-
Open Access Article
1 - Content rating a nessissity for spam management in social networks
Simin Ghesmati -
Open Access Article
2 - Content rating for spam management in social networks a nessissity
Simin Ghesmati -
Open Access Article
3 - An Approach to Agent- dependent Replicated in Fault-Tolerant Mobile Code Execution
Hodjat Hamidi -
Open Access Article
4 - modified division and replication of data in cloud for optimal performace and security (MDROPS)
hossein hassanpour -
Open Access Article
5 - IT Services Outsourcing Novation tactics and Entrepreneurial Strategies in the Financial Services (Case Study: Private and public banks in Markazi province)
mahtab Eshghiaraghi -
Open Access Article
6 - Identification and Prioritization of Parameters Affecting Information Security Management System (Case Study: Social Security Branches of Guilan Province)
Asadollah Shahbahrami ramin rafizadeh kasani hossein pour yousefi dargah -
Open Access Article
7 - Provide a talent management model focusing on the technical, human and perceptual capabilities of managers in the Social Security Organization
heydar Safari Rashid Zolfaghari Zafarani Mohsen Mohammadian Saravi -
Open Access Article
8 - Assessing the implications of climate change on food security and rural livelihoods Case Study : Rural Farmers in Migan Nehbandan
Javad Mikaniki Morteza Esmailnejad Mohammad Akbarpour Mahmaoud Falsoleyman -
Open Access Article
9 - Study of Defense Climatic Conditions in the Kavir & Desert Region and Makran Coasts by using the Hierarchy Analysis Model(AHP
Alireza Karbalaei ali hanafi Seyed Asaad Hosseini Abbas Alipour -
Open Access Article
10 - Investigating the Impact of Military Areas on the Safety of Citizens in Isfahan (Case Study: Garrison 44 and 55)
yashar zaki keramat Ranjbar Dastenaei -
Open Access Article
11 - Analysis of the Social Pathology Due old Texture Dugonbadan City in Using the Security Approach (Gachsaran Town ship)
Mohammad Hasel nejad Ali Shamsoddini Mohammad Reza Rezaei -
Open Access Article
12 - The explanation of food patterns in rural settlements in Jiroft city With approach Land use planning
ali shahdadi علي آذره -
Open Access Article
13 - Environmental Security Evaluation Using Space Syntax Theory and Place-Check Technique; Case Study: Saraseyb Neighborhood
Mehdi Mirmini Samaneh Jalili Sadrabad -
Open Access Article
14 - Rural migration impact on food security with emphasis on water resources (Case study: villages of Khansar city in Isfahan province)
hamidehsadat aghamiri -
Open Access Article
15 - The trend of urban development with geographical foothold (Case Study: Municipality, District13)
Somayeh Sadat Sajjadi abbas arghan Zaenab karkah Abadi -
Open Access Article
16 - Factors Affecting Security Approach in Kurdistan Region Affiliation with Emphasis on Border Regions of Kurdistan Province
yashar zaki eskandar moradi -
Open Access Article
17 - Geopolitical Analysis of Spatial Planinng View in Afghanistan and Providing Strategic Model
Atiqullah Ghamari Qiuomars Yazdanpanah Dero Zahra Pishgahi fard Hossein Hataminejad -
Open Access Article
18 - Survey of environmental impacts of security policies of Israel (From theory to practice)
hassan kamran -
Open Access Article
19 - Environmental security and national security in the context of cross-border hydropolitics developments (Case Study: Harirud)
hassan kamran -
Open Access Article
20 - Investigation of environmental factors affecting the occurrence of urban crime (crime of theft) - Case study: District 1 and 7 of Qom-
-
Open Access Article
21 - Investigating the Impact of Defenseless Spaces on Citizen Safety sense (Case Study: Tehran Bazar Neighborhood)
Hossein Farhadikhah Ahmad Pourahmad Seyed Khalil Seyed Alipour -
Open Access Article
22 - Passive defense, the secret of security in the range of of urbans and rurals country (With emphasis on rural and urban architecture)
Nasr Allah Fallah tabar -
Open Access Article
