Search Results/Filters    

Filters

Year

Banks



Expert Group










Full-Text


Author(s): 

LEVITT T.

Issue Info: 
  • Year: 

    1965
  • Volume: 

    43
  • Issue: 

    -
  • Pages: 

    81-94
Measures: 
  • Citations: 

    1
  • Views: 

    875
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 875

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

PARSA S. | ZEINIPOUR M.

Issue Info: 
  • Year: 

    2016
  • Volume: 

    4
  • Issue: 

    1 (13)
  • Pages: 

    35-50
Measures: 
  • Citations: 

    0
  • Views: 

    1339
  • Downloads: 

    0
Abstract: 

Existence of a vulnerability for hackers don’t be exploitable only and whatever give credit to vulnerability is exploit. Automated exploit Generation (AEG) confront problems because of various protections, behavior and vulnerability conditions but nonetheless had did researches in subject. Whatever I had peruse in this thesis is possibility of automated exploit generation for vulnerabilities of Internet Explorer (IE) 7 & 8 in Win XP and Win 7. Generated exploits are for two vulnerability type: Stack Buffer Overflow and Function Pointer Overwrite. In my savory method that use from instrumentation tools, would hoarded necessary information from program through dynamic analysis. In this method has detected vulnerability type and has bypassed methods of protections and has showing proper patterns for exploit. Must I reminisce you that in the project don’t discovery vulnerability and there are vulnerability.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1339

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Moghaddasi A. | BAGHERI M.

Issue Info: 
  • Year: 

    2021
  • Volume: 

    9
  • Issue: 

    2
  • Pages: 

    101-119
Measures: 
  • Citations: 

    0
  • Views: 

    87
  • Downloads: 

    15
Abstract: 

Fuzzers can reveal vulnerabilities in the software by generating test input data and feeding inputs to software under test. The approach of grammar-based fuzzers is to search in the domain of test data which can be generated by grammar in order to find an attack vector with the ability to exploit the vulnerability. The challenge of fuzzers is a very large or infinite search domain and finding the answer in this domain is a hard problem. Grammatical Evolution(GE) is one of the evolutionary algorithms that can utilize grammar to solve the search problem. In this research, a new approach for generation of fuzz test input data by using grammatical evolution is introduced to exploit the cross-site scripting vulnerabilities. For this purpose, a grammar for generating of XSS attack vectors is presented and a fitness calculation function is proposed to guide the GE in search for exploitation. This method has realized the automatic exploitation of vulnerability with black-box approach. In the results of this research, 19% improvement achieved in the number of vulnerabilities discovered compared to the white-box method of NAVEX and black-box ZAP tool, and without any false positives.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 87

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 15 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2021
  • Volume: 

    5
  • Issue: 

    9
  • Pages: 

    0-0
Measures: 
  • Citations: 

    0
  • Views: 

    40
  • Downloads: 

    0
Abstract: 

Viruses are pathogens that strictly depend on their host for propagation. Over years of co-evolution viruses have become experts in exploiting the host cell biology and physiology to ensure efficient replication and spread. Here, we will first summarize the concepts that have emerged from in vitro cell culture studies to understand virus spread. We will then review the results from studies in living animals that reveal how viruses exploit the natural flow of body fluids, specific tissue architecture, and patterns of cell circulation and migration to spread within the host. Understanding tissue physiology will be critical for the design of antiviral strategies that prevent virus dissemination.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 40

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2023
  • Volume: 

    11
  • Issue: 

    1
  • Pages: 

    85-102
Measures: 
  • Citations: 

    0
  • Views: 

    28
  • Downloads: 

    6
Abstract: 

Background and Objectives: Big data is a combination of structured, semi-structured and unstructured data collected by organizations that must be stored and used for decision-making. Businesses that deal with the business intelligence system, as well as their data sources, have a major challenge in exploiting Big Data. The current architecture of business intelligence systems is not capable of incorporating and exploiting Big Data. In this paper, an architecture is developed to respond to this challenge. Methods: This paper focuses on the promotion of business intelligence to create an ability to exploit Big Data in business intelligence. In this regard, a new architecture is proposed to integrate both Business Intelligence and Big Data architectures. To evaluate the proposed architecture, we investigated business intelligence architecture and Big Data architecture. Then, we developed a Unified Modeling Language diagram for the proposed architecture. In addition, using the Colored Petri-Net, the proposed architecture is evaluated in a case study. Results: The results show that our architectural system has a higher efficiency in performing all steps, average time, and maximum time compared to business intelligence architecture.Conclusion: The proposed architecture can help companies and organizations gain more value from their data sources and better support managers and organizations in their decision-making.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 28

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 6 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

MOHAMMADI DARYOUSH

Journal: 

Journal of Fisheries

Issue Info: 
  • Year: 

    2020
  • Volume: 

    72
  • Issue: 

    4
  • Pages: 

    353-362
Measures: 
  • Citations: 

