Institution
Isfahan University of Technology
Education•Isfahan, Iran•
About: Isfahan University of Technology is a education organization based out in Isfahan, Iran. It is known for research contribution in the topics: Nanocomposite & Microstructure. The organization has 10129 authors who have published 19501 publications receiving 345100 citations. The organization is also known as: Dāneshgāh-e San'ati-ye Esfahān.
Topics: Nanocomposite, Microstructure, Catalysis, Adsorption, Coating
Papers published on a yearly basis
Papers
More filters
••
TL;DR: In this article, a review of research work and developments in synthesis, properties and characterization of silica aerogels is presented, with particular attention paid to drying, which is a critical step in aerogel synthesis and makes the production of this material more economical and commercial.
1,074 citations
••
TL;DR: PCL/gelatin 70:30 nanofiber was found to exhibit the most balanced properties to meet all the required specifications for nerve tissue and was used for in vitro culture of nerve stem cells and proved to be a promising biomaterial suitable for nerve regeneration.
1,010 citations
••
TL;DR: An overview of major challenges in two-tier networks is provided and some pricing schemes for different types of device relaying are proposed.
Abstract: In a conventional cellular system, devices are not allowed to directly communicate with each other in the licensed cellular bandwidth and all communications take place through the base stations. In this article, we envision a two-tier cellular network that involves a macrocell tier (i.e., BS-to-device communications) and a device tier (i.e., device-to-device communications). Device terminal relaying makes it possible for devices in a network to function as transmission relays for each other and realize a massive ad hoc mesh network. This is obviously a dramatic departure from the conventional cellular architecture and brings unique technical challenges. In such a two-tier cellular system, since the user data is routed through other users? devices, security must be maintained for privacy. To ensure minimal impact on the performance of existing macrocell BSs, the two-tier network needs to be designed with smart interference management strategies and appropriate resource allocation schemes. Furthermore, novel pricing models should be designed to tempt devices to participate in this type of communication. Our article provides an overview of these major challenges in two-tier networks and proposes some pricing schemes for different types of device relaying.
981 citations
••
TL;DR: In this article, a comparison between experimental results obtained for nanofluid to homogeneous model in low concentration are close to each other but by increasing the volume fraction, higher heat transfer enhancement for Al 2 O 3 ǫ/ǫ water can be observed.
823 citations
••
TL;DR: This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication networks that use game-theoretic approaches and provides a discussion on the advantages, drawbacks, and future direction of using game theory in this field.
Abstract: This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication networks that use game-theoretic approaches. We present a selected set of works to highlight the application of game theory in addressing different forms of security and privacy problems in computer networks and mobile applications. We organize the presented works in six main categories: security of the physical and MAC layers, security of self-organizing networks, intrusion detection systems, anonymity and privacy, economics of network security, and cryptography. In each category, we identify security problems, players, and game models. We summarize the main results of selected works, such as equilibrium analysis and security mechanism designs. In addition, we provide a discussion on the advantages, drawbacks, and future direction of using game theory in this field. In this survey, our goal is to instill in the reader an enhanced understanding of different research approaches in applying game-theoretic methods to network security. This survey can also help researchers from various fields develop game-theoretic solutions to current and emerging security problems in computer networking.
791 citations
Authors
Showing all 10198 results
Name | H-index | Papers | Citations |
---|---|---|---|
John A Coughlan | 135 | 1312 | 96578 |
Gabor Istvan Veres | 135 | 1349 | 96104 |
Gyorgy Vesztergombi | 133 | 1444 | 94821 |
Eric Conte | 132 | 1206 | 84593 |
Manas Maity | 129 | 1309 | 87465 |
Seyed Mohsen Etesami | 128 | 1101 | 76488 |
Maryam Zeinali | 126 | 1007 | 74519 |
Nadeesha Wickramage | 125 | 1086 | 74044 |
K. Krajczar | 124 | 646 | 65885 |
Roko Plestina | 117 | 552 | 55815 |
Michal Bluj | 113 | 687 | 55297 |
Amr Radi | 109 | 504 | 38952 |
Ali Mohammadi | 106 | 1149 | 54596 |
Vijay P. Singh | 106 | 1699 | 55831 |
H. Bakhshiansohi | 82 | 411 | 30134 |