scispace - formally typeset
Search or ask a question
Institution

Isfahan University of Technology

EducationIsfahan, Iran
About: Isfahan University of Technology is a education organization based out in Isfahan, Iran. It is known for research contribution in the topics: Nanocomposite & Microstructure. The organization has 10129 authors who have published 19501 publications receiving 345100 citations. The organization is also known as: Dāneshgāh-e San'ati-ye Esfahān.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, a review of research work and developments in synthesis, properties and characterization of silica aerogels is presented, with particular attention paid to drying, which is a critical step in aerogel synthesis and makes the production of this material more economical and commercial.

1,074 citations

Journal ArticleDOI
TL;DR: PCL/gelatin 70:30 nanofiber was found to exhibit the most balanced properties to meet all the required specifications for nerve tissue and was used for in vitro culture of nerve stem cells and proved to be a promising biomaterial suitable for nerve regeneration.

1,010 citations

Journal ArticleDOI
TL;DR: An overview of major challenges in two-tier networks is provided and some pricing schemes for different types of device relaying are proposed.
Abstract: In a conventional cellular system, devices are not allowed to directly communicate with each other in the licensed cellular bandwidth and all communications take place through the base stations. In this article, we envision a two-tier cellular network that involves a macrocell tier (i.e., BS-to-device communications) and a device tier (i.e., device-to-device communications). Device terminal relaying makes it possible for devices in a network to function as transmission relays for each other and realize a massive ad hoc mesh network. This is obviously a dramatic departure from the conventional cellular architecture and brings unique technical challenges. In such a two-tier cellular system, since the user data is routed through other users? devices, security must be maintained for privacy. To ensure minimal impact on the performance of existing macrocell BSs, the two-tier network needs to be designed with smart interference management strategies and appropriate resource allocation schemes. Furthermore, novel pricing models should be designed to tempt devices to participate in this type of communication. Our article provides an overview of these major challenges in two-tier networks and proposes some pricing schemes for different types of device relaying.

981 citations

Journal ArticleDOI
TL;DR: In this article, a comparison between experimental results obtained for nanofluid to homogeneous model in low concentration are close to each other but by increasing the volume fraction, higher heat transfer enhancement for Al 2 O 3 ǫ/ǫ water can be observed.

823 citations

Journal ArticleDOI
TL;DR: This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication networks that use game-theoretic approaches and provides a discussion on the advantages, drawbacks, and future direction of using game theory in this field.
Abstract: This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication networks that use game-theoretic approaches. We present a selected set of works to highlight the application of game theory in addressing different forms of security and privacy problems in computer networks and mobile applications. We organize the presented works in six main categories: security of the physical and MAC layers, security of self-organizing networks, intrusion detection systems, anonymity and privacy, economics of network security, and cryptography. In each category, we identify security problems, players, and game models. We summarize the main results of selected works, such as equilibrium analysis and security mechanism designs. In addition, we provide a discussion on the advantages, drawbacks, and future direction of using game theory in this field. In this survey, our goal is to instill in the reader an enhanced understanding of different research approaches in applying game-theoretic methods to network security. This survey can also help researchers from various fields develop game-theoretic solutions to current and emerging security problems in computer networking.

791 citations


Authors

Showing all 10198 results

NameH-indexPapersCitations
John A Coughlan135131296578
Gabor Istvan Veres135134996104
Gyorgy Vesztergombi133144494821
Eric Conte132120684593
Manas Maity129130987465
Seyed Mohsen Etesami128110176488
Maryam Zeinali126100774519
Nadeesha Wickramage125108674044
K. Krajczar12464665885
Roko Plestina11755255815
Michal Bluj11368755297
Amr Radi10950438952
Ali Mohammadi106114954596
Vijay P. Singh106169955831
H. Bakhshiansohi8241130134
Network Information
Related Institutions (5)
Amirkabir University of Technology
31.1K papers, 487.5K citations

95% related

Iran University of Science and Technology
24.9K papers, 372K citations

95% related

University of Tehran
65.3K papers, 958.5K citations

95% related

Tarbiat Modares University
32.6K papers, 526.3K citations

94% related

Sharif University of Technology
31.3K papers, 526.8K citations

94% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202334
2022148
20211,660
20201,471
20191,601
20181,554