Rimag

Rimag

  • About Rimag
  • Services
    • List of Authors
    • For Authors
    • Editor-in-Chief
    • For Editor-in-Chief
    • reviewer
    • For Reviewers
  • List of Journals
  • Order
  • Contact Us
  • Home
  • About Rimag
  • Contact Us
  • Register
  • Log in
  • Order
Advanced
  • Home
  • امنیت
    • List of Articles امنیت

      • Open Access Article
        • Abstract Page
        • Full-Text

        1 - Content rating a nessissity for spam management in social networks
        Simin Ghesmati
      • Open Access Article
        • Abstract Page
        • Full-Text

        2 - Content rating for spam management in social networks a nessissity
        Simin Ghesmati
      • Open Access Article
        • Abstract Page
        • Full-Text

        3 - Hardwar Trojan classification and implementation and offer a new detection approach
        sadegh hajimohseni
      • Open Access Article
        • Abstract Page
        • Full-Text

        4 - A Novel Model for detecting intrusion with Mobile Agent and Game theory
        Amin Nezarat mehdi raja Gholamhossein Dastghaibyfard
      • Open Access Article
        • Abstract Page
        • Full-Text

        5 - An Approach to Agent- dependent Replicated in Fault-Tolerant Mobile Code Execution
        Hodjat Hamidi
      • Open Access Article
        • Abstract Page
        • Full-Text

        6 - modified division and replication of data in cloud for optimal performace and security (MDROPS)
        hossein hassanpour
      • Open Access Article
        • Abstract Page
        • Full-Text

        7 - IT Services Outsourcing Novation tactics and Entrepreneurial Strategies in the Financial Services (Case Study: Private and public banks in Markazi province)
        mahtab Eshghiaraghi
      • Open Access Article
        • Abstract Page
        • Full-Text

        8 - Classify and implement hardware trojans and provide a new way to detect them
        sadegh hajmohseni mohammadali doustari mohammadbagher ghaznavi
      • Open Access Article
        • Abstract Page
        • Full-Text

        9 - Presenting a model for using mobile agents in distributed intrusion detection systems based on game theory
        امین نظارات مهدی رجا Gholamhossein Dastghaibyfard
      • Open Access Article
        • Abstract Page
        • Full-Text

        10 - Assessing the implications of climate change on food security and rural livelihoods Case Study : Rural Farmers in Migan Nehbandan
        Javad Mikaniki Morteza Esmailnejad Mohammad Akbarpour Mahmaoud Falsoleyman
      • Open Access Article
        • Abstract Page
        • Full-Text

        11 - Study of Defense Climatic Conditions in the Kavir & Desert Region and Makran Coasts by using the Hierarchy Analysis Model(AHP
        Alireza  Karbalaei ali hanafi Seyed Asaad  Hosseini Abbas  Alipour
      • Open Access Article
        • Abstract Page
        • Full-Text

        12 - Analysis of the Social Pathology Due old Texture Dugonbadan City in Using the Security Approach (Gachsaran Town ship)
        Mohammad Hasel nejad Ali Shamsoddini Mohammad Reza Rezaei
      • Open Access Article
        • Abstract Page
        • Full-Text

        13 - The explanation of food patterns in rural settlements in Jiroft city With approach Land use planning
        ali shahdadi علي آذره
      • Open Access Article
        • Abstract Page
        • Full-Text

        14 - Environmental Security Evaluation Using Space Syntax Theory and Place-Check Technique; Case Study: Saraseyb Neighborhood
        Mehdi Mirmini Samaneh Jalili Sadrabad
      • Open Access Article
        • Abstract Page
        • Full-Text

        15 - Rural migration impact on food security with emphasis on water resources (Case study: villages of Khansar city in Isfahan province)
        hamidehsadat aghamiri  
      • Open Access Article
        • Abstract Page
        • Full-Text

        16 - Geopolitical Analysis of Spatial Planinng View in Afghanistan and Providing Strategic Model
        Atiqullah Ghamari Qiuomars Yazdanpanah Dero Zahra Pishgahi fard Hossein Hataminejad
      • Open Access Article
        • Abstract Page
        • Full-Text