23 - Caspian Sea geopolitical crises emphasizing the geo-economics’ competition between coastal countries and its impact on Iran's national security
-
Open Access Article
24 - Shanghai Organization and the Security of Central Asia
الهه كولايي -
Open Access Article
25 - The Elements and the Processes Influencing International System
Reza سیمبر ارسلان قربانی شیخنشین -
Open Access Article
26 - Studying the Relationship between Racial Integration (Kurds &Turks) and Stable Security; Recognition of Effective Factors on Integrating the Races in West Azarbayejan
شفیع بهرامیان امید بهرامیان -
Open Access Article
27 - Discourse Analysis of Iran and Iraq War
Heidar Shahriari -
Open Access Article
28 - Arabic Revolutions and Shaping New Security Orders In Middle East
فاطمه قیاسوندی نبیالله ابراهیمی Ahmad سلطانینژاد -
Open Access Article
29 - Relation of Bio-Politics to Global Discourses; Liberalism, Totalitarianism, and Security
Fateh Moradi Abasali Rahbar -
Open Access Article
30 - An access control model for online social networks using user-to-user relationships
Mohamad Javad Piran mahmud deypir -
Open Access Article
31 - A New Finite Field Multiplication Algorithm to Improve Elliptic Curve Cryptosystem Implementations
Abdalhossein Rezai Parviz Keshavarzi -
Open Access Article
32 - Node to Node Watermarking in Wireless Sensor Networks for Authentication of Self Nodes
Hassan Farsi Seyed Morteza Nourian -
Open Access Article
33 - Promote Mobile Banking Services by using National Smart Card Capabilities and NFC Technology
Reza Vahedi Sayed Esmaeail Najafi Farhad Hosseinzadeh Lotfi -
Open Access Article
34 - An Effective Risk Computation Metric for Android Malware Detection
Mahmood Deypir Ehsan Sharifi -
Open Access Article
35 - Secured Access Control in Security Information and Event Management Systems
Leila Rikhtechi Vahid Rafeh Afshin Rezakhani -
Open Access Article
36 - AI based Computational Trust Model for Intelligent Virtual Assistant
Babu Kumar Ajay Vikram Singh Parul Agarwal -
Open Access Article
37 - Providing a New Smart Camera Architecture for Intrusion Detection in Wireless Visual Sensor Network
Meisam Sharifi Sani Amid Khatibi -
Open Access Article
38 - A survey on NFC Payment: Applications, Research Challenges, and Future Directions
Mehdi Sattarivand Shahram Babaie Amir Masoud Rahmani -
Open Access Article
39 - Proposing a New Framework to Decreasing Delay in the Internet of Things by Using Computing Power of Fog
Mohammad Taghi Shaykhan kianoosh azadi -
Open Access Article
40 - The honorable security of human; a preeminent basis in citizenship rights
علیرضا انتظاری -
Open Access Article
41 - Moderation and it's role in security’s Soul in Plato
-
Open Access Article
42 - Analyzing the Capacity of Islamic Ethics in the Protest Movement of the Palestinian Jihadists on the Israeli National Security Doctrine
-
Open Access Article
43 - Security Policy Analysis in the Light of Human Rights
Eslam Mondani Mohammad Ashouri -
Open Access Article
44 - The Importance and Position of Principal Organs of United Nations Organization in the Framework of United Nations Charter
Saeedeh Golkar Seyyed Mohammad Hashemi -
Open Access Article
45 - Equality and Non-Discrimination in Social Security in Islamic State
Ramin Movahedi Seyyed Hossein Malekuti Hashtjin Abulfazl Ranjbari -
Open Access Article
46 - Provide a successful evaluation model of public policy based on professional ethic
Sara Hajatpour karamolah daneshfard Mohammad Taban ghanbar amirnejad -
Open Access Article
47 - Ethical Conflict of Decisions of the International Court of Justice and the Security Council on the Peaceful Settlement of International Disputes
Saeedeh Golkar Seyed Mohammad Hashemi Ali Zare -
Open Access Article
48 - The right and duty in the social security system are the law and moral duty of the state
mohammadreza najafabadipour Abolfazl Jafargholikhani tayebe balvardi -
Open Access Article
49 - Indicators of Mahdavi's rule of peace and security
