Rimag

Rimag

  • About Rimag
  • Services
    • List of Authors
    • For Authors
    • Editor-in-Chief
    • For Editor-in-Chief
    • reviewer
    • For Reviewers
  • List of Journals
  • Order
  • Contact Us
  • Home
  • About Rimag
  • Contact Us
  • Register
  • Log in
  • Order
Advanced
  • Home
  • security
    • List of Articles security

      • Open Access Article
        • Abstract Page
        • Full-Text

        1 - Content rating a nessissity for spam management in social networks
        Simin Ghesmati
      • Open Access Article
        • Abstract Page
        • Full-Text

        2 - Content rating for spam management in social networks a nessissity
        Simin Ghesmati
      • Open Access Article
        • Abstract Page
        • Full-Text

        3 - An Approach to Agent- dependent Replicated in Fault-Tolerant Mobile Code Execution
        Hodjat Hamidi
      • Open Access Article
        • Abstract Page
        • Full-Text

        4 - modified division and replication of data in cloud for optimal performace and security (MDROPS)
        hossein hassanpour
      • Open Access Article
        • Abstract Page
        • Full-Text

        5 - IT Services Outsourcing Novation tactics and Entrepreneurial Strategies in the Financial Services (Case Study: Private and public banks in Markazi province)
        mahtab Eshghiaraghi
      • Open Access Article
        • Abstract Page
        • Full-Text

        6 - Identification and Prioritization of Parameters Affecting Information Security Management System (Case Study: Social Security Branches of Guilan Province)
        Asadollah Shahbahrami ramin rafizadeh kasani hossein pour yousefi dargah
      • Open Access Article
        • Abstract Page
        • Full-Text

        7 - Classify and implement hardware trojans and provide a new way to detect them
        sadegh hajmohseni mohammadali doustari mohammadbagher ghaznavi
      • Open Access Article
        • Abstract Page
        • Full-Text

        8 - Provide a talent management model focusing on the technical, human and perceptual capabilities of managers in the Social Security Organization
        heydar Safari Rashid  Zolfaghari Zafarani Mohsen  Mohammadian Saravi
      • Open Access Article
        • Abstract Page
        • Full-Text

        9 - Assessing the implications of climate change on food security and rural livelihoods Case Study : Rural Farmers in Migan Nehbandan
        Javad Mikaniki Morteza Esmailnejad Mohammad Akbarpour Mahmaoud Falsoleyman
      • Open Access Article
        • Abstract Page
        • Full-Text

        10 - Study of Defense Climatic Conditions in the Kavir & Desert Region and Makran Coasts by using the Hierarchy Analysis Model(AHP
        Alireza  Karbalaei ali hanafi Seyed Asaad  Hosseini Abbas  Alipour
      • Open Access Article
        • Abstract Page
        • Full-Text

        11 - Investigating the Impact of Military Areas on the Safety of Citizens in Isfahan (Case Study: Garrison 44 and 55)
        yashar zaki keramat Ranjbar Dastenaei
      • Open Access Article
        • Abstract Page
        • Full-Text

        12 - Analysis of the Social Pathology Due old Texture Dugonbadan City in Using the Security Approach (Gachsaran Town ship)
        Mohammad Hasel nejad Ali Shamsoddini Mohammad Reza Rezaei
      • Open Access Article
        • Abstract Page
        • Full-Text

        13 - The explanation of food patterns in rural settlements in Jiroft city With approach Land use planning
        ali shahdadi علي آذره
      • Open Access Article
        • Abstract Page
        • Full-Text

        14 - Environmental Security Evaluation Using Space Syntax Theory and Place-Check Technique; Case Study: Saraseyb Neighborhood
        Mehdi Mirmini Samaneh Jalili Sadrabad
      • Open Access Article
        • Abstract Page
        • Full-Text

        15 - Rural migration impact on food security with emphasis on water resources (Case study: villages of Khansar city in Isfahan province)
        hamidehsadat aghamiri  
      • Open Access Article
        • Abstract Page
        • Full-Text

        16 - The trend of urban development with geographical foothold (Case Study: Municipality, District13)
        Somayeh Sadat  Sajjadi abbas arghan Zaenab karkah Abadi
      • Open Access Article
        • Abstract Page
        • Full-Text

        17 - Factors Affecting Security Approach in Kurdistan Region Affiliation with Emphasis on Border Regions of Kurdistan Province
        yashar zaki   eskandar moradi  
      • Open Access Article
        • Abstract Page
        • Full-Text

        18 - Geopolitical Analysis of Spatial Planinng View in Afghanistan and Providing Strategic Model
        Atiqullah Ghamari Qiuomars Yazdanpanah Dero Zahra Pishgahi fard Hossein Hataminejad
      • Open Access Article
        • Abstract Page
        • Full-Text

        19 - Survey of environmental impacts of security policies of Israel (From theory to practice)
          hassan kamran
      • Open Access Article
        • Abstract Page
        • Full-Text

        20 - The Role of Environmental and Physical in Urban Security
           
      • Open Access Article
        • Abstract Page
        • Full-Text

        21 - Environmental security and national security in the context of cross-border hydropolitics developments (Case Study: Harirud)
        hassan kamran    
      • Open Access Article
        • Abstract Page
        • Full-Text

