• List of Articles n)

      • Open Access Article

        1 - A Study On Visual Cryptography and Providing a Proposed Method for Color Images Cryptography
        shahriyar mohammadi نغمه محمدی
        Visual cryptography is a method that makes use of the characteristics of human vision and it requires neither the knowledge of cryptography nor the complex calculations. This method was first proposed by Naor and Shamir, its implementation is simple, it has been extende More
        Visual cryptography is a method that makes use of the characteristics of human vision and it requires neither the knowledge of cryptography nor the complex calculations. This method was first proposed by Naor and Shamir, its implementation is simple, it has been extended to an secrect sharing (k, n) in which n shares are made from the image and they are distributed among n participants. Moreover, the image can be retrieved with k shares and their assembling onto each other; however, the image is not retrievable with k-1 shares. Colors are represented using a combination of reflected lights from objects in the subtractive model. A wide range of colors is made with the mixture of cyan (C), magenta (M) and yellow (Y) and the combination of blue (B), red (R) and green (G) results in black in this model and also, the combination of these colors with white creates the same colors. This paper presents a visual cryptography proposal for colored images that divides a colored image into some shares after converting it to halftone images based on white and black visual cryptography and their rules are in accordance with the subtractive model of colors. Manuscript profile
      • Open Access Article

        2 - Lithostratigraphy and biostratigraphy of the Asmari Formation in southern flank of Mish anticline (Tang-e-Ganaveh)
        Farzad Moradi Abbas Sadeghi Hasan Amiri Bakhtiar
        The Asmari Formation in the southern flank of Mish anticline (in the north of Gachsaran) with a total thickness of 366 m is mainly composed of medium to thick limestone layers. Based on lithological studies, it is mainly composed of a periodic arrangement of marly lime More
        The Asmari Formation in the southern flank of Mish anticline (in the north of Gachsaran) with a total thickness of 366 m is mainly composed of medium to thick limestone layers. Based on lithological studies, it is mainly composed of a periodic arrangement of marly limestone with very thick, thick and medium bedded limestone layers and in some parts it consists of dolomitic layers. The lower contact of the Asmari Formation with Pabdeh Formation is gradual and its upper contact with the Gachsaran Formation is conformable with some sharp lithological changes. Based on change in thickness of layers, color and lithology, this carbonate sequence is subdivided into three lithological units. In Biostratigraphic studies, 28 species belonging to 41 genera of foraminifera were recognized. According to recognized biozone and foraminifera assemblages, 4 biozones and one undetermined zone were classified according to Laursen et al., 2009. The age of the Asmari Formation in this section is Oligocene (Rupelian-Chatian) to Early Miocene (Aquitanian-Bourdigalian). Manuscript profile
      • Open Access Article

        3 - A Survey to ‘the Letter by Saint Paul to the Writers’ (A manifesto Issued by Jalal Al Ahamad)
        mohammadreza movahedi
        Certain social–political conditions may lead the writers to use indirect ways to express their thoughts, for example, reporting them as the words of others in a different time and place. This is what happened for Jalal Al Ahamad, in a preface, titled as the “Letter by S More
        Certain social–political conditions may lead the writers to use indirect ways to express their thoughts, for example, reporting them as the words of others in a different time and place. This is what happened for Jalal Al Ahamad, in a preface, titled as the “Letter by Saint Paul to the Writers”, to the second edition of “Zan-e Ziadi” (unwanted woman), a collection of his short stories. The letter is something made by Jalal himself not as seemingly claimed by Saint Paul. It was in fact an expression of objection to Parviz Natel Khanlari who had joined the palace folks, detaching himself from the circle of the intellectuals oppositions to Pahlavi regime. This study becomes of special necessity when we see that this letter has been treated as a true text, not as a poetic technique by Jala, as many researchers did in their references to it in their works. The purpose of the present article is to explore the motives behind inventing this letter, its consequences, and to argue why it is fake, so that we can stop the young generation getting mislead in this regard. The argumentation is done based on the text itself, and the comments by Jalal’s contemporaries, i.e. intra-textual an extra- textual studies. Manuscript profile
      • Open Access Article

        4 - A Research on Hayati Gilani's "Mathnavi-e Soleiman va Belqeis" and Contrasting it with some Books on History, (Quran) Interpretation and the Stories about the Prophets, accompanied by the poet's biography
        یوسف  اسماعیل‌زاده سیّد مهدی  نوریان علی اصغر  بابا صفری
        The age of Gourkanian state is considered as a fruitful era for Persian language and literature. The care for the poets and writers from the literary kings and princes caused the promotion of Persian Language in the territory. Abolfazl Kamal al-Din Hayati Gilani was one More
        The age of Gourkanian state is considered as a fruitful era for Persian language and literature. The care for the poets and writers from the literary kings and princes caused the promotion of Persian Language in the territory. Abolfazl Kamal al-Din Hayati Gilani was one of the famous poets of the late 10th and the early 11th centuries. He was introduced to the Gourkanian court by Abolfath Gilani. There, he acquired a lot of respect. His Mathnavi-e Soleiman va Belqeis which is a meritorious work in lyric literature, has already been ignored. In this work, Hayati focuses on Quran's abbreviation in telling the prophets' stories. This lyric- religious Mathnavi is of high value due to the poet's focus on the prophets' chastity, not including Israiiliat, referring to the resources unavailable today, and the linguistic properties, as well. The present article reviews the poet's works first, and then his Mathnavi-e Soleiman va Belqeis , contrasting it with some of the books on history, (Quran) interpretation and the prophets' stories. Manuscript profile
      • Open Access Article

        5 - Theoretical Explanation of “Soft Power” based on Ultra-“Nye” approach in Applying “Immaterial Resources of Power” in Foreign Policy1
        asghar keivan Hosseiny راحله  جمعه‌زاده
        The Concept of Soft Power introduced by Joseph Nye in late eighties has comprised most parts of works related to immaterial approach toward power (especially in relation to USA). The significant point is that the exclusive position of this kind of “Nye-Based attitude” w More
        The Concept of Soft Power introduced by Joseph Nye in late eighties has comprised most parts of works related to immaterial approach toward power (especially in relation to USA). The significant point is that the exclusive position of this kind of “Nye-Based attitude” which caused other ideas and comments related to explicating quality of soft application of power to be neglected and forgotten though they have high priorities in foreign policy (like the theory of just war, the conclusion of democratic peace, Post-Grameci interpretation of Dominance and so on). This study, based on the explication of software dimension along with the Nye ideas, attempts to emphasize this meaning that along the process of theorizing international relations, Nye’s view is just one of the theories which emphasizes the soft mode of power and we must follow an Ultra-Nye sample. Manuscript profile
      • Open Access Article