Ehsan Samani -
Open Access Article
50 - The aim of the present study is surveying the relationship between doing religious belief with sense of social security among the students of Arak university in 1394-95
Abbas Ali Shahidi -
Open Access Article
51 - Membership in social network son the level of identification and social security adolescents
Abbas Ali Shahidi -
Open Access Article
52 - Tawhid in the view points of Salafi Jihadi and studying it's consequences
abbasali farzandi -
Open Access Article
53 - Information Security Maturity Assessment Model in the IT Departments of the Oil Industry Subsidiaries in Iran
Reza Radfar Fatemeh akhavan -
Open Access Article
54 - Dynamic Model for Evaluating Information Systems Security by System Dynamics Modeling
Mohsen Shafiei Nikabadi Amir Hakaki Sara Gholamshahi -
Open Access Article
55 - Criteria of human ethical decision making of managers in conditions of environmental complexity (Case study, Social Security Organization)
Mahnaz Sarafraz Kakhki Mohammadreza Zabihi Seyed Mahdi Alvani Mahmood Alborzi -
Open Access Article
56 - Iran's penal policy towards providing security for children in cyberspace
Seyed Abbas Khalilpour Chalkiasari -
Open Access Article
57 - The Relationship between mental Security, Social support and Resiliency With Post Traumatic Stress Disorder (PTSD) in the earthquake-affected adolescents In Sarapol-eZahab city
پروانه شجاعی مهر khodamorad momeni جهانگیر کرمی -
Open Access Article
58 - Structural Modeling Relationship between Social Security and Happiness with the Mediating Role of Psychological Capital: Case Study of Ahvaz City
yaser garavand ali anbari asgar Atashafrooz -
Open Access Article
59 - The Relationship between Mental Security, Social Support and Resiliency with Post Traumatic Stress Disorder (PTSD)
Parvane Shojaeimehr Khodamorad Momeni Jahangir Karami -
Open Access Article
60 - Structural Modeling Relationship between Social Security and Happiness with the Mediating Role of Psychological Capital: Case Study of Ahvaz City
yaser garavand Askar Atashafrooz Ali Anbari -
Open Access Article
61 - Anthropological Principles of Hobbes and Spinoza on Government (A Historical Overview)
Bayan Karimy Seyyed Mustafa Shahraeini -
Open Access Article
62 - Model Designing of Total Softpower Policy the Islamic Republic of Iran
Mohammad Taqi Amini Mohammad MahmoodiMeymand MohamadMehdi Parhizgar محمد رضا مشایخ -
Open Access Article
63 - Design Evaluation System of Human Resources in the Social Security Fund of Semnan by using Fuzzy Data Envelopment Analysis
Abolfazi Danaei Seyedeh Nazereh Seif Hashemi -
Open Access Article
64 - Developing Indicators for assessing The Status of Iran’s Natural Gas Export Using Energy Demand Security Approach
Hadi Sahebi pourya souri -
Open Access Article
65 - Examining solutions to deal with the shortage of cyberspace security experts in the country
Mohammad fathian Mehdi Abolhamid mohammadreza rafeei -
Open Access Article
66 - Compilation of structural model, dimensions of organizational performance, opportunities, threats, weakness and strength, social security organization
ommolbanin gilan bagher sarokhani seyedmohamad seyedmirzaei -
Open Access Article
67 - Investigating the Factors Affecting the Performance Evaluation of Social Security Brokers in Isfahan Province
seyedhamid Ghoreishi seyedalireza ebrahimi -
Open Access Article
68 - Investigation the role of personality and individual differences on password security breaches: An Empirical Study
زهرا کریمی manije kaveh rezvan salehi milad moltaji -
Open Access Article
69 - Nastaliq CAPTCHA
M. H. Shirali-Shahreza Mohammad Shirali-Shahreza -
Open Access Article
70 - Risk-based Static and Dynamics Security Assessment and Its Enhancement with Particle Swarm Optimization Generation Realloca
M. Saeedi H. Seifi -
Open Access Article
71 - The Effects of SIP Register Flood Attack and Detection by Using Kullback–Leibler Distance