        22 - Investigation of environmental factors affecting the occurrence of urban crime (crime of theft) - Case study: District 1 and 7 of Qom-
           
      • Open Access Article
        • Abstract Page
        • Full-Text

        23 - Investigating the Impact of Defenseless Spaces on Citizen Safety sense (Case Study: Tehran Bazar Neighborhood)
        Hossein Farhadikhah Ahmad Pourahmad   Seyed Khalil Seyed Alipour
      • Open Access Article
        • Abstract Page
        • Full-Text

        24 - Passive defense, the secret of security in the range of of urbans and rurals country (With emphasis on rural and urban architecture)
        Nasr Allah Fallah tabar  
      • Open Access Article
        • Abstract Page
        • Full-Text

        25 - Caspian Sea geopolitical crises emphasizing the geo-economics’ competition between coastal countries and its impact on Iran's national security
           
      • Open Access Article
        • Abstract Page
        • Full-Text

        26 - Shanghai Organization and the Security of Central Asia
        الهه  كولايي
      • Open Access Article
        • Abstract Page
        • Full-Text

        27 - The Elements and the Processes Influencing International System
        Reza سیمبر ارسلان  قربانی شیخ‌نشین
      • Open Access Article
        • Abstract Page
        • Full-Text

        28 - Studying the Relationship between Racial Integration (Kurds &Turks) and Stable Security; Recognition of Effective Factors on Integrating the Races in West Azarbayejan
        شفیع  بهرامیان امید  بهرامیان
      • Open Access Article
        • Abstract Page
        • Full-Text

        29 - Discourse Analysis of Iran and Iraq War
        Heidar Shahriari
      • Open Access Article
        • Abstract Page
        • Full-Text

        30 - Arabic Revolutions and Shaping New Security Orders In Middle East
        فاطمه  قیاسوندی نبی‌الله  ابراهیمی Ahmad سلطانی‌نژاد
      • Open Access Article
        • Abstract Page
        • Full-Text

        31 - Comparative Study of Hobbes, Locke and Rawls' Ideas in the light of the Hypothetical Position of the Social Contract
        mokhtar nouri Majid tavasoli
      • Open Access Article
        • Abstract Page
        • Full-Text

        32 - Relation of Bio-Politics to Global Discourses; Liberalism, Totalitarianism, and Security
        Fateh  Moradi Abasali  Rahbar
      • Open Access Article
        • Abstract Page
        • Full-Text

        33 - An access control model for online social networks using user-to-user relationships
        Mohamad Javad Piran mahmud deypir
      • Open Access Article
        • Abstract Page
        • Full-Text

        34 - A New Finite Field Multiplication Algorithm to Improve Elliptic Curve Cryptosystem Implementations
        Abdalhossein Rezai Parviz Keshavarzi
        10.7508/jist.2013.02.006
      • Open Access Article
        • Abstract Page
        • Full-Text

        35 - Node to Node Watermarking in Wireless Sensor Networks for Authentication of Self Nodes
        Hassan Farsi Seyed Morteza Nourian
        10.7508/jist.2014.02.008
      • Open Access Article
        • Abstract Page
        • Full-Text

        36 - Safe Use of the Internet of Things for Privacy Enhancing
        Hojatallah Hamidi
        10.7508/jist.2016.03.002
      • Open Access Article
        • Abstract Page
        • Full-Text

        37 - Promote Mobile Banking Services by using National Smart Card Capabilities and NFC Technology
        Reza Vahedi Sayed Esmaeail Najafi Farhad Hosseinzadeh Lotfi
        10.7508/jist.2016.03.005
      • Open Access Article
        • Abstract Page
        • Full-Text

        38 - An Effective Risk Computation Metric for Android Malware Detection
        Mahmood Deypir Ehsan Sharifi
        10.7508/jist.2016.04.005
      • Open Access Article
        • Abstract Page
        • Full-Text

        39 - Secured Access Control in Security Information and Event Management Systems
        Leila Rikhtechi Vahid Rafeh Afshin Rezakhani
        10.52547/jist.9.33.67
      • Open Access Article
        • Abstract Page
        • Full-Text

        40 - AI based Computational Trust Model for Intelligent Virtual Assistant
        Babu Kumar Ajay Vikram Singh Parul  Agarwal
        10.29252/jist.8.32.263
      • Open Access Article
        • Abstract Page
        • Full-Text

        41 - Providing a New Smart Camera Architecture for Intrusion Detection in Wireless Visual Sensor Network
        Meisam Sharifi Sani Amid Khatibi
        10.52547/jist.15672.11.41.31
      • Open Access Article
        • Abstract Page
        • Full-Text

        42 - A survey on NFC Payment: Applications, Research Challenges, and Future Directions
        Mehdi Sattarivand Shahram Babaie Amir Masoud  Rahmani
        10.61186/jist.15994.11.43.232
      • Open Access Article
        • Abstract Page
        • Full-Text

        43 - Proposing a New Framework to Decreasing Delay in the Internet of Things by Using Computing Power of Fog
        Mohammad Taghi Shaykhan kianoosh azadi
      • Open Access Article
        • Abstract Page
        • Full-Text

        44 - The honorable security of human; a preeminent basis in citizenship rights
        علیرضا انتظاری  
      • Open Access Article
        • Abstract Page
        • Full-Text