        6 - Transition to democracy and Ethnic Conflict’s Raising and Failing
          Ahmad   
        Ethnic conflict and its related factors is one of the social sciences’ main research areas, especially in the recent decades. Ethnic conflict revolutions’ parallelism with transition process to democratization, especially after 2th half of 20th century, make political s More
        Ethnic conflict and its related factors is one of the social sciences’ main research areas, especially in the recent decades. Ethnic conflict revolutions’ parallelism with transition process to democratization, especially after 2th half of 20th century, make political sociology of ethnic conflicts focus on this scientific scope that what requirements and circumstances can be provided by transition of democracy for revolution of ethical conflicts. The main question is, whether democratization transition and its process, inevitably is concomitant with ethnical conflicts or transition process can provide an opportunity that prevents ethnical conflicts through the promotion of political negotiations in innovative democratic governments? Regarding lack of theoretical researches in this scope, using qualitative analysis, we studied the conditions through which, democratization transition provides a background both for ethnical conflicts’ moderation and also exacerbation. Institutional strategies that prevent ethnical conflicts, ethnic conflicts and democratic processes’ flourishing and authoritarian regimes’ typology across ethnic variation are the present study’s other interesting areas that have been investigated. Manuscript profile
      • Open Access Article

        7 - A New Recursive Algorithm for Universal Coding of Integers
        Mehdi Nangir Hamid Behroozi Mohammad Reza Aref
        In this paper, we aim to encode the set of all positive integers so that the codewords not only be uniquely decodable but also be an instantaneous set of binary sequences. Elias introduces three recursive algorithms for universal coding of positive integers where each c More
        In this paper, we aim to encode the set of all positive integers so that the codewords not only be uniquely decodable but also be an instantaneous set of binary sequences. Elias introduces three recursive algorithms for universal coding of positive integers where each codeword contains binary representation of the integer plus an attachment portion that gives some information about the first part [1]. On the other hand, Fibonacci coding which is based on Fibonacci numbers is also introduced by Apostolico and Fraenkel for coding of integers [2]. In this paper, we propose a new lossless recursive algorithm for universal coding of positive integers based on both recursive algorithms and Fibonacci coding scheme without using any knowledge about the source statistics [3].The coding schemes which don’t use the source statistics is called universal coding, in these universal coding schemes we should use a universal decoding scheme in the receiver side of communication system. All of these encoding and decoding schemes assign binary streams to positive integers and conversely, without any need of use to probability masses over positive integers. We show that if we use Fibonacci coding in the first part of each codeword we can achieve shorter expected codeword length than Elias Omega code. In addition, our proposed algorithm has low complexity of encoding and decoding procedures. Manuscript profile
      • Open Access Article

        8 - Self-Organization Map (SOM) Algorithm for DDoS Attack Detection in Distributed Software Defined Network (D-SDN)
        Mohsen Rafiee Alireza  shirmarz
        The extend of the internet across the world has increased cyber-attacks and threats. One of the most significant threats includes denial-of-service (DoS) which causes the server or network not to be able to serve. This attack can be done by distributed nodes in the netw More
        The extend of the internet across the world has increased cyber-attacks and threats. One of the most significant threats includes denial-of-service (DoS) which causes the server or network not to be able to serve. This attack can be done by distributed nodes in the network as if the nodes collaborated. This attack is called distributed denial-of-service (DDoS). There is offered a novel architecture for the future networks to make them more agile, programmable and flexible. This architecture is called software defined network (SDN) that the main idea is data and control network flows separation. This architecture allows the network administrator to resist DDoS attacks in the centralized controller. The main issue is to detect DDoS flows in the controller. In this paper, the Self-Organizing Map (SOM) method and Learning Vector Quantization (LVQ) are used for DDoS attack detection in SDN with distributed architecture in the control layer. To evaluate the proposed model, we use a labelled data set to prove the proposed model that has improved the DDoS attack flow detection by 99.56%. This research can be used by the researchers working on SDN-based DDoS attack detection improvement. Manuscript profile
      • Open Access Article

        9 - Recognition of Attention Deficit/Hyperactivity Disorder (ADHD) Based on Electroencephalographic Signals Using Convolutional Neural Networks (CNNs)
        Sara Motamed Elham Askari
        Impulsive / hyperactive disorder is a neuro-developmental disorder that usually occurs in childhood, and in most cases parents find that the child is more active than usual and have problems such as lack of attention and concentration control. Because this problem might More
        Impulsive / hyperactive disorder is a neuro-developmental disorder that usually occurs in childhood, and in most cases parents find that the child is more active than usual and have problems such as lack of attention and concentration control. Because this problem might interfere with your own learning, work, and communication with others, it could be controlled by early diagnosis and treatment. Because the automatic recognition and classification of electroencephalography (EEG) signals is challenging due to the large variation in time features and signal frequency, the present study attempts to provide an efficient method for diagnosing hyperactive patients. The proposed method is that first, the recorded brain signals of hyperactive subjects are read from the input and in order to the signals to be converted from time range to frequency range, Fast Fourier Transform (FFT) is used. Also, to select an effective feature to check hyperactive subjects from healthy ones, the peak frequency (PF) is applied. Then, to select the features, principal component analysis and without principal component analysis will be used. In the final step, convolutional neural networks (CNNs) will be utilized to calculate the recognition rate of individuals with hyperactivity. For model efficiency, this model is compared to the models of K- nearest neighbors (KNN), and multilayer perceptron (MLP). The results show that the best method is to use feature selection by principal component analysis and classification of CNNs and the recognition rate of individuals with ADHD from healthy ones is equal to 91%. Manuscript profile
      • Open Access Article