    0
  • Views: 

    718
  • Downloads: 

    0
Abstract: 

In recent years, the exploitation of aquatic reserves in the world has played a major role in the food industry. Therefore, seaside governments have sought to exploit new opportunities to meet the growing international demand for fish and fishery products by investing in modern fishing fleets and processing plants. But many of the fishery reserves have been damaged by overfishing and uncontrollable fishing. Clear signs are threatening the over-exploitation of valuable fishery stocks, changes in ecosystems, heavy economic losses, international disputes over fisheries management and trade, the long-term sustainability of fisheries and its contribution to food. Governments have therefore sought to take greater account of modern environmental and legal approaches to fisheries management, protecting environmental and environmental issues, as well as economic and social considerations. This descriptive and analytical study has concluded that fisheries and the right to exploit aquatic reserves are of particular sensitivity among the various sectors subject to complementary measures by the UN Conference on the Environment and Internal Rights of Iran. The main laws on the right to exploit aquatic life have been enacted by the Law on the Establishment of the Iranian Fisheries Organization and the Implementing Regulations of the Law on the Conservation and Management of Water Resources of the Islamic Republic of Iran. It is the jurisdiction of the Islamic Republic of Iran and the obligations set forth in the Law on the Conservation and exploitation of the Marine Resources of the Islamic Republic of Iran are in a manner reflective of international regulations.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 718

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

UMBACH D.M. | WEINBERG C.R.

Issue Info: 
  • Year: 

    1997
  • Volume: 

    16
  • Issue: 

    -
  • Pages: 

    1731-1743
Measures: 
  • Citations: 

    1
  • Views: 

    148
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 148

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2018
  • Volume: 

    9
  • Issue: 

    37
  • Pages: 

    35-66
Measures: 
  • Citations: 

    0
  • Views: 

    257
  • Downloads: 

    0
Abstract: 

The success, growth and long-term survival of an organization depend on its ability to exploit current capabilities and simultaneously explore the new competencies. Numerous articles have been devoted to the study of organizational ambidexterity in innovation, organizational and strategic management literature. Some indicated the important role of ambidexterity in organizations' performance. Others brought up that it is not so significant, and this question is yet to be answered. So far, several literature reviews and meta-analysis have been conducted on this construct, which has been focused on limited specific aspects. But to the best of our knowledge, there is no comprehensive review of both qualitative and quantitative studies which include all types of performance and also highlight the different conceptualization of organizational ambidexterity. Therefore, this comprehensive systematic review of 134 qualitative and quantitative studies during 1991-2016 has pursued two major goals: First identifying different conceptualizations of exploration and exploitation, and second, identifying the causes of different effects of organizational ambidexterity on performance in previous studies. The review results found 15 different conceptualizations of exploration– exploitation; and also six reasons for the different results of previous research on the impact of organizational ambidexterity on performance have been identified, including measurement of organizational ambidexterity, level of analysis, research design, implementing organizational ambidexterity, performance measurement, and organizational ambidexterity conceptualization, each with its own dimensions.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 257

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2023
  • Volume: 

    15
  • Issue: 

    4
  • Pages: 

    257-237
Measures: 
  • Citations: 

    0
  • Views: 

    13
  • Downloads: 

    0
Abstract: 

Introduction: As the competition in sports businesses becomes more complex, time and information have become important in decision making. Therefore, intuition can be the best option for entrepreneurs. Therefore, this research seeks to find the role of inspiration in deciding to exploit entrepreneurial opportunities. Methods: This research is in terms of mixed method, in terms of developmental-applicative goal, and in terms of strategy, it is meta-analysis in the review section and Delphi and thematic analysis in the qualitative section. Results: In the first step, 42 indicators were identified from the 26 articles, in the second step, 29 indicators were extracted by theme analysis and 23 indicators were confirmed by the Delphi method. and in the third step, 40 themes from the lived experience of 6 sports entrepreneur leaders were identified by the research narrative method, the reliability of coding was confirmed by the Holstein reliability coefficient method, and finally, after the combination and integration of the triple steps, 63 indicators were identified, which fit and validity 61 indicators in the form of 10 dimensions were confirmed using t-test and the four criteria of adaptation, comprehensibility, generalization and control. Conclusion: According to the findings, entrepreneurial inspiration by creating eight roles of intelligence capabilities, improving decision-making, entrepreneurial intention, improving entrepreneurial attitude, facilitating business, strengthening the spirit and personality of the entrepreneur, recognizing the opportunity and the effectiveness of the opportunity in the decision to take advantage of entrepreneurial opportunities, and by focusing on the dimensions of uncertainty and decision-making Rationality plays a negative role in the decision to take advantage of entrepreneurial opportunities.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 13

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2020
  • Volume: 

    8
  • Issue: 

    3
  • Pages: 

    276-302
Measures: 
  • Citations: 

    0
  • Views: 

    240
  • Downloads: 