        45 - Moderation and it's role in security’s Soul in Plato
         
      • Open Access Article
        • Abstract Page
        • Full-Text

        46 - Analyzing the Capacity of Islamic Ethics in the Protest Movement of the Palestinian Jihadists on the Israeli National Security Doctrine
             
      • Open Access Article
        • Abstract Page
        • Full-Text

        47 - Security Policy Analysis in the Light of Human Rights
        Eslam Mondani Mohammad Ashouri
      • Open Access Article
        • Abstract Page
        • Full-Text

        48 - A moral look at chapteristic sanctions regarding the legal implications of this, Bernslett II Human Rights
        حسین  اخوان Seyyed Bagher Mirabassi Abo-Mohammad Asgarkhani
      • Open Access Article
        • Abstract Page
        • Full-Text

        49 - The Importance and Position of Principal Organs of United Nations Organization in the Framework of United Nations Charter
        Saeedeh  Golkar Seyyed Mohammad Hashemi
      • Open Access Article
        • Abstract Page
        • Full-Text

        50 - Equality and Non-Discrimination in Social Security in Islamic State
        Ramin  Movahedi Seyyed Hossein  Malekuti Hashtjin Abulfazl  Ranjbari
      • Open Access Article
        • Abstract Page
        • Full-Text

        51 - Provide a successful evaluation model of public policy based on professional ethic
        Sara  Hajatpour karamolah daneshfard Mohammad Taban ghanbar amirnejad
      • Open Access Article
        • Abstract Page
        • Full-Text

        52 - Ethical Conflict of Decisions of the International Court of Justice and the Security Council on the Peaceful Settlement of International Disputes
        Saeedeh  Golkar Seyed Mohammad  Hashemi Ali  Zare
      • Open Access Article
        • Abstract Page
        • Full-Text

        53 - The right and duty in the social security system are the law and moral duty of the state
        mohammadreza najafabadipour Abolfazl Jafargholikhani tayebe balvardi
      • Open Access Article
        • Abstract Page
        • Full-Text

        54 - Indicators of Mahdavi's rule of peace and security
        Ehsan  Samani
      • Open Access Article
        • Abstract Page
        • Full-Text

        55 - The aim of the present study is surveying the relationship between doing religious belief with sense of social security among the students of Arak university in 1394-95
        Abbas Ali  Shahidi
      • Open Access Article
        • Abstract Page
        • Full-Text

        56 - Membership in social network son the level of identification and social security adolescents
        Abbas Ali  Shahidi
      • Open Access Article
        • Abstract Page
        • Full-Text

        57 - Tawhid in the view points of Salafi Jihadi and studying it's consequences
        abbasali farzandi
      • Open Access Article
        • Abstract Page
        • Full-Text

        58 - Information Security Maturity Assessment Model in the IT Departments of the Oil Industry Subsidiaries in Iran
        Reza Radfar Fatemeh akhavan
        10.52547/jstpi.20788.16.64.41
      • Open Access Article
        • Abstract Page
        • Full-Text

        59 - Dynamic Model for Evaluating Information Systems Security by System Dynamics Modeling
        Mohsen Shafiei Nikabadi Amir Hakaki Sara Gholamshahi
        10.52547/jstpi.20820.16.64.52
      • Open Access Article
        • Abstract Page
        • Full-Text

        60 - Criteria of human ethical decision making of managers in conditions of environmental complexity (Case study, Social Security Organization)
        Mahnaz Sarafraz Kakhki Mohammadreza Zabihi Seyed Mahdi Alvani Mahmood Alborzi
      • Open Access Article
        • Abstract Page
        • Full-Text

        61 - Iran's penal policy towards providing security for children in cyberspace
        Seyed Abbas Khalilpour Chalkiasari
      • Open Access Article
        • Abstract Page
        • Full-Text

        62 - The Relationship between mental Security, Social support and Resiliency With Post Traumatic Stress Disorder (PTSD) in the earthquake-affected adolescents In Sarapol-eZahab city
        پروانه شجاعی مهر khodamorad momeni جهانگیر کرمی
      • Open Access Article
        • Abstract Page
        • Full-Text

        63 - Structural Modeling Relationship between Social Security and Happiness with the Mediating Role of Psychological Capital: Case Study of Ahvaz City
        yaser garavand ali anbari asgar Atashafrooz
      • Open Access Article
        • Abstract Page
        • Full-Text

        64 - The Relationship between Mental Security, Social Support and Resiliency with Post Traumatic Stress Disorder (PTSD)
        Parvane Shojaeimehr Khodamorad Momeni Jahangir Karami
      • Open Access Article
        • Abstract Page
        • Full-Text

        65 - Structural Modeling Relationship between Social Security and Happiness with the Mediating Role of Psychological Capital: Case Study of Ahvaz City
        yaser garavand Askar Atashafrooz Ali Anbari
      • Open Access Article
        • Abstract Page
        • Full-Text

        66 - Anthropological Principles of Hobbes and Spinoza on Government (A Historical Overview)
        Bayan Karimy Seyyed Mustafa  Shahraeini
      • Open Access Article
        • Abstract Page
        • Full-Text

        67 - Model Designing of Total Softpower Policy the Islamic Republic of Iran
        Mohammad Taqi  Amini Mohammad MahmoodiMeymand MohamadMehdi Parhizgar محمد رضا  مشایخ
      • Open Access Article
        • Abstract Page
        • Full-Text