        10 - Pathology of retaining factors of professional staff with organizational ethics approach in National Oil Company
        gholamreza amjadi Karamolah  Daneshfard Amir Hossein  Mohammad Davoudi
        This study focuses on pathology of retaining professional staff, identifying retaining factors and recognizing the present and pleasant situation of these factors in National Oil Company. Accordingly, reviewing the literature and using the experts’ ideas, factors and ef More
        This study focuses on pathology of retaining professional staff, identifying retaining factors and recognizing the present and pleasant situation of these factors in National Oil Company. Accordingly, reviewing the literature and using the experts’ ideas, factors and effective components to retain professional staff were identified and the final research scheme (draft) was prepared in three stages, conducting the Delphi Technique. This is a descriptive study. The participants included 800 staff in National and Engineering Oil Company, of which 260 were selected through simple sampling Method using Morgan Table. Experts include 30 faculty members and Oil Company managers. The results show that retaining factors include organizational, individual and the cultural factors. Moreover, pair t-test shows that except for 3 components of ‘standards’ , ‘entrepreneurship orientation’ , and ‘identity’, there is a meaningful difference between the present & pleasant situation in the rest of components. According to Freedman Ranking, the present and pleasant situation, the components of conflict, the leadership method, the independency, the occupation scheme, and the risk are vulnerable. Manuscript profile
      • Open Access Article

        11 - Designing an ethical model for human resource development for Public Agencies
        Vahid  Hajilo Gholamreza  Memarzadeh Mahmood  Alborzi
        Achieving ethical orientation in economic development is considered a way to turn the threat into opportunity. In addition to paying attention to the strategic position of ethics in organizational success, Iranian directors are embracing business ethics based on religio More
        Achieving ethical orientation in economic development is considered a way to turn the threat into opportunity. In addition to paying attention to the strategic position of ethics in organizational success, Iranian directors are embracing business ethics based on religious concerns and values of society. Development of human resources is one of the essential requirements of the organization, which necessitates its connection with ethical values is inevitable because negligence and injustice in its implementation lead to lack of individual and organizational development. This article aims to provide a model of the ethical development of human capital for Iranian Public Agencies. The research is applied in terms of purpose and is survey in terms of nature with a combination of quantitative and qualitative approach. In designing the model, Philips and Bandura's human development model have been considered with an ecological approach. Human capital development has been investigated in three dimensions of empowerment, talent management and knowledge management in order to achieve optimal combination. To collect data, interviews with experts were used and a fuzzy Delphi technique, multi-objective math functions and GAMS software, were used for analyzing. Based on the findings, the level of empowerment variable is 0.5, knowledge management is 0.4 and talent management is 0.4. In a desirable situation and at the level of 100% efficiency, the empowerment level was 0.6, knowledge management level was 0.56 and talent management level was 0.53. Also, 11 factors were identified as ethical and cultural barriers to human resource development. The results showed that there is a significant difference between the desirable and existing status of empowerment, talent management and knowledge management. Manuscript profile
      • Open Access Article

        12 - (The Ontological Foundations of man's Intervening stage in Islamic filasafy and Mysticism (‘Irfān
        zhuir al-jashhi Ahmad saeidi مهدی ایمانی مقدم
        What is the truth and dignity of man as manifestation of the divine name of the cosmic world? The ontology of Islamic mysticism is based on the personal unity of existence and the multiplicity of appearances of existence. What is the effect of this look on mystical anth More
        What is the truth and dignity of man as manifestation of the divine name of the cosmic world? The ontology of Islamic mysticism is based on the personal unity of existence and the multiplicity of appearances of existence. What is the effect of this look on mystical anthropology? According to this view, there is an absolute existence, which has manifested numerous manifestations and has perfected itself in detail. The truth of man is the first absolute determination or the first appearance of the transcendence, but man (complete), in addition to the first determination, is also present in other modes of being, and therefore, unlike the first determination, and contrary to other general and partial definitions, the unity of truth is manifested And give her countless compromises. Human being is the only advent of the Imam which is the right to assimilate all the names and attributes of God, and equivocal (without one over another), and so to speak, is the divination between the truth and the creation or interruption of unity and plurality. In this article, we examine the most important ontological foundations of Islamic mysticism, which leads to a particular type of anthropology, and many works and topics in verbal topics. Manuscript profile
      • Open Access Article

        13 - Study of the Function of Taking into Account Tanzil (Revelation) in the Maarej Al-Tafakor va Daghyegh Al-Tadabor
        مصطفی  عطار آبکناری   mohammad ali ayazi kazem gazizadeh
        Abdulrahman Hanbakah Meidani is a Suni Quran commentator who has interpreted Quranic Surahs in accordance with their order of revelation in his work entitled “Maarej Al-Tafakor va Daghyegh Al-Tadabor”. Researchers conducted on the above book show some discussions addres More
        Abdulrahman Hanbakah Meidani is a Suni Quran commentator who has interpreted Quranic Surahs in accordance with their order of revelation in his work entitled “Maarej Al-Tafakor va Daghyegh Al-Tadabor”. Researchers conducted on the above book show some discussions addressing the issue of the order of revelation in his interpretations methods. The current paper analyzes the examples following the introduction to the foundations and methods. The discussion seeks to explain the accuracy and validity of this method of interpretation. In addition, the current paper is new in addressing the issue of field study methods and foundation based on the order of revelation applied in the book Maarej Al-Tafakor va Daghyegh Al-Tadabor. Having analyzed the foundation of interpretation it was concluded that in most instances better understanding would be achieved in the absence of attention to the order of revelation in the foundations and methods of the order of revelation and taking into account the order of revelation (Tanzil) is not much required. Manuscript profile
      • Open Access Article

        14 - Incompleteness of Heidegger’s Interpretation of Platonic Truth: A Critical Review of Plato’s Doctrine of Truth
        Said  Binayemotlagh seyyed Majid  Kamali
        In his treatise of Plato’s Doctrine of Truth, by referring to Plato’s “Allegory of the Cave”, Heidegger intends to demonstrate that the meaning of truth in Platonic philosophy underwent some transformation comparing to how pre-Socratic Greeks defined it. Here, truth as More
        In his treatise of Plato’s Doctrine of Truth, by referring to Plato’s “Allegory of the Cave”, Heidegger intends to demonstrate that the meaning of truth in Platonic philosophy underwent some transformation comparing to how pre-Socratic Greeks defined it. Here, truth as unhiddenness is reduced to truth as “true” and “correspondence”. The purpose of the present paper is to explain that Heidegger’s interpretation of Platonic truth does not cover all of Plato’s ideas regarding the meaning of truth. Accordingly, by referring to some of Plato’s ideas regarding, for example, “good”, “beauty”, “existence”, and “truth”, the writers have tried to disclose some of the contradictory points of Heidegger’s interpretation of the meaning of truth in Plato’s philosophy. They have also tried to demonstrate that Heidegger’s reading of Plato is reductionist in nature, and that downgrading the meaning of truth merely to the level of “true” and “correspondence”, more than being based on Plato’s documented ideas, originates in Heidegger’s will to call the whole history of Western philosophy as Western metaphysics. Manuscript profile
      • Open Access Article