        17 - Survey of environmental impacts of security policies of Israel (From theory to practice)
          hassan kamran
      • Open Access Article
        • Abstract Page
        • Full-Text

        18 - The Role of Environmental and Physical in Urban Security
           
      • Open Access Article
        • Abstract Page
        • Full-Text

        19 - Environmental security and national security in the context of cross-border hydropolitics developments (Case Study: Harirud)
        hassan kamran    
      • Open Access Article
        • Abstract Page
        • Full-Text

        20 - Evaluation of social housing and the effective factors in housing provision for low income classes(a case study :Eslamshahr)
        محسن  سقایی Ahmad mozeni amir sanaeirad
      • Open Access Article
        • Abstract Page
        • Full-Text

        21 - Investigation of environmental factors affecting the occurrence of urban crime (crime of theft) - Case study: District 1 and 7 of Qom-
           
      • Open Access Article
        • Abstract Page
        • Full-Text

        22 - Investigating the Impact of Defenseless Spaces on Citizen Safety sense (Case Study: Tehran Bazar Neighborhood)
        Hossein Farhadikhah Ahmad Pourahmad   Seyed Khalil Seyed Alipour
      • Open Access Article
        • Abstract Page
        • Full-Text

        23 - Passive defense, the secret of security in the range of of urbans and rurals country (With emphasis on rural and urban architecture)
        Nasr Allah Fallah tabar  
      • Open Access Article
        • Abstract Page
        • Full-Text

        24 - Caspian Sea geopolitical crises emphasizing the geo-economics’ competition between coastal countries and its impact on Iran's national security
           
      • Open Access Article
        • Abstract Page
        • Full-Text

        25 - The Elements and the Processes Influencing International System
        Reza سیمبر ارسلان  قربانی شیخ‌نشین
      • Open Access Article
        • Abstract Page
        • Full-Text

        26 - Studying the Relationship between Racial Integration (Kurds &Turks) and Stable Security; Recognition of Effective Factors on Integrating the Races in West Azarbayejan
        شفیع  بهرامیان امید  بهرامیان
      • Open Access Article
        • Abstract Page
        • Full-Text

        27 - Arabic Revolutions and Shaping New Security Orders In Middle East
        فاطمه  قیاسوندی نبی‌الله  ابراهیمی Ahmad سلطانی‌نژاد
      • Open Access Article
        • Abstract Page
        • Full-Text

        28 - Comparative Study of Hobbes, Locke and Rawls' Ideas in the light of the Hypothetical Position of the Social Contract
        mokhtar nouri Majid tavasoli
      • Open Access Article
        • Abstract Page
        • Full-Text

        29 - Relation of Bio-Politics to Global Discourses; Liberalism, Totalitarianism, and Security
        Fateh  Moradi Abasali  Rahbar
      • Open Access Article
        • Abstract Page
        • Full-Text

        30 - An access control model for online social networks using user-to-user relationships
        Mohamad Javad Piran mahmud deypir
      • Open Access Article
        • Abstract Page
        • Full-Text

        31 - Proposing a New Framework to Decreasing Delay in the Internet of Things by Using Computing Power of Fog
        Mohammad Taghi Shaykhan kianoosh azadi
      • Open Access Article
        • Abstract Page
        • Full-Text

        32 - Analyzing the Capacity of Islamic Ethics in the Protest Movement of the Palestinian Jihadists on the Israeli National Security Doctrine
             
      • Open Access Article
        • Abstract Page
        • Full-Text

        33 - Security Policy Analysis in the Light of Human Rights
        Eslam Mondani Mohammad Ashouri
      • Open Access Article
        • Abstract Page
        • Full-Text

        34 - A moral look at chapteristic sanctions regarding the legal implications of this, Bernslett II Human Rights
        حسین  اخوان Seyyed Bagher Mirabassi Abo-Mohammad Asgarkhani
      • Open Access Article
        • Abstract Page
        • Full-Text