        68 - Design Evaluation System of Human Resources in the Social Security Fund of Semnan by using Fuzzy Data Envelopment Analysis
        Abolfazi Danaei Seyedeh Nazereh Seif Hashemi
      • Open Access Article
        • Abstract Page
        • Full-Text

        69 - Developing Indicators for assessing The Status of Iran’s Natural Gas Export Using Energy Demand Security Approach
        Hadi Sahebi pourya souri
      • Open Access Article
        • Abstract Page
        • Full-Text

        70 - Examining solutions to deal with the shortage of cyberspace security experts in the country
        Mohammad fathian Mehdi Abolhamid mohammadreza rafeei
      • Open Access Article
        • Abstract Page
        • Full-Text

        71 - Compilation of structural model, dimensions of organizational performance, opportunities, threats, weakness and strength, social security organization
        ommolbanin gilan bagher sarokhani seyedmohamad seyedmirzaei
      • Open Access Article
        • Abstract Page
        • Full-Text

        72 - Investigating the Factors Affecting the Performance Evaluation of Social Security Brokers in Isfahan Province
        seyedhamid Ghoreishi seyedalireza ebrahimi
      • Open Access Article
        • Abstract Page
        • Full-Text

        73 - Social and cultural Impact Assessment of Sports Complexes: A Case Study of Narmak Sports Complex
        Ma’soumeh  MohaqeqMontazeri
      • Open Access Article
        • Abstract Page
        • Full-Text

        74 - Investigation the role of personality and individual differences on password security breaches: An Empirical Study
        زهرا کریمی manije kaveh rezvan salehi milad moltaji
      • Open Access Article
        • Abstract Page
        • Full-Text

        75 - Nastaliq CAPTCHA
        M. H. Shirali-Shahreza Mohammad Shirali-Shahreza
      • Open Access Article
        • Abstract Page
        • Full-Text

        76 - Risk-based Static and Dynamics Security Assessment and Its Enhancement with Particle Swarm Optimization Generation Realloca
        M.  Saeedi H. Seifi
      • Open Access Article
        • Abstract Page
        • Full-Text

        77 - The Effects of SIP Register Flood Attack and Detection by Using Kullback–Leibler Distance
        S. R. Chogan M. Fathy M. Ramezani
      • Open Access Article
        • Abstract Page
        • Full-Text

        78 - Throughput Optimization in a Broadcast Network Using Adaptive Modulation, Coding and Transmit Power Provisioning Security Constraint
        M. Taki
      • Open Access Article
        • Abstract Page
        • Full-Text

        79 - Simultaneous Implementation of Time of Use Demand Response and Security Constraint Unit Commitment
        M. Kia M. Setayesh-Nazar S. M. Sepasian
      • Open Access Article
        • Abstract Page
        • Full-Text

        80 - Evaluation of Performance, Reliability and Security for Share-Data, Object-Oriented and Pipe and Filter Styles
        H. Banki H. Banki
      • Open Access Article
        • Abstract Page
        • Full-Text

        81 - Identifying Primary User Emulation Attacks in Cognitive Radio Network Based on Bayesian Nonparametric Bayesian
        K. Akbari J. Abouei
      • Open Access Article
        • Abstract Page
        • Full-Text

        82 - Economic Load Dispatch in Power Plants, Taking into Account Environmental Pollutants and System Security Indices Using Multi-Objective Harmony Search Algorithm
        H. Sharifi محمود اوکاتی صادق
      • Open Access Article
        • Abstract Page
        • Full-Text

        83 - An On-Chip Detection Mechanism to Detect Scan-Based Attack in Crypto-Chips
        F. Jamali Zavareh H. Beitollahi
      • Open Access Article
        • Abstract Page
        • Full-Text

        84 - Coordinated Expansion Planning of Gas and Electricity Networks Considering N-1 Security Criterion
        V. Khaligh M. Oloomi Buygi
      • Open Access Article
        • Abstract Page
        • Full-Text

        85 - Energy Efficiency in Secrecy Multi-Antenna Two-Way Relay Networks
        F. B. soroush akhlaghi
      • Open Access Article
        • Abstract Page
        • Full-Text

        86 - A Patient Identification and Authentication Protocol to Increase Security
        Afsaneh Sharafi Sepideh Adabi Ali Movaghar Salah Al-Majed
      • Open Access Article
        • Abstract Page
        • Full-Text

        87 - Designing an Individual Human Resources Development Plan and Elaboration of its Role in the Organizational Performance (Case Study: Social Security Organization, Tehran Branch)
        Naeimeh Tazakori Mohammad  Feizi Mohammad Rouhi Eisalou Eshagh  Rasouli
      • Open Access Article
        • Abstract Page
        • Full-Text

        88 - Identifying the Dimensions and Components of Training Based on Lean Thinking in Social Security Organization
        Fatemeh Manoochehri Parivash Jaafari Nadergholi Ghorchian Amir Hosein Mohammad Davoudi
      • Open Access Article
        • Abstract Page
        • Full-Text

        89 - Validation of the Cultural Security Model in Knowledge-Based Sustainable Development
        Saeide Zare ramezan jahanian mahtab salimi
      • Open Access Article
        • Abstract Page
        • Full-Text