        15 - Ibn Arabi and Divine Wisdom on the Word “Adam”: A Study of a Comprehensive Image of Adam in Fusus al-Hikam
        Masood  Ahmadi Afzadi Nawab  Moqarrabi
        The most important point in the “Adam” chapter of Ibn Arabi’s book of Fusus al-hikam pertains to the whyness of the creation of Adam and the world. Within our religious and Islamic context, the first response to this question is based on the famous holy hadith that cons More
        The most important point in the “Adam” chapter of Ibn Arabi’s book of Fusus al-hikam pertains to the whyness of the creation of Adam and the world. Within our religious and Islamic context, the first response to this question is based on the famous holy hadith that considers the Divine Knowledge as the basis and reason of creation. However, this knowledge-based response is too vague and insufficient to explain the whole story and needs to be expanded. One can view this problem from another perspective: there are, in fact, two different views; one is based on a general image of believers in Abrahamic religions, and the other rests upon the oneness of being. In the latter image, which is the most important image for epistemologists in the field of Divine Knowledge, God is both the outermost and the innermost; He is both the beginning and the end. Adam (human being) is both creation and truth; he is the gathering point of all divine names, and the world is a mirror in which God and Adam see themselves. The angels are also the powers of the world; glory and beauty are the two hands of God. Moreover, the perfect Man is the same single soul. Finally, it is noted that God’s vicegerent on Earth possesses both the image of God and the image of the world. In this paper, the writers have tried to explore this image from various angles and, ultimately, provide a comprehensive picture of the problem under debate. Manuscript profile
      • Open Access Article

        16 - Neural Control of the Induction Motor Drive: Robust Against Rotor and Stator Resistances Variations and Suitable for Very Low and High Speeds
        H. Moayedi Rad M. A. Shamsi-Nejad mohsen Farshad
        In this paper, induction motor speed control drive is designed with application two multilayer feed-forward neural networks. That those are used one for generate PWM pulse and other for estimation of required torque and flux information. For trained of the PWM wave gene More
        In this paper, induction motor speed control drive is designed with application two multilayer feed-forward neural networks. That those are used one for generate PWM pulse and other for estimation of required torque and flux information. For trained of the PWM wave generate neural network is used from compound information two voltage and current classic model. Also, against general classic models for generate of the switching pulses is used as compound from reference voltage and current two motor phases. With these ideas are eliminated problems of the voltage and current classic models (flux saturation in current model for high speeds and voltage drop in voltage model for low speeds). As voltage profile is improved in this paper. The required feedback signals estimation (including: rotor flux, torque, etc.) is estimated by multilayer feed-forward neural network. That for robustness of the above estimator against rotor and stator resistances variations in time work of motor is used from compound trained data of the voltage and current classic models, because the voltage and current of the general classic models to sequence are independent of rotor and stator resistances. The simulation results by MATLAB-Simulink verify the proposed drive in improvement of the speed profile in transient and steady-state operating modes. Also, it verify clearly robust of the proposed drive against rotor and stator resistances variations in time work. Manuscript profile
      • Open Access Article

        17 - Simulation of Pyramidal Cells Firing Types and Adjustment of Their Characteristics by Means of Transient Potassium Currents
        Z. Daneshparvar M. R. Daliri
        Pyramidal cells of the dorsal cochlear nucleus (DCN) represent firing types with different latencies. They incorporate two transient potassium currents namely Ikif and Ikis with fast and slow inactivation gatings, respectively. Transient potassium currents i.e. currents More
        Pyramidal cells of the dorsal cochlear nucleus (DCN) represent firing types with different latencies. They incorporate two transient potassium currents namely Ikif and Ikis with fast and slow inactivation gatings, respectively. Transient potassium currents i.e. currents having both activation and inactivation gatings influence on the latency before firing. These currents cause different neural responses containing a regular firing, or a long latency before firing with or without a leading spike. In this paper, the firing behavior of DCN pyramidal cells is simulated first with a 3-variable conductance-based model. Next, mechanisms underlie neural responses of the model are analyzed by dynamical systems analysis methods. The model is a reduced version of Kanold and Manis model with 10 variables. Manuscript profile
      • Open Access Article

        18 - Designing a Self-Tuning Frequency Controller Based on ANNs for an Isolated Microgrid
        F. Habibi H. Bevrani J. Moshtag
        Increasing electrical energy demand, as well as fossil fuel shortages and environmental concerns have caused to use uncommon sources such as distributed generations (DGs) and renewable energy sources (RESs) into modern power systems. A microgrid (MG) system consists of More
        Increasing electrical energy demand, as well as fossil fuel shortages and environmental concerns have caused to use uncommon sources such as distributed generations (DGs) and renewable energy sources (RESs) into modern power systems. A microgrid (MG) system consists of several DGs and RESs which is responsible to provide both electrical and heat powers for local loads. Due to the MGs nonlinearity/complexity which is imposed to the conventional power systems, classical and nonflexible control structures may not represent desirable performance over a wide range of operating conditions. Therefore, more flexible/intelligent control methods are needed most of the past. Hence, in this paper addresses to design an online/self-tuning PI-controller based on artificial neural networks (ANNs) for optimal regulating the MG systems frequency. Manuscript profile
      • Open Access Article

        19 - Electrical Islanding Detection in Electrical Distribution Networks with Distributed Generation Using Discrete Wavelet Transform and Artificial Neural Network
        M. Heidari Orejloo S. Gh. Seifossadat M. Razaz
        In this paper a new algorithm is provided for detecting of electrical islands, based on analysis of transient signals using discrete wavelet transform (DWT) and artificial neural network (ANN). The neural network is taught for Classification of events to the "islands" o More
        In this paper a new algorithm is provided for detecting of electrical islands, based on analysis of transient signals using discrete wavelet transform (DWT) and artificial neural network (ANN). The neural network is taught for Classification of events to the "islands" or "non-islands". Needed features for classification are extracted by DWT of DG transient voltage signal. DIgSILENT, MATLAB and WEKA softwares are used for simulation. Proposed method is tested on a CIGRE medium voltage distribution system with two different types of DGs. The final method is chosen from among 162 relay projects with respect to different criteria, including accuracy, speed, simplicity and cost efficiency is the best. With The analysis done in the best relay selection for DGs, the voltage signal, the mother wavelet db4 and seventh level wavelet transform are used. Simulation results show that this method in compared with existing methods, can detect the electrical islands, with a shorter time and higher accuracy. Manuscript profile
      • Open Access Article