        35 - The Importance and Position of Principal Organs of United Nations Organization in the Framework of United Nations Charter
        Saeedeh  Golkar Seyyed Mohammad Hashemi
      • Open Access Article
        • Abstract Page
        • Full-Text

        36 - A moral and legal look at the nuclear risks to global peace and security
        Ali  Bagheri Mahmud Abadi Amir Maghami Alireza  Arashpour
      • Open Access Article
        • Abstract Page
        • Full-Text

        37 - Indicators of Mahdavi's rule of peace and security
        Ehsan  Samani
      • Open Access Article
        • Abstract Page
        • Full-Text

        38 - Membership in social network son the level of identification and social security adolescents
        Abbas Ali  Shahidi
      • Open Access Article
        • Abstract Page
        • Full-Text

        39 - Tawhid in the view points of Salafi Jihadi and studying it's consequences
        abbasali farzandi
      • Open Access Article
        • Abstract Page
        • Full-Text

        40 - Information Security Maturity Assessment Model in the IT Departments of the Oil Industry Subsidiaries in Iran
        Reza Radfar Fatemeh akhavan
        10.52547/jstpi.20788.16.64.41
      • Open Access Article
        • Abstract Page
        • Full-Text

        41 - Dynamic Model for Evaluating Information Systems Security by System Dynamics Modeling
        Mohsen Shafiei Nikabadi Amir Hakaki Sara Gholamshahi
        10.52547/jstpi.20820.16.64.52
      • Open Access Article
        • Abstract Page
        • Full-Text

        42 - Iran's penal policy towards providing security for children in cyberspace
        Seyed Abbas Khalilpour Chalkiasari
      • Open Access Article
        • Abstract Page
        • Full-Text

        43 - Structural Modeling Relationship between Social Security and Happiness with the Mediating Role of Psychological Capital: Case Study of Ahvaz City
        yaser garavand ali anbari asgar Atashafrooz
      • Open Access Article
        • Abstract Page
        • Full-Text

        44 - A Causal Explanation of Social Safeness Based on Neuroticism: The mediating Role of Basic Psychological Needs Satisfaction and Frustration
        Hamid Barani Mohsen Arbezi Mahboubeh Fouladchang
      • Open Access Article
        • Abstract Page
        • Full-Text

        45 - Anthropological Principles of Hobbes and Spinoza on Government (A Historical Overview)
        Bayan Karimy Seyyed Mustafa  Shahraeini
      • Open Access Article
        • Abstract Page
        • Full-Text

        46 - Model Designing of Total Softpower Policy the Islamic Republic of Iran
        Mohammad Taqi  Amini Mohammad MahmoodiMeymand MohamadMehdi Parhizgar محمد رضا  مشایخ
      • Open Access Article
        • Abstract Page
        • Full-Text

        47 - Developing Indicators for assessing The Status of Iran’s Natural Gas Export Using Energy Demand Security Approach
        Hadi Sahebi pourya souri
      • Open Access Article
        • Abstract Page
        • Full-Text

        48 - ارائه الگوی راهبردی توسعه امنیت ساختمان‌ها در برابر زلزله
          Soheila Bourghani Farahani
      • Open Access Article
        • Abstract Page
        • Full-Text

        49 - Examining solutions to deal with the shortage of cyberspace security experts in the country
        Mohammad fathian Mehdi Abolhamid mohammadreza rafeei
      • Open Access Article
        • Abstract Page
        • Full-Text

        50 - طراحی مجدد شبکه و برنامه¬ریزی زنجیره تأمین محصولات غذایی با لحاظ کردن امنیت غذایی و جریان¬های مالی
          mir saman pishvaee
      • Open Access Article
        • Abstract Page
        • Full-Text

        51 - Investigation the role of personality and individual differences on password security breaches: An Empirical Study
        زهرا کریمی manije kaveh rezvan salehi milad moltaji
      • Open Access Article
        • Abstract Page
        • Full-Text

        52 - Nastaliq CAPTCHA
        M. H. Shirali-Shahreza Mohammad Shirali-Shahreza
      • Open Access Article
        • Abstract Page
        • Full-Text