        90 - Designing a Model for Empowering the Social Security Organization Employees based on the Teachings of Nahjul Balagha
        Ali Akbar  Esmaeilzadeh Seyed Ali Akbar  Ahmadi Hamed  FazliKebria
        10.52547/istd.31419.8.31.149
      • Open Access Article
        • Abstract Page
        • Full-Text

        91 - Identification of Organizational Capital and Its Evaluation in Covid-19 Conditions
        hajieh rajabi farjad
        10.61186/jstpi.31810.20.78.28
      • Open Access Article
        • Abstract Page
        • Full-Text

        92 - Social justice and its role in social security from the perspective of the Qur'an and Islamic traditions
        Mohsen Ghafoury pour seed hamid shamerizi Kamal  Khajehpour
      • Open Access Article
        • Abstract Page
        • Full-Text

        93 - Maintaining Confidentiality and Integrity of Data and Preventing Unauthorized Access to DICOM Medical Images
        Mohammad Soltani Hassan Shakeri Mahboobeh Houshmand
      • Open Access Article
        • Abstract Page
        • Full-Text

        94 - Designing a model based on blockchain technology to strengthen cyber security in the banking industry
        hossein amoozadkhalili neda haghi Reza Tavakkoli-Moghaddam
        10.61186/jstpi.33168.19.76.60
      • Open Access Article
        • Abstract Page
        • Full-Text

        95 - A dairy Products Green Supply Chain model with Emphasis on Customer Satisfaction: Combining Interpretive Structural Modeling Approach and Analytical Network Process
        heydar Safari rashid Zolfaghari Zafarani Mohsen  Mohammadian Saravi
      • Open Access Article
        • Abstract Page
        • Full-Text

        96 - Secure Computing on the Internet of Everything
        Seyed Omid Azarkasb Seyed Hossein Khasteh
      • Open Access Article
        • Abstract Page
        • Full-Text

        97 - SQ-PUF: A Resistant PUF-Based Authentication Protocol against Machine-Learning Attack
        Abolfazl Sajadi Bijan Alizadeh
      • Open Access Article
        • Abstract Page
        • Full-Text

        98 - Improve security in cloud computing infrastructure using block chain protocol
        Mohsen Gerami Vahid Yazdanian Siavash Naebasl
        10.61186/jstpi.34504.19.76.1
      • Open Access Article
        • Abstract Page
        • Full-Text

        99 - A Cyber Security Maturity Model for Critical Infrastructures with a Comparative Study Approach
        Mohamad Akhtari mohammadali keramati seyed abdolah amin mousavi
        10.61186/jstpi.36349.19.75.22
      • Open Access Article
        • Abstract Page
        • Full-Text

        100 - Designing a food security management model in Iran
        Reza Eskandari Mehraban Hadi Peykani akbar etebarian
      • Open Access Article
        • Abstract Page
        • Full-Text

        101 - Internal Migration and Social Security: A Study On Relationship Between Internal Migration Patterns and Social Insecurity in Iran
        mahmoud moshfegh
      • Open Access Article
        • Abstract Page
        • Full-Text

        102 - A New Parallel Method to Verify the Packets Forwarding in SDN Networks
        Rozbeh Beglari Hakem Beitollahi
      • Open Access Article
        • Abstract Page
        • Full-Text

        103 - Legal-Ethical Critique of the Stockholm School Theory in the Treatment of COVID-19 pandemic
        Naser  Ghasemi amir abbas rokni
      • Open Access Article
        • Abstract Page
        • Full-Text

        104 - Multilateral Export Control Regimes: a Legal Mechanism or Tool of Political Pressure?
        غلامحسین   دهقانی فاطمه  هاشمی
      • Open Access Article
        • Abstract Page
        • Full-Text

        105 - G4, an Effort for Permanent Membership in the UN Security Council: Background and Future Trends
        آرمین امینی شمس عظیمی
      • Open Access Article
        • Abstract Page
        • Full-Text

        106 - The Role of International Organizations in the Realization of the Right to Food
        Farhad Talaie علی رزمخواه
      • Open Access Article
        • Abstract Page
        • Full-Text

        107 - Comparative Study of UNSC’s Performance vis-à-vis Developments in Libya, Yemen and Bahrain (2011-12) from Viewpoint of International Law
        رضا  موسی‌زاده رضا  رنجبر
      • Open Access Article
        • Abstract Page
        • Full-Text

        108 - Iran's Energy Geopolitics and EU’s Approach
        سیدشمس‌الدین  صادقی
      • Open Access Article
        • Abstract Page
        • Full-Text

        109 - Iran's Energy Geopolitics and EU’s Approach
        آرمین امینی الهام  حسین‌خانی
      • Open Access Article
        • Abstract Page
        • Full-Text

        110 - Necessity and Possibility of Judicial Supervision over Security Council’s Performance in UN Legal System
        حسین شریفی طرازکوهی ساسان  مدرس سبزواری
      • Open Access Article
        • Abstract Page
        • Full-Text

        111 - Challenges Facing Security and Defense Policies of EU and US
        سعید  خالوزاده
      • Open Access Article
        • Abstract Page
        • Full-Text

        112 - Contending Theories and the Analysis of International Organizations and Institutions, Peace, Security and Justice
        Seyed Abdolali ghavam Samira Mohseni
      • Open Access Article
        • Abstract Page
        • Full-Text