        20 - Evaluation of Fuzzy-Vault-based Key Agreement Schemes in Wireless Body Area Networks Using the Fuzzy Analytical Hierarchy Process
        M. Ebrahimi H. R. Ahmadi M. Abbasnejad Ara
        Wireless body area networks (WBAN) may be deployed on each person’s body for pervasive and real time health monitoring. As WBANs deal with personal health data, securing the data during communication is essential. Therefore, enabling secure communication in this area ha More
        Wireless body area networks (WBAN) may be deployed on each person’s body for pervasive and real time health monitoring. As WBANs deal with personal health data, securing the data during communication is essential. Therefore, enabling secure communication in this area has been considered as an important challenge. Due to the WBAN characteristics and constraints caused by the small size of the nodes, selection of the best key agreement scheme is very important. This paper intends to evaluate different key agreement schemes in WBANs and find the best one. To achieve this goal, three schemes from existing research named OPFKA, PSKA and ECG-IJS are considered and a fuzzy analytical hierarchy process (FAHP) method is employed to find the best scheme. Manuscript profile
      • Open Access Article

        21 - Application of Wide-Area Synchrophasor Measurement System to Alleviate Blackouts by Rotor Angle Instability
        S. Kiarostami S. Kiarostami
        In this paper, a Wide-Area protection system to deal with rotor angle instabilities is proposed. Firstly, a system blackout model is developed and secondly the extreme contingencies that lead to large blackouts are extracted. Initiating events that ultimately lead to ro More
        In this paper, a Wide-Area protection system to deal with rotor angle instabilities is proposed. Firstly, a system blackout model is developed and secondly the extreme contingencies that lead to large blackouts are extracted. Initiating events that ultimately lead to rotor angle instabilities are determined by artificial neural network (ANN). Coherent generators are detected by an algorithm using the data presented by phasor measurement units (PMUs). Based on identification of coherent generators, the power system is split into stable islands by disconnecting the weak interconnecting lines and load shedding. The performance of the proposed strategy is verified by simulations on the IEEE 39-bus sample power system. Manuscript profile
      • Open Access Article

        22 - SAHAR: An Architecture to Strengthen the Control Plane of the Software-Defined Network Against Denial of Service Attacks
        mehran shetabi Ahmad Akbari
        Software-defined network (SDN) is the next generation of network architecture thatby separating the data plane and the control plane enables centralized control with the aim of improving network management and compatibility. However, due to the centralized control polic More
        Software-defined network (SDN) is the next generation of network architecture thatby separating the data plane and the control plane enables centralized control with the aim of improving network management and compatibility. However, due to the centralized control policy, this type of network is prone to Inaccessibility of control plane against a denial of service (DoS) attack. In the reactive mode, a significant increase in events due to the entry of new flows into the network puts a lot of pressure on the control plane. Also, the presence of recurring events such as the collection of statistical information from the network, which severely interferes with the basic functionality of the control plane, can greatly affect the efficiency of the control plane. To resist attack and prevent network paralysis, this paper introduces a new architecture called SAHAR, which consists of a control box consisting of a coordinator controller, a primary flow setup controller, and one or more (as needed) secondary flow setup controller(s). Assigning monitoring and managing tasks to the coordinator controller reduces the load of flow setup controllers. In addition, dividing the incoming traffic between the flow setup controllers by the coordinator controller distributes the load at the control plane. Thus, by assigning the traffic load resulting from a denial-of-service attack to one or more secondary flow setup controller(s), the SAHAR architecture can prevent the primary flow setup controller from impairment and resist DoS attacks. Tests show that SAHAR performs better in the face of a DoS attack than existing solutions. Manuscript profile
      • Open Access Article

        23 - DRSS-Based Localization Using Convex Optimization in Wireless Sensor Networks
        Hassan Nazari M. R. Danaee M. Sepahvand
        Localization with differential received signal strength measurement in recent years has been very much considered. Due to the fact that the probability density function is known for given observations, the maximum likelihood estimator is used. This estimator can be asym More
        Localization with differential received signal strength measurement in recent years has been very much considered. Due to the fact that the probability density function is known for given observations, the maximum likelihood estimator is used. This estimator can be asymptotically represented the optimal estimation of the location. After the formation of this estimator, it is observed that the corresponding cost function is highly nonlinear and non-convex and has a lot of minima, so there is no possibility of achieving the global minimum with Newton method and the localization error will be high. There is no analytical solution for this cost function. To overcome this problem, two methods are existed. First, the cost function is approximated by a linear estimator. But this estimator has poor accuracy. The second method is to replace the non-convex cost function with a convex one with the aid of convex optimization methods, in which case the global minimum is obtained. In this paper, we proposed new convex estimator to solve cost function of maximum likelihood estimator. The results of the simulations show that the proposed estimator has up to 20 percent performance improvement compared with existing estimators, moreover, the execution time of proposed estimator is 30 percent faster than other convex estimators. Manuscript profile
      • Open Access Article

        24 - Semi-Supervised Self-Training Classification Based on Neighborhood Construction
        mona emadi jafar tanha Mohammadebrahim  Shiri Mehdi Hosseinzadeh Aghdam
        Using the unlabeled data in the semi-supervised learning can significantly improve the accuracy of supervised classification. But in some cases, it may dramatically reduce the accuracy of the classification. The reason of such degradation is incorrect labeling of unlabe More
        Using the unlabeled data in the semi-supervised learning can significantly improve the accuracy of supervised classification. But in some cases, it may dramatically reduce the accuracy of the classification. The reason of such degradation is incorrect labeling of unlabeled data. In this article, we propose the method for high confidence labeling of unlabeled data. The base classifier in the proposed algorithm is the support vector machine. In this method, the labeling is performed only on the set of the unlabeled data that is closer to the decision boundary from the threshold. This data is called informative data. the adding informative data to the training set has a great effect to achieve the optimal decision boundary if the predicted label is correctly. The Epsilon- neighborhood Algorithm (DBSCAN) is used to discover the labeling structure in the data space. The comparative experiments on the UCI dataset show that the proposed method outperforms than some of the previous work to achieve greater accuracy of the self-training semi-supervised classification. Manuscript profile
      • Open Access Article