        53 - The Effects of SIP Register Flood Attack and Detection by Using Kullback–Leibler Distance
        S. R. Chogan M. Fathy M. Ramezani
      • Open Access Article
        • Abstract Page
        • Full-Text

        54 - Simultaneous Implementation of Time of Use Demand Response and Security Constraint Unit Commitment
        M. Kia M. Setayesh-Nazar S. M. Sepasian
      • Open Access Article
        • Abstract Page
        • Full-Text

        55 - Evaluation of Performance, Reliability and Security for Share-Data, Object-Oriented and Pipe and Filter Styles
        H. Banki H. Banki
      • Open Access Article
        • Abstract Page
        • Full-Text

        56 - A Hybrid Access Control Model for CIM-Based SCADA System
        P. Mahmoudi Nasr A. Yazdian Varjani
      • Open Access Article
        • Abstract Page
        • Full-Text

        57 - Identifying Primary User Emulation Attacks in Cognitive Radio Network Based on Bayesian Nonparametric Bayesian
        K. Akbari J. Abouei
      • Open Access Article
        • Abstract Page
        • Full-Text

        58 - Economic Load Dispatch in Power Plants, Taking into Account Environmental Pollutants and System Security Indices Using Multi-Objective Harmony Search Algorithm
        H. Sharifi محمود اوکاتی صادق
      • Open Access Article
        • Abstract Page
        • Full-Text

        59 - An On-Chip Detection Mechanism to Detect Scan-Based Attack in Crypto-Chips
        F. Jamali Zavareh H. Beitollahi
      • Open Access Article
        • Abstract Page
        • Full-Text

        60 - Coordinated Expansion Planning of Gas and Electricity Networks Considering N-1 Security Criterion
        V. Khaligh M. Oloomi Buygi
      • Open Access Article
        • Abstract Page
        • Full-Text

        61 - Energy Efficiency in Secrecy Multi-Antenna Two-Way Relay Networks
        F. B. soroush akhlaghi
      • Open Access Article
        • Abstract Page
        • Full-Text

        62 - A Patient Identification and Authentication Protocol to Increase Security
        Afsaneh Sharafi Sepideh Adabi Ali Movaghar Salah Al-Majed
      • Open Access Article
        • Abstract Page
        • Full-Text

        63 - Validation of the Cultural Security Model in Knowledge-Based Sustainable Development
        Saeide Zare ramezan jahanian mahtab salimi
      • Open Access Article
        • Abstract Page
        • Full-Text

        64 - Identification of Organizational Capital and Its Evaluation in Covid-19 Conditions
        hajieh rajabi farjad
        10.61186/jstpi.31810.20.78.28
      • Open Access Article
        • Abstract Page
        • Full-Text

        65 - Social justice and its role in social security from the perspective of the Qur'an and Islamic traditions
        Mohsen Ghafoury pour seed hamid shamerizi Kamal  Khajehpour
      • Open Access Article
        • Abstract Page
        • Full-Text

        66 - Maintaining Confidentiality and Integrity of Data and Preventing Unauthorized Access to DICOM Medical Images
        Mohammad Soltani Hassan Shakeri Mahboobeh Houshmand
      • Open Access Article
        • Abstract Page
        • Full-Text

        67 - Relationship between Permeability and the Presence of Women in Residential Towns (Case Study: Hezar Dastgah and Dowlatabad Residential Towns, Tehran)
        Fatemeh Khodadadi Agh Ghal’e Ali Asgari
      • Open Access Article
        • Abstract Page
        • Full-Text

        68 - Secure Computing on the Internet of Everything
        Seyed Omid Azarkasb Seyed Hossein Khasteh
      • Open Access Article
        • Abstract Page
        • Full-Text

        69 - SQ-PUF: A Resistant PUF-Based Authentication Protocol against Machine-Learning Attack
        Abolfazl Sajadi Bijan Alizadeh
      • Open Access Article
        • Abstract Page
        • Full-Text