        113 - ANZUS Treaty: Past and Future
        Nasrin Mosaffa Ahmad Heidarbeigi
      • Open Access Article
        • Abstract Page
        • Full-Text

        114 - The Necessity of Power Sharing in the Security Council: A Pluralistic Model
        Enayatollah Yazadani Enayatollah Yazadani
      • Open Access Article
        • Abstract Page
        • Full-Text

        115 - The Legitimacy of State’s Evaluation in Implementation of United Nations Security Council
        Malihe  Behfar Hassan   Savari
      • Open Access Article
        • Abstract Page
        • Full-Text

        116 - Primacy in Relation Between the International Court of Justice and UN Security Council
        همایون  مافی وحید بذّار
      • Open Access Article
        • Abstract Page
        • Full-Text

        117 - A New Structure for UN Security Council; The Need of Hegemony of Power
        Siamak Soltani Saleh  Rezaie Pishrobat
      • Open Access Article
        • Abstract Page
        • Full-Text

        118 - EU’s Common Foreign and Security Policy: Challenges and Obstacles
        Yasser Nooralivand Mohammad Reza Majidi
      • Open Access Article
        • Abstract Page
        • Full-Text

        119 - Hidden Veto and Its Impact on Decision-Making Process in the Security Council
        رضا  موسی‌زاده Arsalan Jamshidi
      • Open Access Article
        • Abstract Page
        • Full-Text

        120 - The Status of OIC Member States in the Main Organs of the United Nations
        ستار عزیزی
      • Open Access Article
        • Abstract Page
        • Full-Text

        121 - An Analysis of the Political-Security Integration of the European Union within the Framework of Realist Approaches
        Seyed Davood Aghaee Yasser Nooralivand Ebrahim Bagheri
      • Open Access Article
        • Abstract Page
        • Full-Text

        122 - Prerequisites for the Introduction of Regional Arrangements to Maintain International Peace and Security
        علی احدی کرنق Mehdi Hadadi
      • Open Access Article
        • Abstract Page
        • Full-Text

        123 - Change in Environmental Security in the Post-Cold War International Law
        Seyed Abdolali ghavam Seyedeh Massoumeh  Mostafavi
      • Open Access Article
        • Abstract Page
        • Full-Text

        124 - A Comparative Study of Iran's Social Security Law in the Field of Women's Rights with the Documents of International Labour Organization
        Fatemeh Sarreshteh Izadmouoa
      • Open Access Article
        • Abstract Page
        • Full-Text

        125 - Advance on the European Common Foreign and Security Policy, from Kosovo to Ukraine
        Yousef Molaei Issa  Adeli
      • Open Access Article
        • Abstract Page
        • Full-Text

        126 - Feasibility Analysis of Formation of Arabian military coalition in Persian Gulf; with Emphasis on Geopolitical Backgrounds
        Reza Rahimi Kiumars  YazdanpanahRahimi
      • Open Access Article
        • Abstract Page
        • Full-Text

        127 - The place of UN Security Council sanctions resolutions in the US sanctions strategy (2018-2020)
        Mahdi Pakzat Saeed Daghineh
      • Open Access Article
        • Abstract Page
        • Full-Text

        128 - COVID-19 and United Nations Peacekeeping Forces: New Challenges piled on Old Constraints
        Nasrin Mosaffa
      • Open Access Article
        • Abstract Page
        • Full-Text

        129 - The place of UN Security Council sanctions resolutions in the US sanctions strategy (2018-2020)
        Mahdi Pakzat Saeed Daghineh
      • Open Access Article
        • Abstract Page
        • Full-Text

        130 - COVID-19 and United Nations Peacekeeping Forces: New Challenges piled on Old Constraints
        Nasrin Mosaffa
      • Open Access Article
        • Abstract Page
        • Full-Text

        131 - The Legitimacy of State’s Evaluation in Implementation of United Nations Security Council
        Malihe  Behfar Hassan   Savari
      • Open Access Article
        • Abstract Page
        • Full-Text

        132 - Primacy in Relation Between the International Court of Justice and UN Security Council
        همایون  مافی وحید بذّار
      • Open Access Article
        • Abstract Page
        • Full-Text

        133 - A New Structure for UN Security Council; The Need of Hegemony of Power
        Siamak Soltani Saleh  Rezaie Pishrobat
      • Open Access Article
        • Abstract Page
        • Full-Text

        134 - EU’s Common Foreign and Security Policy: Challenges and Obstacles
        Mohammad Reza Majidi Yasser Nooralivand
      • Open Access Article
        • Abstract Page
        • Full-Text

        135 - China's Foreign Policy and the Evolution of its Security Council Voting Behavior
        Hamid salehi Emad Aslani Minareh Bazaari
      • Open Access Article
        • Abstract Page
        • Full-Text

        136 - The Role of the UN Security Council in Adopting Resolutions Against ISIS
        ehsan jafari far Reza nasirihamed
      • Open Access Article
        • Abstract Page
        • Full-Text

        137 - Human Security and Human Rights; Distinctions and Overlapping Areas
        Naser khorshidi sarem shiravand
      • Open Access Article
        • Abstract Page
        • Full-Text