        25 - Breast Cancer Classification Approaches - A Comparative Analysis
        Mohan Kumar Sunil Kumar Khatri Masoud Mohammadian
        Cancer of the breast is a difficult disease to treat since it weakens the patient's immune system. Particular interest has lately been shown in the identification of particular immune signals for a variety of malignancies in this regard. In recent years, several methods More
        Cancer of the breast is a difficult disease to treat since it weakens the patient's immune system. Particular interest has lately been shown in the identification of particular immune signals for a variety of malignancies in this regard. In recent years, several methods for predicting cancer based on proteomic datasets and peptides have been published. The cells turns into cancerous cells because of various reasons and get spread very quickly while detrimental to normal cells. In this regard, identifying specific immunity signs for a range of cancers has recently gained a lot of interest. Accurately categorizing and compartmentalizing the breast cancer subtype is a vital job. Computerized systems built on artificial intelligence can substantially save time and reduce inaccuracy. Several strategies for predicting cancer utilizing proteomic datasets and peptides have been reported in the literature in recent years.It is critical to classify and categorize breast cancer treatments correctly. It's possible to save time while simultaneously minimizing the likelihood of mistakes using machine learning and artificial intelligence approaches. Using the Wisconsin Breast Cancer Diagnostic dataset, this study evaluates the performance of various classification methods, including SVC, ETC, KNN, LR, and RF (random forest). Breast cancer can be detected and diagnosed using a variety of measurements of data (which are discussed in detail in the article) (WBCD). The goal is to determine how well each algorithm performs in terms of precision, recall, and accuracy. The variation of each classification threshold has been tested on various algorithms and SVM turned out to be very promising. Manuscript profile
      • Open Access Article

        26 - Application of Artificial Intelligence during History matching in One of fractured oil Reservoirs
        ناصر اخلاقی ریاض خراط صدیقه مهدوی
        Nowadays different methods of soft computing to reduce time and calculation content are widely used in oil and gas industry. One of the main applications of these methods is prediction of the results of different processes in oil industry which their estimation with More
        Nowadays different methods of soft computing to reduce time and calculation content are widely used in oil and gas industry. One of the main applications of these methods is prediction of the results of different processes in oil industry which their estimation with usual methods is too difficult and has either no single response or their response finding need more time and cost due to their nonlinear of the related problems. Because of much uncertainty on information which used in simulators, the results of these simulation models may have lot errors so production data (Pressure, Production Rate, Water Oil Ratio (WOR), Gas Oil Ratio (GOR) and etc.) during reservoir life is used to historical accommodation between simulator results and actual data. The main purpose of this study is investigation and feasibility study of a usual method of artificial intelligence in oil industry, which is based on the soft computing. In this study, Artificial Neural Network (ANN) is used to make a predicting model for bottom hole pressure and for one of the fractured oil reservoirs with the seven years history of production. Some unconditional parameters such as fracture porosity, horizontal and vertical fracture permeability, height of matrix and matrix-fracture dual porosity were applied as input data of the networks, and pressure was applied as an output in network making. Applied data in network making is achieved from the 50 runs with simulator. The conclusion of this study showed that predicting model of ANN with error less than 4% and reduces the time of process, has a good ability to history matching. Manuscript profile
      • Open Access Article

        27 - Application of Artificial Intelligence during History matching in One of fractured oil Reservoirs
        ناصر اخلاقی Reyaz kharata Sedigheh Mahdavi
        Nowadays different methods of soft computing to reduce time and calculation content are widely used in oil and gas industry. One of the main applications of these methods is prediction of the results of different processes in oil industry which their estimation with u More
        Nowadays different methods of soft computing to reduce time and calculation content are widely used in oil and gas industry. One of the main applications of these methods is prediction of the results of different processes in oil industry which their estimation with usual methods is too difficult and has either no single response or their response finding need more time and cost due to their nonlinear of the related problems. Because of much uncertainty on information which used in simulators, the results of these simulation models may have lot errors so production data (Pressure, Production Rate, Water Oil Ratio (WOR), Gas Oil Ratio (GOR) and etc.) during reservoir life is used to historical accommodation between simulator results and actual data. The main purpose of this study is investigation and feasibility study of a usual method of artificial intelligence in oil industry, which is based on the soft computing. In this study, Artificial Neural Network (ANN) is used to make a predicting model for bottom hole pressure and for one of the fractured oil reservoirs with the seven years history of production. Some unconditional parameters such as fracture porosity, horizontal and vertical fracture permeability, height of matrix and matrix-fracture dual porosity were applied as input data of the networks, and pressure was applied as an output in network making. Applied data in network making is achieved from the 50 runs with simulator. The conclusion of this study showed that predicting model of ANN with error less than 4% and reduces the time of process, has a good ability to history matching. Manuscript profile
      • Open Access Article

        28 - Qom Formation, Microfacies, Depositional sequence, Maragh area.
        Amrolah Safari Hossein Ghanbarloo Ebrahim  Mohammadi
        The Qom Formation is located at the Maragh area (20 kilometers southwest of Kashan). The formation with 216 m thickness contains shale and limestones. Volcanic rocks unconformably are covered by the Qom Formation. The upper boundary of the Qom Formation with the Upper R More
        The Qom Formation is located at the Maragh area (20 kilometers southwest of Kashan). The formation with 216 m thickness contains shale and limestones. Volcanic rocks unconformably are covered by the Qom Formation. The upper boundary of the Qom Formation with the Upper Red Formation is also unconformable. Nine microfacies and terrigenous facies were identified based on the main components and sedimentological features. These microfacies and terrigenous facies were deposited on an open-shelf carbonate platform. Three environments were recognized in this carbonate platform. These environments include the inner shelf (restricted and semi-restricted lagoon), middle shelf, and outer shelf. In addition, three third-order and one incomplete depositional sequences were identified based on the vertical distribution of microfacies. Manuscript profile
      • Open Access Article

        29 - An Investigation of Foundations of Quran’s Reference Status in Critique of Hadiths Based on Seerah of the Infallible (AS)
        Ahmad jamali mohammad kazem rahman setaiesh
        The main criteria recommended by the Infallibles (AS) to ensure the authenticity of Hadiths is Quran-based critique or comparing Hadith to the Quran. This study, using the descriptive-analytical method, after assessing the status of Quran-based critique of Hadith, enume More
        The main criteria recommended by the Infallibles (AS) to ensure the authenticity of Hadiths is Quran-based critique or comparing Hadith to the Quran. This study, using the descriptive-analytical method, after assessing the status of Quran-based critique of Hadith, enumerates the main roots of a lack of benefiting from the Quran in critique of Hadith. They include “resorting to pretexts and justifications for not accepting the authenticity of this criteria”, “a belief by some Muslims that the Companions (of the Prophet) were just (and trustworthy) which, consequently, leads to the belief that some Hadiths in certain available sources must be correct”, “a wrong assumption about the independent status of Hadith beside the Quran”, “a wrong understanding of the status of attributed Hadith and definite Sunnah”, and “the fear that the credibility of some Hadiths in the available sources may be undermined”. As for the foundations of the Quran’s reference status in critique of Hadiths, the study found, based on examples of comparing Hadiths to the Quran by the Shia Imams (AS), that the majority of the studies conducted on Quran-based critique of Hadiths have lacked a Hadith view and been based on personal views and other sciences. Manuscript profile
      • Open Access Article