S. R. Chogan M. Fathy M. Ramezani -
Open Access Article
72 - Throughput Optimization in a Broadcast Network Using Adaptive Modulation, Coding and Transmit Power Provisioning Security Constraint
M. Taki -
Open Access Article
73 - Economic Load Dispatch in Power Plants, Taking into Account Environmental Pollutants and System Security Indices Using Multi-Objective Harmony Search Algorithm
H. Sharifi محمود اوکاتی صادق -
Open Access Article
74 - An On-Chip Detection Mechanism to Detect Scan-Based Attack in Crypto-Chips
F. Jamali Zavareh H. Beitollahi -
Open Access Article
75 - Energy Efficiency in Secrecy Multi-Antenna Two-Way Relay Networks
F. B. soroush akhlaghi -
Open Access Article
76 - A Patient Identification and Authentication Protocol to Increase Security
Afsaneh Sharafi Sepideh Adabi Ali Movaghar Salah Al-Majed -
Open Access Article
77 - Designing an Individual Human Resources Development Plan and Elaboration of its Role in the Organizational Performance (Case Study: Social Security Organization, Tehran Branch)
Naeimeh Tazakori Mohammad Feizi Mohammad Rouhi Eisalou Eshagh Rasouli -
Open Access Article
78 - Identifying the Dimensions and Components of Training Based on Lean Thinking in Social Security Organization
Fatemeh Manoochehri Parivash Jaafari Nadergholi Ghorchian Amir Hosein Mohammad Davoudi -
Open Access Article
79 - Validation of the Cultural Security Model in Knowledge-Based Sustainable Development
Saeide Zare ramezan jahanian mahtab salimi -
Open Access Article
80 - Designing a Model for Empowering the Social Security Organization Employees based on the Teachings of Nahjul Balagha
Ali Akbar Esmaeilzadeh Seyed Ali Akbar Ahmadi Hamed FazliKebria -
Open Access Article
81 - Identification of Organizational Capital and Its Evaluation in Covid-19 Conditions
hajieh rajabi farjad -
Open Access Article
82 - Social justice and its role in social security from the perspective of the Qur'an and Islamic traditions
Mohsen Ghafoury pour seed hamid shamerizi Kamal Khajehpour -
Open Access Article
83 - Maintaining Confidentiality and Integrity of Data and Preventing Unauthorized Access to DICOM Medical Images
Mohammad Soltani Hassan Shakeri Mahboobeh Houshmand -
Open Access Article
84 - Designing a model based on blockchain technology to strengthen cyber security in the banking industry
hossein amoozadkhalili neda haghi Reza Tavakkoli-Moghaddam -
Open Access Article
85 - A dairy Products Green Supply Chain model with Emphasis on Customer Satisfaction: Combining Interpretive Structural Modeling Approach and Analytical Network Process
heydar Safari rashid Zolfaghari Zafarani Mohsen Mohammadian Saravi -
Open Access Article
86 - Secure Computing on the Internet of Everything
Seyed Omid Azarkasb Seyed Hossein Khasteh -
Open Access Article
87 - SQ-PUF: A Resistant PUF-Based Authentication Protocol against Machine-Learning Attack
Abolfazl Sajadi Bijan Alizadeh -
Open Access Article
88 - Improve security in cloud computing infrastructure using block chain protocol
Mohsen Gerami Vahid Yazdanian Siavash Naebasl -
Open Access Article
89 - A Cyber Security Maturity Model for Critical Infrastructures with a Comparative Study Approach
Mohamad Akhtari mohammadali keramati seyed abdolah amin mousavi -
Open Access Article
90 - Designing a food security management model in Iran
Reza Eskandari Mehraban Hadi Peykani akbar etebarian -
Open Access Article
91 - Internal Migration and Social Security: A Study On Relationship Between Internal Migration Patterns and Social Insecurity in Iran
mahmoud moshfegh -
Open Access Article
92 - A New Parallel Method to Verify the Packets Forwarding in SDN Networks
Rozbeh Beglari Hakem Beitollahi -
Open Access Article
93 - Legal-Ethical Critique of the Stockholm School Theory in the Treatment of COVID-19 pandemic
Naser Ghasemi amir abbas rokni -
Open Access Article
94 - Multilateral Export Control Regimes: a Legal Mechanism or Tool of Political Pressure?