    0
Abstract: 

The education system is one of the most important pillars of every country's development, and this critical institution and its human products play a decisive role in the development of countries. Management in educational systems is more important and more difficult, because it deals with human achievement. And among these, school management also has a special role in society because, if we are to achieve a desirable society, we must have successful schools. And this is possible if we have successful school principals. In order to realize this goal, it is necessary to identify the problems of school management by studying the current situation in our schools. And one of their most pressing problems is exploiting the subways. exploiting subordinates by managers can have an impact on organizational performance. Today, the most important competitive advantage of organizations is in the field of human beings. Obviously, organizations with the appropriate intellectual and human capital will outperform other competitors in the field of competition, exploiting managers of a disadvantage and as a barrier to development from existing status to desirable status. It is and can be a threat to the desired goals of educational planning, so it is a social issue that requires theoretical perspectives to identify this damage and models for explaining social problems. The purpose of this study was to present and describe the lived experiences of school staff about the reasons some principals tend to exploit subordinates in education in order to provide a clear picture of the abuses and the underlying factors of these exploitation. Many managers seem to be inclined to do so, but there is insufficient scientific research on the prevalence of such behavior, which doubles the need to delve deeper into the depth-based approach. In this study, based on the social commentary paradigm, using descriptive phenomenological method, while analyzing the lived experiences of teachers and assistants and understanding their views and gaining a deep understanding of the phenomenon under study, it is searched the causes of managers' tendency to exploit subordinates and offenders be identified and represent it in activities. The phenomenological focus is on the experiences of life, the ones that make sense of each phenomenon for each individual and tell the person what is real and real in his or her life. In order to collect data, through purposeful sampling and semi-structured interviews 10 teachers and school principals of Mahdi Shahr, Semnan province were inter viewed. These kinds of inter views, because of their flexibility and depth for qualitative research are appropriate. The questions were prepared as an interview guide in advance and an interview protocol was developed to guide the interview process. Prior to the start of the interview, participants were allowed to record the interviews to increase accuracy and robustness of the same findings and to prevent forgetfulness of recall. Interview transcript was transcribed verbatim after repeated listening to be analyzed. Their lived experiences were then analyzed in depth using Colaizzi's seven-step strategy. In order to increase the credibility, transferability, dependability and confirmability, peer debriefing, negative case analysis, triangulation, member check, explaining the exact details of the data collection and analysis process, long-term immersion, and "inspection and verification at coding time", were utilized. Qualitative writing involves the reporting of textual data and is characterized by vocabulary, topics, and writings. Often participant direct quotes and singular first person pronoun, or in the term "active voice" are used. Such a sound leads to more assurance that in the present study also tried to take into account the features mentioned in the writing. Accuracy and diligence in the lived experience of staff and successive comparisons led to the identification of 4 main factors and 24 sub-factors of education managers' tendency to exploit. The most frequent ones are "how to appoint managers"; "professional characteristics of managers"; "ethical characteristics of managers"; and "subordinate ethics". It should be noted, however, that the ethical characteristics of managers and subordinates were similar to those of the participants. And these four themes can provide a clear picture of the reasons for managers' tendency to exploit. The first theme is how to appoint managers having 9 themes as follows: Appointment of managers due to lack of manpower; Appointment regardless of work experience and background; Appointment without regard to related field (management); Appointment of managers unfamiliar with job duties Self-appointment due to receiving end-of-service remuneration; Appointment without interest; Appointment without specific selection and filtering; Appointment by individualism and by pleading and appointment without regard to eligibility and meritocracy. The second theme, namely the professional characteristics of managers, has five themes as follows: Navigating systemic and computer tasks; managing the backyard; lacking in responsibility; refusing to perform tasks and learning tasks and being idealistic. The third theme, namely, the ethical and personality characteristics of managers, has five themes: tyranny and dominance of managers; opportunism and abuse of manager; comparability of manager; power seeking and sense of superiority and manager and leader. Being a manager. And finally, the fourth theme, namely the subconscious morality, has five themes as follows: Subordinate cowards; inherently oppressed employees; having emotional relationships with the manager; Subordinate commitment and acceptance of responsibility subject to working or financial conditions. The result of these factors will be the greater the productivity of the educational system in the longer term and the achievement of its transcendent goals. And given that the ultimate solutions to educational problems and problems are in the hands of educational managers, the potentials and abilities of managers need to be developed as far as possible. The results of this study can be used to develop programs to help develop and enhance the professional competencies of school principals and reduce the damage caused by neglect. Following are some practical suggestions and suggestions based on the research findings. Including: the necessity of holding short-term courses for new appointment managers, as well as meeting with experts and administrative assistants to justify their managerial and managerial duties and acquaintance with new directives, style sheets and guidelines; appropriate use of colleagues' opinions in relation to the selection of managers can be provided; while stricter management requirements, they must create the necessary attractions, both financially and spiritually, to welcome the talented and innovative people from the management post.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 240

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button