        30 - The Role of Religious Beliefs of Khwajah Naṣīr al-Dīn Ṭūsī in his Association with and Dissociation from the Ismā‘īlīs
        Seyyed Mohsen  Hosseini Einullah  Khademi Hoorieh Shojaee Baghini Mohammad Vahid Samimi
        A collection of factors underlay Khwajah Naṣīr al-Dīn Ṭūsī’s association with and dissociation from the Ismā‘īlī sect. This paper aims to disclose the role of his religious beliefs in his interactions with this religious sect. Ṭūsī’s education was completed in an atmosp More
        A collection of factors underlay Khwajah Naṣīr al-Dīn Ṭūsī’s association with and dissociation from the Ismā‘īlī sect. This paper aims to disclose the role of his religious beliefs in his interactions with this religious sect. Ṭūsī’s education was completed in an atmosphere of Twelver Shi‘ite philosophy, but in his youth he was also disenchanted with the existing imitative beliefs and dogmatic emphasis on extrinsic features of Sharī‘ah. This led him to develop an interest in some Ismā‘īlī teachings such as their attention to the esoteric meaning of religious texts and join this sect in response to their invitation. Of course, the undesirable conditions in the political-religious geography of the east of the Islamic world had also limited Ṭūsī’s choices. Nevertheless, based on some historical reports of the time of his relationship with the Ismā‘īlīs and some of his works that had been written in conformity with Ismā‘īlī ideas, it can be said that he had some ideological disagreements with them after joining the sect. His reaction after his separation from the Ismā‘īlīs, whom he has introduced as atheists and non-Muslims in his Kalāmī books, demonstrate his ideological conflicts with this sect. In fact, Ṭūsī joined the Ismā‘īlīs in his youth because of his religious ideas and, later, separated from them for the same reason. He revealed his ideological opposition to them in his Kalāmī written works. Manuscript profile
      • Open Access Article

        31 - Analysis of the sonnet "Chehrey-e Aftab Penhan ast (The face of the sun is hidden)" by Hossein Monzavi based on the semiotic approach of "Michael Riffaterre" poem
        fahimeh shafiee Hengameh Ashoori
        The present research is the analysis of the sonnet " Chehrey-e Aftab Penhan ast (The face of the sun is hidden)" by Hossein Monzavi based on the semiotic approach of the poem " MichaelRiffaterre ". The purpose of this research is to discover the meanings and hidden laye More
        The present research is the analysis of the sonnet " Chehrey-e Aftab Penhan ast (The face of the sun is hidden)" by Hossein Monzavi based on the semiotic approach of the poem " MichaelRiffaterre ". The purpose of this research is to discover the meanings and hidden layers of this sonnet at the level of retroactive reading with the aim of answering this question: what factors create the origin of the poem in the sonnet "Chehrey-e Aftab Penhan ast (The face of the sun is hidden)" by Hossein Monzavi? According to the texture of the gazelles, it seems that this is achieved through the meaningful elements in the poem. The present research method is descriptive-analytical and based on library documents. In this research, after selecting this sonnet in accordance with Riffaterre's approach, the aforementioned poem was examined at the level of exploratory and retroactive reading.Then, focusing on retroactive reading, with the aim of discovering the origin of the poem, the selected sonnet was analyzed according to two meaning-making systems, "accumulation process" and "descriptive system".The results of the research indicate that in the "accumulation process", poetic interpretations in the vertical axis and metaphorical relationship revolve around the concept of "lack of communication" and in the "descriptive poem" the two semantic cores of "distrust" and "unsettled socio-political situation" inspire the poetic origin of the sonnet."Distrust" and "Unsettled socio-political situation" are manifested in this sonnet with images and combinations that are mentioned in this research. Finally, these descriptive processes indicate the main origin of this sonnet, which is despair. Manuscript profile
      • Open Access Article

        32 - Presenting a model for managing organizational trust in order to improve productivity and social accountability (Study case: Foundation of the Weakened of the Islamic Revolution)
        Mohammad Reza  Haji anzehaei Mehdi  Irannejad Parizi Reza Najafbagy
        Presenting a model for managing organizational trust in order to improve productivity and social accountability (Study case: Foundation of the Weakened of the Islamic Revolution)
        Presenting a model for managing organizational trust in order to improve productivity and social accountability (Study case: Foundation of the Weakened of the Islamic Revolution) Manuscript profile
      • Open Access Article

        33 - Global record of oceanic anoxic event in the carbonates of the Daryian Formation in the northern High Zagros, Zargran mountain (Gadvan)
        Mazaher Yavari M. Yazdi Hormoz Ghalavand Mohammad Hossein Adabi
        The recording of oceanic anoxic event al record and the time of this event in the shallow carbonates of the Dariyan Formation in Zargran mountain (Gadvan) section in the east of Shiraz, was studied based on carbon and oxygen isotopes, microfacies and fossil data. More
        The recording of oceanic anoxic event al record and the time of this event in the shallow carbonates of the Dariyan Formation in Zargran mountain (Gadvan) section in the east of Shiraz, was studied based on carbon and oxygen isotopes, microfacies and fossil data. In this section, thickness of the Dariyan Formation is 287 m and 191 samples were taken. Based on field data, the sedimentary sequence of this formation, , begins at the base with thick-layered to massive gray limestones containing orbitolinas and rudists, and in the upper parts it includes medium to thick-layered gray limestones including abundant benthic foraminifera, such as orbitolinas. In the mentioned section, based on the study of the embryonic cells of orbitolinas, a late Barmian-early Aptian age was determined for the lower part of this unit, which is the beginning of the formation of anoxic oceanic deposits. The carbon isotope curves between the C3 and C6 curves in the carbonates at the base of the Daryian Formation show disturbances. These changes and the appearance of the Lithocodium-Bacinella facies in this part of the formation confirm the existence of an oceanic anoxic event. The oceanic anoxic event indicates warming of the environment and greenhouse conditions, which was accompanied by abundant rudists in this section and can be a confirmation for the weather conditions of this event. Manuscript profile
      • Open Access Article