        70 - Improve security in cloud computing infrastructure using block chain protocol
        Mohsen Gerami Vahid Yazdanian Siavash Naebasl
        10.61186/jstpi.34504.19.76.1
      • Open Access Article
        • Abstract Page
        • Full-Text

        71 - بررسی احساس امنیت گردشگران مذهبی در اماکن فراغتی (مورد مطالعه : شهر مشهد)
           
      • Open Access Article
        • Abstract Page
        • Full-Text

        72 - Exploring the Effect of Perceived Forgiveness Climate on Female Practitioners of Tourism Industry
        Fariborz Rahimnia Farshad Ghaderi
      • Open Access Article
        • Abstract Page
        • Full-Text

        73 - A Cyber Security Maturity Model for Critical Infrastructures with a Comparative Study Approach
        Mohamad Akhtari mohammadali keramati seyed abdolah amin mousavi
        10.61186/jstpi.36349.19.75.22
      • Open Access Article
        • Abstract Page
        • Full-Text

        74 - Designing a food security management model in Iran
        Reza Eskandari Mehraban Hadi Peykani akbar etebarian
      • Open Access Article
        • Abstract Page
        • Full-Text

        75 - A New Parallel Method to Verify the Packets Forwarding in SDN Networks
        Rozbeh Beglari Hakem Beitollahi
      • Open Access Article
        • Abstract Page
        • Full-Text

        76 - Multilateral Export Control Regimes: a Legal Mechanism or Tool of Political Pressure?
        غلامحسین   دهقانی فاطمه  هاشمی
      • Open Access Article
        • Abstract Page
        • Full-Text

        77 - The Role of International Organizations in the Realization of the Right to Food
        Farhad Talaie علی رزمخواه
      • Open Access Article
        • Abstract Page
        • Full-Text

        78 - Comparative Study of UNSC’s Performance vis-à-vis Developments in Libya, Yemen and Bahrain (2011-12) from Viewpoint of International Law
        رضا  موسی‌زاده رضا  رنجبر
      • Open Access Article
        • Abstract Page
        • Full-Text

        79 - Iran's Energy Geopolitics and EU’s Approach
        سیدشمس‌الدین  صادقی
      • Open Access Article
        • Abstract Page
        • Full-Text

        80 - Necessity and Possibility of Judicial Supervision over Security Council’s Performance in UN Legal System
        حسین شریفی طرازکوهی ساسان  مدرس سبزواری
      • Open Access Article
        • Abstract Page
        • Full-Text

        81 - Challenges Facing Security and Defense Policies of EU and US
        سعید  خالوزاده
      • Open Access Article
        • Abstract Page
        • Full-Text

        82 - Impact of Cooperation and Competition of Shanghai’s Members on its Goals and Performance: 2001- 2013
        reza simbar مهدی  هدایتی شهیدانی
      • Open Access Article
        • Abstract Page
        • Full-Text

        83 - ANZUS Treaty: Past and Future
        Nasrin Mosaffa Ahmad Heidarbeigi
      • Open Access Article
        • Abstract Page
        • Full-Text

        84 - The Necessity of Power Sharing in the Security Council: A Pluralistic Model
        Enayatollah Yazadani Enayatollah Yazadani
      • Open Access Article
        • Abstract Page
        • Full-Text

        85 - The Legitimacy of State’s Evaluation in Implementation of United Nations Security Council
        Malihe  Behfar Hassan   Savari
      • Open Access Article
        • Abstract Page
        • Full-Text

        86 - Primacy in Relation Between the International Court of Justice and UN Security Council
        همایون  مافی وحید بذّار
      • Open Access Article
        • Abstract Page
        • Full-Text

        87 - A New Structure for UN Security Council; The Need of Hegemony of Power
        Siamak Soltani Saleh  Rezaie Pishrobat
      • Open Access Article
        • Abstract Page
        • Full-Text

        88 - EU’s Common Foreign and Security Policy: Challenges and Obstacles
        Yasser Nooralivand Mohammad Reza Majidi
      • Open Access Article
        • Abstract Page
        • Full-Text

