Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 467
1.
  • Achievability Proof via Out... Achievability Proof via Output Statistics of Random Binning
    Yassaee, Mohammad Hossein; Aref, Mohammad Reza; Gohari, Amin IEEE transactions on information theory, 11/2014, Volume: 60, Issue: 11
    Journal Article
    Peer reviewed

    This paper introduces a new and ubiquitous framework for establishing achievability results in network information theory problems. The framework uses random binning arguments and is based on a ...
Full text
Available for: IJS, NUK, UL

PDF
2.
  • A secure ECC-based privacy ... A secure ECC-based privacy preserving data aggregation scheme for smart grids
    Vahedi, Erfaneh; Bayat, Majid; Pakravan, Mohammad Reza ... Computer networks (Amsterdam, Netherlands : 1999), 12/2017, Volume: 129
    Journal Article
    Peer reviewed

    Development of Smart Grid and deployment of smart meters in large scale has raised a lot of concerns regarding customers’ privacy. Consequently, several schemes have been proposed to overcome the ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP
3.
  • Strategies for Optimal Tran... Strategies for Optimal Transmission and Delay Reduction in Dynamic Index Coding Problem
    Hadi, Mohammad; Mojahedian, Mohammad Mahdi; Aref, Mohammad Reza ... IEEE transactions on communications, 2023-Aug., 2023-8-00, Volume: 71, Issue: 8
    Journal Article
    Peer reviewed

    Dynamic index coding is a practical generalization of conventional index coding that deals with real dynamic traffic streams. We identify the code-constrained capacity region of a dynamic index ...
Full text
Available for: IJS, NUK, UL
4.
  • Developing a navigation, gu... Developing a navigation, guidance and obstacle avoidance algorithm for an Unmanned Surface Vehicle (USV) by algorithms fusion
    Mousazadeh, Hossein; Jafarbiglu, Hamid; Abdolmaleki, Hamid ... Ocean engineering, 07/2018, Volume: 159
    Journal Article
    Peer reviewed

    Many USVs are equipped with navigation, guidance and control (NGC) algorithms due to human errors that is present in manual navigation of surface vehicles. The Morvarid, a catamaran shaped boat is ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP
5.
  • Lightweight Image Encryptio... Lightweight Image Encryption Using a Novel Chaotic Technique for the Safe Internet of Things
    Gilmolk, Ali Mohammad Norouzzadeh; Aref, Mohammad Reza International journal of computational intelligence systems, 06/2024, Volume: 17, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Recently, the field of lightweight cryptography (LWC) has emerged in response to the security needs of low-cost, widely used technology. It is essential to implement an encryption approach with ...
Full text
Available for: NUK, UL, UM, UPUK
6.
  • Review of antimicrobial pep... Review of antimicrobial peptides with anti‐Helicobacter pylori activity
    Neshani, Alireza; Zare, Hosna; Akbari Eidgahi, Mohammad Reza ... Helicobacter, February 2019, 2019-Feb, 2019-02-00, 20190201, Volume: 24, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Background The emergence of antibiotic‐resistant Helicobacter pylori strains in recent years has increased the need for finding an alternative in the post‐antibiotic era. One of the fields being ...
Full text
Available for: BFBNIB, DOBA, FZAB, GIS, IJS, IZUM, KILJ, NLZOH, NUK, OILJ, PILJ, PNG, SAZU, SBCE, SBMB, UILJ, UKNU, UL, UM, UPUK
7.
  • Simulation of a Channel Wit... Simulation of a Channel With Another Channel
    Haddadpour, Farzin; Yassaee, Mohammad Hossein; Beigi, Salman ... IEEE transactions on information theory, 05/2017, Volume: 63, Issue: 5
    Journal Article
    Peer reviewed

    In this paper, we study the problem of simulating a discrete memoryless channel (DMC) from another DMC under an average-case and an exact model. We present several achievability and infeasibility ...
Full text
Available for: IJS, NUK, UL

PDF
8.
  • Generalized Meet in the Mid... Generalized Meet in the Middle Cryptanalysis of Block Ciphers With an Automated Search Algorithm
    Ahmadi, Siavash; Aref, Mohammad Reza IEEE access, 2020, Volume: 8
    Journal Article
    Peer reviewed
    Open access

    Meet in the middle (MITM) attack is one of the most important and applicable methods for cryptanalysis of block ciphers. In this paper, a more generalized method for MITM attack is considered. For ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
9.
  • The destruction of mucosal ... The destruction of mucosal barriers, epithelial remodeling, and impaired mucociliary clearance: possible pathogenic mechanisms of Pseudomonas aeruginosa and Staphylococcus aureus in chronic rhinosinusitis
    Chegini, Zahra; Noei, Milad; Hemmati, Jaber ... Cell communication and signaling, 10/2023, Volume: 21, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Abstract Chronic rhinosinusitis (CRS) is a pathological condition characterized by persistent inflammation in the upper respiratory tract and paranasal sinuses. The epithelium serves as the first ...
Full text
Available for: IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
10.
  • The effect of job stress on... The effect of job stress on the relationship between organizational ostracism and knowledge hiding
    Abbasi Asl, Aref; Farhadpoor, Mohammad Reza RIO : revista internacional de organizaciones, 11/2023 31
    Journal Article
    Peer reviewed
    Open access

    Purpose: The purpose of the present study was to investigate the effect of job stress on the relationship between organizational ostracism and knowledge hiding in the metropolitan area of Ahvaz. ...
Full text
Available for: NUK, UL, UM, UPUK
1 2 3 4 5
hits: 467

Load filters