        34 - Covert Communication Using Jointly Spread Spectrum and Artificial Noise
        Morteza Shafiee Neyestanak Iman Kazemi
        Covert Communication technique is developed for LPD communication in military and civil applications. Artificial Noise (AN) is the method to confuse eavesdropper and assure data transmission. But, generating AN in wide range of frequencies and times is very challenging. More
        Covert Communication technique is developed for LPD communication in military and civil applications. Artificial Noise (AN) is the method to confuse eavesdropper and assure data transmission. But, generating AN in wide range of frequencies and times is very challenging. Furthermore, it reveals the transmitter or challenges it for synchronization to confuse eavesdropper about environmental noise. This paper proposes a method based on Spread Spectrum as well as self-jamming as AN to solve the problems. By spreading the spectrum, we can generate AN in wide range of frequencies and times, at low power and cost-effective manner. Consequently, there is no need to synchronization. Simulation and numerical results indicate, partial band jammer, effectively confuse the eavesdropper by 1.8 dB margin at JSR = -5 dB. In the situations, transmitter and receiver may communicate at BER = 10^-3 for Eb/N > 8.3 dB. The paper simulates the proposed method for various types of jamming and reports the results where, multitone jamming is rejected for this application as artificial noise. Single-tone jammer also can confuse the eavesdropper by 2.6 dB margin at JSR = -5 dB and TRX communications quality equal to BER = 10-3 for Eb/N > 10.9 dB Manuscript profile
      • Open Access Article

        35 - An Intrusion Detection System based on Deep Learning for CAN Bus
        Fatemeh Asghariyan Mohsen Raji
        In recent years, with the advancement of automotive electronics and the development of modern vehicles with the help of embedded systems and portable equipment, in-vehicle networks such as the controller area network (CAN) have faced new security risks. Since the CAN bu More
        In recent years, with the advancement of automotive electronics and the development of modern vehicles with the help of embedded systems and portable equipment, in-vehicle networks such as the controller area network (CAN) have faced new security risks. Since the CAN bus lacks security systems such as authentication and encryption to deal with cyber-attacks, the need for an intrusion detection system to detect attacks on the CAN bus seem to be very necessary. In this paper, a deep adversarial neural network (DACNN) is proposed to detect various types of security intrusions in CAN buses. For this purpose, the DACNN method, which is an extension of the CNN method using adversarial learning, detects intrusion in three stages; In the first stage, CNN acts as a feature descriptor and the main features are extracted, and in the second stage, the discriminating classifier classifies these features and finally, the intrusion is detected using the adversarial learning. In order to show the efficiency of the proposed method, a real open source dataset was used in which the CAN network traffic on a real vehicle during message injection attacks is recorded on a real vehicle. The obtained results show that the proposed method performs better than other machine learning methods in terms of false negative rate and error rate, which is less than 0.1% for DoS and drive gear forgery attack and RPM forgery attack while this rate is less than 0.5% for fuzzy attack. Manuscript profile
      • Open Access Article

        36 - developments of proof of the truthful (Burhān-i ṣiddīqīn) in Ashʿarite philosophical theology
        Hamid  Ataei Nazari
        Proof of the truthful (Burhān-i ṣiddīqīn) is among the most famous and valid arguments to prove God’s Existence in Islamic philosophy and kalam. However, the history and developments of the proof in Islamic theology have not been the subject of research so far. Likewise More
        Proof of the truthful (Burhān-i ṣiddīqīn) is among the most famous and valid arguments to prove God’s Existence in Islamic philosophy and kalam. However, the history and developments of the proof in Islamic theology have not been the subject of research so far. Likewise, the evolution of the proof in Ashʿarite philosophical theology has not been yet explained. In the present article, having discussed and compared different versions of proof of the truthful set forth by late Ashʿarite theologians, it has been shown that proof of the truthful received much attention in Ashʿarite philosophical theology from the twelfth century onwards and was even considered the most important argument to prove God’s Existence. Moreover, certain Ashʿarite theologians, including Fakhr al-Dīn al-Rāzī and ʿAḍud al-Dīn al-Ījī, succeeded to put forward innovative versions of proof of the truthful which made the proof more common and stronger. Manuscript profile
      • Open Access Article

        37 - Application of Sporomorph EcoGroups (SEGs) and parent plants of miospores in palaeoenvironmental recontruction of the Qadir Member (Nayband Formation), south of Tabas
        Firoozeh Hashemi Yazdi F. Sajjadi Hezaveh Narges Sadat  Mirpoor Shah Abolghasemi Zahra  Mohammadi Manesh Mohsen   Allameh
        Sporomorph EcoGroups data and the relevant plant communities are considered as a possible routine used to draw palaeoecological inferences for their host strata. Occurrence of high abundant and diverse miospores in the Qadir Member (Nayband Formation), from the explorat More
        Sporomorph EcoGroups data and the relevant plant communities are considered as a possible routine used to draw palaeoecological inferences for their host strata. Occurrence of high abundant and diverse miospores in the Qadir Member (Nayband Formation), from the exploratory well no. 954 (Exploratory Area of Parvadeh 4), south of Tabas, central Iran allows for this method to be used to obtain certain palaeoecological implications. By classifying spores and pollens (sporomorphs) in Sporomorph EcoGroups (SEGs), all six plant ecogroups (including plants adapted to Upland, Lowland, River, Pioneer, Coastal, and Tidally-influenced) were identified in examined material. The high ratio of warmer/cooler sporomorphs and the low ratio of drier/wetter sporomorphs suggests deposition under a moist, ±warm climate during the Late Triassic in south of Tabas. From the investigation of miospore parent plants, it was approved that, in descending order, pteridophyta (44%), cycadophyta (34%), coniferophyta (9%), lycophyta (8%), pteridospermophytes (2%), ginkgophytes (2%) and bryophyta (1%) were surrounded the environment of the studied formation. Notable abundance of fern spores (Kyrtomisporis and Foveogleicheniidites) and cycads pollen (Ovalipollis and Ricciisporites) in the palynofloras studied indicate the predominance of warm to semi-warm climate with high humidity. Paleogeographic position of Iran during the Late Triassic in the southern active margin of Eurasia (Turan Plate) tends to support this palaeoclimate generalization. Manuscript profile