        89 - Hidden Veto and Its Impact on Decision-Making Process in the Security Council
        رضا  موسی‌زاده Arsalan Jamshidi
      • Open Access Article
        • Abstract Page
        • Full-Text

        90 - The Status of OIC Member States in the Main Organs of the United Nations
        ستار عزیزی
      • Open Access Article
        • Abstract Page
        • Full-Text

        91 - An Analysis of the Political-Security Integration of the European Union within the Framework of Realist Approaches
        Seyed Davood Aghaee Yasser Nooralivand Ebrahim Bagheri
      • Open Access Article
        • Abstract Page
        • Full-Text

        92 - Prerequisites for the Introduction of Regional Arrangements to Maintain International Peace and Security
        علی احدی کرنق Mehdi Hadadi
      • Open Access Article
        • Abstract Page
        • Full-Text

        93 - Change in Environmental Security in the Post-Cold War International Law
        Seyed Abdolali ghavam Seyedeh Massoumeh  Mostafavi
      • Open Access Article
        • Abstract Page
        • Full-Text

        94 - Advance on the European Common Foreign and Security Policy, from Kosovo to Ukraine
        Yousef Molaei Issa  Adeli
      • Open Access Article
        • Abstract Page
        • Full-Text

        95 - Feasibility Analysis of Formation of Arabian military coalition in Persian Gulf; with Emphasis on Geopolitical Backgrounds
        Reza Rahimi Kiumars  YazdanpanahRahimi
      • Open Access Article
        • Abstract Page
        • Full-Text

        96 - The place of UN Security Council sanctions resolutions in the US sanctions strategy (2018-2020)
        Mahdi Pakzat Saeed Daghineh
      • Open Access Article
        • Abstract Page
        • Full-Text

        97 - COVID-19 and United Nations Peacekeeping Forces: New Challenges piled on Old Constraints
        Nasrin Mosaffa
      • Open Access Article
        • Abstract Page
        • Full-Text

        98 - The place of UN Security Council sanctions resolutions in the US sanctions strategy (2018-2020)
        Mahdi Pakzat Saeed Daghineh
      • Open Access Article
        • Abstract Page
        • Full-Text

        99 - COVID-19 and United Nations Peacekeeping Forces: New Challenges piled on Old Constraints
        Nasrin Mosaffa
      • Open Access Article
        • Abstract Page
        • Full-Text

        100 - The Legitimacy of State’s Evaluation in Implementation of United Nations Security Council
        Malihe  Behfar Hassan   Savari
      • Open Access Article
        • Abstract Page
        • Full-Text

        101 - Primacy in Relation Between the International Court of Justice and UN Security Council
        همایون  مافی وحید بذّار
      • Open Access Article
        • Abstract Page
        • Full-Text

        102 - A New Structure for UN Security Council; The Need of Hegemony of Power
        Siamak Soltani Saleh  Rezaie Pishrobat
      • Open Access Article
        • Abstract Page
        • Full-Text

        103 - EU’s Common Foreign and Security Policy: Challenges and Obstacles
        Mohammad Reza Majidi Yasser Nooralivand
      • Open Access Article
        • Abstract Page
        • Full-Text

        104 - China's Foreign Policy and the Evolution of its Security Council Voting Behavior
        Hamid salehi Emad Aslani Minareh Bazaari
      • Open Access Article
        • Abstract Page
        • Full-Text

        105 - The Role of the UN Security Council in Adopting Resolutions Against ISIS
        ehsan jafari far Reza nasirihamed
      • Open Access Article
        • Abstract Page
        • Full-Text

        106 - Human Security and Human Rights; Distinctions and Overlapping Areas
        Naser khorshidi sarem shiravand
      • Open Access Article
        • Abstract Page
        • Full-Text

        107 - Assessing the Role of South and Southeast Asian Regional Organizations in Confronting Maritime Terrorism: Case Study of SAARC, BIMSTEC & ASEAN
        Farhad Talaie Maral Javidbakht
      • Open Access Article
        • Abstract Page
        • Full-Text