        138 - Assessing the Role of South and Southeast Asian Regional Organizations in Confronting Maritime Terrorism: Case Study of SAARC, BIMSTEC & ASEAN
        Farhad Talaie Maral Javidbakht
      • Open Access Article
        • Abstract Page
        • Full-Text

        139 - Iran's criminal policy in criminal security agreements in the Criminal Procedure Code of 1392
        roya ghasemi
      • Open Access Article
        • Abstract Page
        • Full-Text

        140 - Social welfare and its relationship with social capital and sense of security
        milad abdi
      • Open Access Article
        • Abstract Page
        • Full-Text

        141 - computer security models and proposing a new perspective: A review paper
        Hadi sadjadi Reza Kalantari
      • Open Access Article
        • Abstract Page
        • Full-Text

        142 - Designing an Entrepreneurial Marketing Model with an Approach to Improve Organizational Performance
        javad motevali taher mohammadreza eghbal مجید فتاحی
        10.61186/jstpi.39494.20.78.84
      • Open Access Article
        • Abstract Page
        • Full-Text

        143 - Investigating the effect of employees' perceptions of corporate social responsibilities on organizational pride and customer service commitment
        elahe Maneshdavi seyed mehdi mirmehdi فتانه یاراحمدی
      • Open Access Article
        • Abstract Page
        • Full-Text

        144 - Machine Learning-Based Security Resource Allocation for Defending against Attacks in the Internet of Things
        Nasim Navaei Vesal Hakami
      • Open Access Article
        • Abstract Page
        • Full-Text

        145 - Designing a Secure Consensus Algorithm for Use in Blockchain
        Hosein Badri Masumeh Safkhani
      • Open Access Article
        • Abstract Page
        • Full-Text

        146 - Identifying the Key Drivers of Digital Signature Implementation in Iran (using fuzzy Delphi method)
        Ghorbanali Mehrabani Fatemeh Zargaran khouzani
      • Open Access Article
        • Abstract Page
        • Full-Text

        147 - Designing Model of Food Security Management in Iran
        Reza Eskandari Mehraban Hadi Peykani akbar etebarian
      • Open Access Article
        • Abstract Page
        • Full-Text

        148 - Contexts and Factors related to the Quality of Urban life in the Neighborhoods of One District of Tehran: The Application of a Multi-Level Model
        hamid ramezani ali hatami nader haghshenas Milad Tofangchi Mahyari
      • Open Access Article
        • Abstract Page
        • Full-Text

        149 - Investigating the impact of climate change on the environment and agriculture
        Bahareh Rafiei Hamed Kioumarsi Reza Naseri Harsini Seyed Mohammad Reza Mahdavian
      • Open Access Article
        • Abstract Page
        • Full-Text

        150 - Analysis of Ethical Principles of Disciplinary and Educational Responses to Juvenile Delinquency from the Perspective of Islamic Criminal Law
        roh allah ebrahimi mohamad ali haji deh abadi ALIREZA HOSSINI
      • Open Access Article
        • Abstract Page
        • Full-Text

        151 - The effects of the emergence of security-oriented criminalization in crimes against security in Iranian criminal law
        Hossein  Rezaei Todeshki Seyyed Mahmoud Majidi mohammad javad baghi zadeh
      • Open Access Article
        • Abstract Page
        • Full-Text

        152 - Government’s role in human’s security and its impact on people’s happiness
        Behnaz  Yousefi Hossein  Rahmatollahi
      • Open Access Article
        • Abstract Page
        • Full-Text

        153 - Designing a knowledge management system deployment model in the social security organization of Hormozgan province
        Reza Baranimashahrani Mehdi Bagheri payam paslari
      • Open Access Article
        • Abstract Page
        • Full-Text

        154 - A Novel Approach based on Chaotic Mapping for Implementing Security Phases on Cloud Computing
        Azita Rezaei Ali Broumandnia Seyed Javad Mirabedini
      • Open Access Article
        • Abstract Page
        • Full-Text

        155 - Compilation of the green human resources management development system in Iran's social security organization
        korosh Shafei saeid bagher salimi Hossein Ganji Nia
      • Open Access Article
        • Abstract Page
        • Full-Text

        156 - Explaining the discourse of thoughts, opinions and statements of Imam Khamenei regarding the role of food security in the resistance economy
        Mohammad Bidgoli asghar Rajabi Deh Borzoei
      • Open Access Article
        • Abstract Page
        • Full-Text

        157 - Providing a Blockchain-Based Method to Protect Users’ Privacy in Social Networks
        Ibrahim Zamani Babgohari Monireh Hosseini
      • Open Access Article
        • Abstract Page
        • Full-Text

        158 - Explaining the principles of "social security" in Nahj al-Balaghah and its realization in society with a neglect approach
        alinaghi lezgi alireza akbar zadeh Mohammad karaminia reza ojagh
      • Open Access Article
        • Abstract Page
        • Full-Text

        159 - Investigation and effects of regional developments on the security of Iran and Turkey borders
        Mahdi Najafi Jalil nayebian Parviz Ahadei Mohammad Yousefi Joybari
      • Open Access Article
        • Abstract Page
        • Full-Text

        160 - Optimal Power Allocation for Maximizing Secrecy Rate in Physical Layer Security Using Frequency Diverse Array Directional Modulation and Artificial Noise
        Mahdi Tayyeb Massoud Hossein Khaleghi
      • Open Access Article
        • Abstract Page
        • Full-Text