غلامحسین دهقانی فاطمه هاشمی -
Open Access Article
95 - G4, an Effort for Permanent Membership in the UN Security Council: Background and Future Trends
آرمین امینی شمس عظیمی -
Open Access Article
96 - The Role of International Organizations in the Realization of the Right to Food
Farhad Talaie علی رزمخواه -
Open Access Article
97 - Iran's Energy Geopolitics and EU’s Approach
سیدشمسالدین صادقی -
Open Access Article
98 - Iran's Energy Geopolitics and EU’s Approach
آرمین امینی الهام حسینخانی -
Open Access Article
99 - Necessity and Possibility of Judicial Supervision over Security Council’s Performance in UN Legal System
حسین شریفی طرازکوهی ساسان مدرس سبزواری -
Open Access Article
100 - Challenges Facing Security and Defense Policies of EU and US
سعید خالوزاده -
Open Access Article
101 - Contending Theories and the Analysis of International Organizations and Institutions, Peace, Security and Justice
Seyed Abdolali ghavam Samira Mohseni -
Open Access Article
102 - ANZUS Treaty: Past and Future
Nasrin Mosaffa Ahmad Heidarbeigi -
Open Access Article
103 - The Necessity of Power Sharing in the Security Council: A Pluralistic Model
Enayatollah Yazadani Enayatollah Yazadani -
Open Access Article
104 - The Legitimacy of State’s Evaluation in Implementation of United Nations Security Council
Malihe Behfar Hassan Savari -
Open Access Article
105 - EU’s Common Foreign and Security Policy: Challenges and Obstacles
Yasser Nooralivand Mohammad Reza Majidi -
Open Access Article
106 - An Analysis of the Political-Security Integration of the European Union within the Framework of Realist Approaches
Seyed Davood Aghaee Yasser Nooralivand Ebrahim Bagheri -
Open Access Article
107 - Prerequisites for the Introduction of Regional Arrangements to Maintain International Peace and Security
علی احدی کرنق Mehdi Hadadi -
Open Access Article
108 - Change in Environmental Security in the Post-Cold War International Law
Seyed Abdolali ghavam Seyedeh Massoumeh Mostafavi -
Open Access Article
109 - A Comparative Study of Iran's Social Security Law in the Field of Women's Rights with the Documents of International Labour Organization
Fatemeh Sarreshteh Izadmouoa -
Open Access Article
110 - Advance on the European Common Foreign and Security Policy, from Kosovo to Ukraine
Yousef Molaei Issa Adeli -
Open Access Article
111 - EU’s Common Foreign and Security Policy: Challenges and Obstacles
Mohammad Reza Majidi Yasser Nooralivand -
Open Access Article
112 - The Role of the UN Security Council in Adopting Resolutions Against ISIS
ehsan jafari far Reza nasirihamed -
Open Access Article
113 - Human Security and Human Rights; Distinctions and Overlapping Areas
Naser khorshidi sarem shiravand -
Open Access Article
114 - Assessing the Role of South and Southeast Asian Regional Organizations in Confronting Maritime Terrorism: Case Study of SAARC, BIMSTEC & ASEAN
Farhad Talaie Maral Javidbakht -
Open Access Article
115 - Iran's criminal policy in criminal security agreements in the Criminal Procedure Code of 1392
roya ghasemi -
Open Access Article
116 - Social welfare and its relationship with social capital and sense of security
milad abdi -
Open Access Article
117 - computer security models and proposing a new perspective: A review paper
Hadi sadjadi Reza Kalantari -
Open Access Article
118 - Designing an Entrepreneurial Marketing Model with an Approach to Improve Organizational Performance
javad motevali taher mohammadreza eghbal مجید فتاحی -
Open Access Article
119 - Investigating the effect of employees' perceptions of corporate social responsibilities on organizational pride and customer service commitment
elahe Maneshdavi seyed mehdi mirmehdi فتانه یاراحمدی -
Open Access Article
120 - Machine Learning-Based Security Resource Allocation for Defending against Attacks in the Internet of Things
Nasim Navaei Vesal Hakami -
Open Access Article
121 - Designing a Secure Consensus Algorithm for Use in Blockchain
Hosein Badri Masumeh Safkhani -
Open Access Article
122 - Identifying the Key Drivers of Digital Signature Implementation in Iran (using fuzzy Delphi method)
Ghorbanali Mehrabani Fatemeh Zargaran khouzani -
Open Access Article
123 - Designing Model of Food Security Management in Iran
Reza Eskandari Mehraban Hadi Peykani akbar etebarian -
Open Access Article
