continuous and Hardening of Operations Requirements Base on BS 25999 [Volume 5, Issue 2, 2014, Pages 121-131]
  • Passive Defense Online Smart Load Shedding in Micro Grid with Presence of Wind Turbine [Volume 5, Issue 3, 2014, Pages 159-166]
  • Passive Defense Involving Defensive Approach in Unit Commitment Scheduling and Presenting Probability Model of Plants Inaccessibility [Volume 5, Issue 4, 2014, Pages 231-246]
  • Penetration Depth Prediction of UXO’s Penetration Depth Using Numerical Simulation Bomb Trajectory with Case Study [Volume 5, Issue 4, 2014, Pages 247-256]
  • PE Structure A Malware Detection Method Based on Static Analysis of PE Structure [Volume 5, Issue 3, 2014, Pages 187-201]
  • Petri-Net Modeling Noisy Channel on Internet for Hybrid Covert Timing Channel Evaluation [Volume 5, Issue 2, 2014, Pages 133-145]
  • Physical Modeling Centrifuge Modeling of an Underground Structure Subjected to Blast Loading [Volume 5, Issue 1, 2014, Pages 31-41]
  • Power Dispatching Centers A New Approach for Optimal Location of Power Dispatching Centers Based on Passive Defence Criteria Using EAHP [Volume 5, Issue 1, 2014, Pages 19-29]
  • Projectile Trajectory Prediction of UXO’s Penetration Depth Using Numerical Simulation Bomb Trajectory with Case Study [Volume 5, Issue 4, 2014, Pages 247-256]

Q

  • Quadrotor Ortho-Photo Generation Using Non-Metric Cameras in Non-Automatic UAVs [Volume 5, Issue 3, 2014, Pages 167-177]

R

  • Reliability Evaluation Modeling the Reliability of Electric Power of an Energy Hub Considering Critical Situation [Volume 5, Issue 4, 2014, Pages 277-285]
  • Renewable Resources Modeling the Reliability of Electric Power of an Energy Hub Considering Critical Situation [Volume 5, Issue 4, 2014, Pages 277-285]
  • Reversible Cellular Automata A New Image Encryption Method with Hybrid and Reversible Cellular Automata [Volume 5, Issue 4, 2014, Pages 257-267]
  • Road Capacity Development of a Spatial Decision Support System Tool for Identifying Strategic Roads [Volume 5, Issue 1, 2014, Pages 49-59]
  • Road importance Development of a Spatial Decision Support System Tool for Identifying Strategic Roads [Volume 5, Issue 1, 2014, Pages 49-59]

S

  • Sensor Vibration Control of Frame Structures Subjected to the Blast Loading by Active Control Proposed Algorithm [Volume 5, Issue 1, 2014, Pages 43-48]
  • Simplified-Data Encryption Standard(S-DES) Breaking of Simplified-Data Encryption Standard Using optimized SPSO [Volume 5, Issue 3, 2014, Pages 203-210]
  • Simulation Prediction of UXO’s Penetration Depth Using Numerical Simulation Bomb Trajectory with Case Study [Volume 5, Issue 4, 2014, Pages 247-256]
  • Smart Load Shedding Online Smart Load Shedding in Micro Grid with Presence of Wind Turbine [Volume 5, Issue 3, 2014, Pages 159-166]
  • Smart Structure Vibration Control of Frame Structures Subjected to the Blast Loading by Active Control Proposed Algorithm [Volume 5, Issue 1, 2014, Pages 43-48]
  • S-OWA Operator (Detect attacks against web applications Using Combination of One-class Classifierss) [Volume 5, Issue 2, 2014, Pages 107-119]
  • SPSO Breaking of Simplified-Data Encryption Standard Using optimized SPSO [Volume 5, Issue 3, 2014, Pages 203-210]
  • Static Analysis A Malware Detection Method Based on Static Analysis of PE Structure [Volume 5, Issue 3, 2014, Pages 187-201]
  • Storage Modeling the Reliability of Electric Power of an Energy Hub Considering Critical Situation [Volume 5, Issue 4, 2014, Pages 277-285]
  • Strategic Roads Development of a Spatial Decision Support System Tool for Identifying Strategic Roads [Volume 5, Issue 1, 2014, Pages 49-59]
  • Stream Cipher Design and Analysis of A New Secure Stream Cipher Algorithm [Volume 5, Issue 2, 2014, Pages 81-91]
  • Support vector machine New Method to Improve Classification of Radar Object by Different Kernel of Support Vector Machine [Volume 5, Issue 1, 2014, Pages 1-8]

T

  • Thermal Expansion Coefficient Experimental investigation of thermal characteristics of Ultra high performance concrete [Volume 5, Issue 4, 2014, Pages 297-305]
  • Thiopental Determination of Thiopental in Aqueous Media Using Catechol Electrocatalytic Properties [Volume 5, Issue 3, 2014, Pages 179-185]
  • Toxic A Comparative Investigation of the Toxic Materials Adsorbent Filters Based on Activated Carbon-Impregnated Polyurethane Foam Lining or Laminated Carbon Fiber [Volume 5, Issue 4, 2014, Pages 269-275]
  • Trust A Trust Model with Tolerance against the Behavior of Malicious Users [Volume 5, Issue 2, 2014, Pages 93-106]

U

  • Underground Structure Centrifuge Modeling of an Underground Structure Subjected to Blast Loading [Volume 5, Issue 1, 2014, Pages 31-41]
  • Unit Commitment Involving Defensive Approach in Unit Commitment Scheduling and Presenting Probability Model of Plants Inaccessibility [Volume 5, Issue 4, 2014, Pages 231-246]
  • Uranium (VI) Monitoring of Uranium (VI) in Water Samples after Preconcentration with Modified Nanoporous Silica and Color Reaction by Br-PADAP [Volume 5, Issue 1, 2014, Pages 71-79]
  • UXO Prediction of UXO’s Penetration Depth Using Numerical Simulation Bomb Trajectory with Case Study [Volume 5, Issue 4, 2014, Pages 247-256]

V

  • Virus Header A Malware Detection Method Based on Static Analysis of PE Structure [Volume 5, Issue 3, 2014, Pages 187-201]
  • Voltammetry Determination of Thiopental in Aqueous Media Using Catechol Electrocatalytic Properties [Volume 5, Issue 3, 2014, Pages 179-185]
  • Vulnerability Development of a Spatial Decision Support System Tool for Identifying Strategic Roads [Volume 5, Issue 1, 2014, Pages 49-59]

W

  • Web-Applications (Detect attacks against web applications Using Combination of One-class Classifierss) [Volume 5, Issue 2, 2014, Pages 107-119]
  • Wind Turbine Online Smart Load Shedding in Micro Grid with Presence of Wind Turbine [Volume 5, Issue 3, 2014, Pages 159-166]
  • Word-Oriented Shift Register Design and Analysis of A New Secure Stream Cipher Algorithm [Volume 5, Issue 2, 2014, Pages 81-91]