        108 - Social welfare and its relationship with social capital and sense of security
        milad abdi
      • Open Access Article
        • Abstract Page
        • Full-Text

        109 - computer security models and proposing a new perspective: A review paper
        Hadi sadjadi Reza Kalantari
      • Open Access Article
        • Abstract Page
        • Full-Text

        110 - Machine Learning-Based Security Resource Allocation for Defending against Attacks in the Internet of Things
        Nasim Navaei Vesal Hakami
      • Open Access Article
        • Abstract Page
        • Full-Text

        111 - Designing a Secure Consensus Algorithm for Use in Blockchain
        Hosein Badri Masumeh Safkhani
      • Open Access Article
        • Abstract Page
        • Full-Text

        112 - Identifying the Key Drivers of Digital Signature Implementation in Iran (using fuzzy Delphi method)
        Ghorbanali Mehrabani Fatemeh Zargaran khouzani
      • Open Access Article
        • Abstract Page
        • Full-Text

        113 - Designing Model of Food Security Management in Iran
        Reza Eskandari Mehraban Hadi Peykani akbar etebarian
      • Open Access Article
        • Abstract Page
        • Full-Text

        114 - Investigating the impact of climate change on the environment and agriculture
        Bahareh Rafiei Hamed Kioumarsi Reza Naseri Harsini Seyed Mohammad Reza Mahdavian
      • Open Access Article
        • Abstract Page
        • Full-Text

        115 - Analysis of Ethical Principles of Disciplinary and Educational Responses to Juvenile Delinquency from the Perspective of Islamic Criminal Law
        roh allah ebrahimi mohamad ali haji deh abadi ALIREZA HOSSINI
      • Open Access Article
        • Abstract Page
        • Full-Text

        116 - The effects of the emergence of security-oriented criminalization in crimes against security in Iranian criminal law
        Hossein  Rezaei Todeshki Seyyed Mahmoud Majidi mohammad javad baghi zadeh
      • Open Access Article
        • Abstract Page
        • Full-Text

        117 - Government’s role in human’s security and its impact on people’s happiness
        Behnaz  Yousefi Hossein  Rahmatollahi
      • Open Access Article
        • Abstract Page
        • Full-Text

        118 - A Novel Approach based on Chaotic Mapping for Implementing Security Phases on Cloud Computing
        Azita Rezaei Ali Broumandnia Seyed Javad Mirabedini
      • Open Access Article
        • Abstract Page
        • Full-Text

        119 - Explaining the discourse of thoughts, opinions and statements of Imam Khamenei regarding the role of food security in the resistance economy
        Mohammad Bidgoli asghar Rajabi Deh Borzoei
      • Open Access Article
        • Abstract Page
        • Full-Text

        120 - Providing a Blockchain-Based Method to Protect Users’ Privacy in Social Networks
        Ibrahim Zamani Babgohari Monireh Hosseini
      • Open Access Article
        • Abstract Page
        • Full-Text

        121 - Explaining the principles of "social security" in Nahj al-Balaghah and its realization in society with a neglect approach
        alinaghi lezgi alireza akbar zadeh Mohammad karaminia reza ojagh
      • Open Access Article
        • Abstract Page
        • Full-Text

        122 - Investigation and effects of regional developments on the security of Iran and Turkey borders
        Mahdi Najafi Jalil nayebian Parviz Ahadei Mohammad Yousefi Joybari
      • Open Access Article
        • Abstract Page
        • Full-Text

        123 - Optimal Power Allocation for Maximizing Secrecy Rate in Physical Layer Security Using Frequency Diverse Array Directional Modulation and Artificial Noise
        Mahdi Tayyeb Massoud Hossein Khaleghi
      • Open Access Article
        • Abstract Page
        • Full-Text

        124 - Investigating the Factors Affecting the Public Participation of Users and the Survivability of Spaces in Urban Parks to Improve the Level of Children's Safety (a Case Study of Shafaq Park in Tehran)
        Saeed Azemati Kimia Jamshidzadeh
      • Open Access Article
        • Abstract Page
        • Full-Text