124 - Contexts and Factors related to the Quality of Urban life in the Neighborhoods of One District of Tehran: The Application of a Multi-Level Model
hamid ramezani ali hatami nader haghshenas Milad Tofangchi Mahyari -
Open Access Article
125 - Investigating the impact of climate change on the environment and agriculture
Bahareh Rafiei Hamed Kioumarsi Reza Naseri Harsini Seyed Mohammad Reza Mahdavian -
Open Access Article
126 - Analysis of Ethical Principles of Disciplinary and Educational Responses to Juvenile Delinquency from the Perspective of Islamic Criminal Law
roh allah ebrahimi mohamad ali haji deh abadi ALIREZA HOSSINI -
Open Access Article
127 - The effects of the emergence of security-oriented criminalization in crimes against security in Iranian criminal law
Hossein Rezaei Todeshki Seyyed Mahmoud Majidi mohammad javad baghi zadeh -
Open Access Article
128 - Government’s role in human’s security and its impact on people’s happiness
Behnaz Yousefi Hossein Rahmatollahi -
Open Access Article
129 - Designing a knowledge management system deployment model in the social security organization of Hormozgan province
Reza Baranimashahrani Mehdi Bagheri payam paslari -
Open Access Article
130 - A Novel Approach based on Chaotic Mapping for Implementing Security Phases on Cloud Computing
Azita Rezaei Ali Broumandnia Seyed Javad Mirabedini -
Open Access Article
131 - Compilation of the green human resources management development system in Iran's social security organization
korosh Shafei saeid bagher salimi Hossein Ganji Nia -
Open Access Article
132 - Explaining the discourse of thoughts, opinions and statements of Imam Khamenei regarding the role of food security in the resistance economy
Mohammad Bidgoli asghar Rajabi Deh Borzoei -
Open Access Article
133 - Providing a Blockchain-Based Method to Protect Users’ Privacy in Social Networks
Ibrahim Zamani Babgohari Monireh Hosseini -
Open Access Article
134 - Explaining the principles of "social security" in Nahj al-Balaghah and its realization in society with a neglect approach
alinaghi lezgi alireza akbar zadeh Mohammad karaminia reza ojagh -
Open Access Article
135 - Investigation and effects of regional developments on the security of Iran and Turkey borders
Mahdi Najafi Jalil nayebian Parviz Ahadei Mohammad Yousefi Joybari -
Open Access Article
136 - Optimal Power Allocation for Maximizing Secrecy Rate in Physical Layer Security Using Frequency Diverse Array Directional Modulation and Artificial Noise
Mahdi Tayyeb Massoud Hossein Khaleghi -
Open Access Article
137 - Human dignity and weapons of mass destruction
Mohosen Reza Mosaddegh,khah Morteza Bayat Hasan Soleimani -
Open Access Article
138 - A novel security usability method for e-learning platforms
Golbarg Nasiri Negin Hajiahmadi -
Open Access Article
139 - Investigating weapons of mass destruction with a focus on moral values in jurisprudence and international law
Mohsen Reza Mosaddegh khah Morteza Barati Hasan Soleimani -
Open Access Article
140 - The role of food security in a resistance economy with emphasis on the thoughts, opinions and statements of the Supreme Leader Mohammad Bidgoli
Mohammad Bidgoli asghar Rajabi Deh Borzoei -
Open Access Article
141 - Provide A Lightweight Encryption Solution To secure Data In The Internet Of Things
wahab aminiazar rasoul farahi fattameh dashti -
Open Access Article
142 - Compilation of green human resource management development system in Iran's social security organization
Koroush Shafeie Degesara saeed baghersalimi Hossein Ganji Nia -
Open Access Article
143 - Identifying the Effective Factors on the Equalization of Premium Rates Received in Line with the policy of managing resources, expenses and Financial Reserves of the Social Security Organization (General Administration of Cities of Tehran Province)
Ahmadreza Mohamadlua Farid Asgari Abdollah Nazari Farzane Khalili -
Open Access Article
144 - A Survey on Computer Security Patterns and Proposing a New Perspective
Hadi sadjadi Reza Kalantari -
Open Access Article
145 - Identifying the Key Drivers of Digital Signature Implementation in Iran (Using Fuzzy Delphi Method)
Ghorbanali Mehrabani Fatemeh Zargaran khouzani -
Open Access Article
146 - Investigation and effects of regional developments on the security of Iran and Turkey borders
Mahdi Najafi Jalil nayebian Parviz Ahadei