        161 - Human dignity and weapons of mass destruction
        Mohosen Reza  Mosaddegh,khah Morteza  Bayat Hasan Soleimani
      • Open Access Article
        • Abstract Page
        • Full-Text

        162 - A novel security usability method for e-learning platforms
        Golbarg Nasiri Negin Hajiahmadi
      • Open Access Article
        • Abstract Page
        • Full-Text

        163 - Identify and analyze regional security approaches and policies in the Caucasus
        Amir Asadzadeh Mohammad Yousefi Joybari صمد  ظهیری Mohammad Ghorbani Gholshanabad
      • Open Access Article
        • Abstract Page
        • Full-Text

        164 - Investigating weapons of mass destruction with a focus on moral values in jurisprudence and international law
        Mohsen Reza  Mosaddegh khah Morteza  Barati Hasan Soleimani
      • Open Access Article
        • Abstract Page
        • Full-Text

        165 - The role of food security in a resistance economy with emphasis on the thoughts, opinions and statements of the Supreme Leader Mohammad Bidgoli
        Mohammad Bidgoli asghar Rajabi Deh Borzoei
      • Open Access Article
        • Abstract Page
        • Full-Text

        166 - Design and Analysis of a Secure Intelligent Blood Management Information System
        Hessah  Alhajri Mostafa Abd El-barr Kalim Qureshi
        10.61186/jist.46368.12.48.300
      • Open Access Article
        • Abstract Page
        • Full-Text

        167 - Provide A Lightweight Encryption Solution To secure Data In The Internet Of Things
        wahab aminiazar rasoul farahi fattameh dashti
      • Open Access Article
        • Abstract Page
        • Full-Text

        168 - Compilation of green human resource management development system in Iran's social security organization
        Koroush Shafeie Degesara saeed baghersalimi Hossein Ganji Nia
      • Open Access Article
        • Abstract Page
        • Full-Text

        169 - Identifying the Effective Factors on the Equalization of Premium Rates Received in Line with the policy of managing resources, expenses and Financial Reserves of the Social Security Organization (General Administration of Cities of Tehran Province)
        Ahmadreza Mohamadlua Farid Asgari Abdollah Nazari Farzane  Khalili
      • Open Access Article
        • Abstract Page
        • Full-Text

        170 - A Survey on Computer Security Patterns and Proposing a New Perspective
        Hadi sadjadi Reza Kalantari
      • Open Access Article
        • Abstract Page
        • Full-Text

        171 - Identifying the Key Drivers of Digital Signature Implementation in Iran (Using Fuzzy Delphi Method)
        Ghorbanali Mehrabani Fatemeh Zargaran khouzani
      • Open Access Article
        • Abstract Page
        • Full-Text

        172 - Investigation and effects of regional developments on the security of Iran and Turkey borders
        Mahdi Najafi Jalil nayebian Parviz Ahadei  
      • Open Access Article
        • Abstract Page
        • Full-Text

        173 - Explaining the Relationship Between the Sense of Security and Abnormality: A Case Study of Khorramshahr Citizens
        Ebrahim Mirzaei Abouzar Kaseminezhad javad jehangirzadeh
      • Open Access Article
        • Abstract Page
        • Full-Text

        174 - Factors Influencing Women's Empowerment to Ensure Psychological Security of the Family
        Samaneh Ghandehary
      • Open Access Article
        • Abstract Page
        • Full-Text

        175 - Sports law of children with a view on domestic laws, documents and international treaties
        ahmad mohammadvali
      • Open Access Article
        • Abstract Page
        • Full-Text

        176 - Consumer Culture Analysis and Modern Attractions: Influential Factors on Women's Strolling Behavior in Commercial Spaces
        Alireza Pahlavan Keyvan Ahzan Mahdi Fallahi
      • Open Access Article
        • Abstract Page
        • Full-Text

        177 - Identify and Analyze Regional Security Approaches and Policies in the Caucasus
        Amir Asadzadeh ﻣﺤﻤﺪ ﯾﻮﺳفی ﺟﻮﯾﺒﺎري صمد  ظهیری Mohammad Ghorbani Gholshanabad

Rimag


Rimag is an integrated platform to accomplish all scientific journal requirements such as submission, evaluation, reviewing, editing, DOI assignment and publishing in the web.

Links


  • Regional Information Center for Science and Technology
  • RICeST Journal Finder
  • Reference Generator
  • Islamic World Citation Office
  • ISC Journal Performance Indicator
  • ISC Master Journals List
  • Relevant Journals of the Ministry of Science, Research and Technology
  • Iranian Journals IndexedIn ISI

Related Centers


  • Office of the Supreme Leader
  • Presidential Institution
  • Ministry of Science, Research and Technology
  • Ministry of Health and Medical Education
  • Community Communication Center (SAMS)

Technical Support


  • Phone : +98 21 88910048
  • Email : rimag@ricest.ac.ir

Official pages



  • Home Page
  • Site Map
  • Ricest
  • Contact Us
  • Home
  • Site Map
  • Regional Science and Technology Information Center
  • Contact Us

The rights to this website are owned by the Raimag Press Management System.
Copyright © 2017-2025

Home| Login| About Rimag| Contact Us|
[فارسی] [العربية] [fa] [ar]
  • Ricest
  • Login
  • email