        125 - Human dignity and weapons of mass destruction
        Mohosen Reza  Mosaddegh,khah Morteza  Bayat Hasan Soleimani
      • Open Access Article
        • Abstract Page
        • Full-Text

        126 - Identify and analyze regional security approaches and policies in the Caucasus
        Amir Asadzadeh Mohammad Yousefi Joybari صمد  ظهیری Mohammad Ghorbani Gholshanabad
      • Open Access Article
        • Abstract Page
        • Full-Text

        127 - A comparative study of the concept of home among children of two cities (Shiraz and Noujin)
        Fahimeh Abbasi Tahereh Nasr Keivan Mohamadpur
      • Open Access Article
        • Abstract Page
        • Full-Text

        128 - The role of food security in a resistance economy with emphasis on the thoughts, opinions and statements of the Supreme Leader Mohammad Bidgoli
        Mohammad Bidgoli asghar Rajabi Deh Borzoei
      • Open Access Article
        • Abstract Page
        • Full-Text

        129 - Provide A Lightweight Encryption Solution To secure Data In The Internet Of Things
        wahab aminiazar rasoul farahi fattameh dashti
      • Open Access Article
        • Abstract Page
        • Full-Text

        130 - Identifying the Key Drivers of Digital Signature Implementation in Iran (Using Fuzzy Delphi Method)
        Ghorbanali Mehrabani Fatemeh Zargaran khouzani
      • Open Access Article
        • Abstract Page
        • Full-Text

        131 - Investigation and effects of regional developments on the security of Iran and Turkey borders
        Mahdi Najafi Jalil nayebian Parviz Ahadei  
      • Open Access Article
        • Abstract Page
        • Full-Text

        132 - Explaining the Relationship Between the Sense of Security and Abnormality: A Case Study of Khorramshahr Citizens
        Ebrahim Mirzaei Abouzar Kaseminezhad javad jehangirzadeh
      • Open Access Article
        • Abstract Page
        • Full-Text

        133 - Factors Influencing Women's Empowerment to Ensure Psychological Security of the Family
        Samaneh Ghandehary
      • Open Access Article
        • Abstract Page
        • Full-Text

        134 - Sports law of children with a view on domestic laws, documents and international treaties
        ahmad mohammadvali
      • Open Access Article
        • Abstract Page
        • Full-Text

        135 - Consumer Culture Analysis and Modern Attractions: Influential Factors on Women's Strolling Behavior in Commercial Spaces
        Alireza Pahlavan Keyvan Ahzan Mahdi Fallahi
      • Open Access Article
        • Abstract Page
        • Full-Text

        136 - Identify and Analyze Regional Security Approaches and Policies in the Caucasus
        Amir Asadzadeh ﻣﺤﻤﺪ ﯾﻮﺳفی ﺟﻮﯾﺒﺎري صمد  ظهیری Mohammad Ghorbani Gholshanabad

Rimag


Rimag is an integrated platform to accomplish all scientific journal requirements such as submission, evaluation, reviewing, editing, DOI assignment and publishing in the web.

Links


  • Regional Information Center for Science and Technology
  • RICeST Journal Finder
  • Reference Generator
  • Islamic World Citation Office
  • ISC Journal Performance Indicator
  • ISC Master Journals List
  • Relevant Journals of the Ministry of Science, Research and Technology
  • Iranian Journals IndexedIn ISI

Related Centers


  • Office of the Supreme Leader
  • Presidential Institution
  • Ministry of Science, Research and Technology
  • Ministry of Health and Medical Education
  • Community Communication Center (SAMS)

Technical Support


  • Phone : +98 21 88910048
  • Email : rimag@ricest.ac.ir

Official pages



  • Home Page
  • Site Map
  • Ricest
  • Contact Us
  • Home
  • Site Map
  • Regional Science and Technology Information Center
  • Contact Us

The rights to this website are owned by the Raimag Press Management System.
Copyright © 2017-2025

Home| Login| About Rimag| Contact Us|
[فارسی] [العربية] [fa] [ar]
  • Ricest
  • Login
  • email