RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
          펼치기
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • SCIESCOPUSKCI등재
      • KCI등재
      • KCI등재

        Innovation Network Development Model in Telemedicine: A Change in Participation

        Maryam Goodarzi,Mashallah Torabi,Reza Safdari,Hossein Dargahi,Sara Naeimi 대한의료정보학회 2015 Healthcare Informatics Research Vol.21 No.4

        This paper introduces a telemedicine innovation network and reports its implementation in Tehran University of Medical Sciences. The required conditions for the development of future projects in the field of telemedicine are also discussed; such projects should be based on the common needs and opportunities in the areas of healthcare, education, and technology. Methods: The development of the telemedicine innovation network in Tehran University of Medical Sciences was carried out in two phases: identifying the beneficiaries of telemedicine, and codification of the innovation network memorandum; and brainstorming of three workgroup members, and completion and clustering ideas. The present study employed a qualitative survey by using brain storming method. Thus, the ideas of the innovation network members were gathered, and by using Freeplane software, all of them were clustered and innovation projects were defined. Results: In the services workgroup, 87 and 25 ideas were confirmed in phase 1 and phase 2, respectively. In the education workgroup, 8 new programs in the areas of telemedicine, tele-education and teleconsultation were codified. In the technology workgroup, 101 and 11 ideas were registered in phase 1 and phase 2, respectively. Conclusions: Today, innovation is considered a major infrastructural element of any change or progress. Thus, the successful implementation of a telemedicine project not only needs funding, human resources, and full equipment. It also requires the use of innovation models to cover several different aspects of change and progress. The results of the study can provide a basis for the implementation of future telemedicine projects using new participatory, creative, and innovative models. Keywords: Innovation, Idea, Health Care Administrat

      • SCOPUSKCI등재

        Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures

        Bahrami, Pooneh Nikkhah,Dehghantanha, Ali,Dargahi, Tooska,Parizi, Reza M.,Choo, Kim-Kwang Raymond,Javadi, Hamid H.S. Korea Information Processing Society 2019 Journal of information processing systems Vol.15 No.4

        The need for cyber resilience is increasingly important in our technology-dependent society where computing devices and data have been, and will continue to be, the target of cyber-attackers, particularly advanced persistent threat (APT) and nation-state/sponsored actors. APT and nation-state/sponsored actors tend to be more sophisticated, having access to significantly more resources and time to facilitate their attacks, which in most cases are not financially driven (unlike typical cyber-criminals). For example, such threat actors often utilize a broad range of attack vectors, cyber and/or physical, and constantly evolve their attack tactics. Thus, having up-to-date and detailed information of APT's tactics, techniques, and procedures (TTPs) facilitates the design of effective defense strategies as the focus of this paper. Specifically, we posit the importance of taxonomies in categorizing cyber-attacks. Note, however, that existing information about APT attack campaigns is fragmented across practitioner, government (including intelligence/classified), and academic publications, and existing taxonomies generally have a narrow scope (e.g., to a limited number of APT campaigns). Therefore, in this paper, we leverage the Cyber Kill Chain (CKC) model to "decompose" any complex attack and identify the relevant characteristics of such attacks. We then comprehensively analyze more than 40 APT campaigns disclosed before 2018 to build our taxonomy. Such taxonomy can facilitate incident response and cyber threat hunting by aiding in understanding of the potential attacks to organizations as well as which attacks may surface. In addition, the taxonomy can allow national security and intelligence agencies and businesses to share their analysis of ongoing, sensitive APT campaigns without the need to disclose detailed information about the campaigns. It can also notify future security policies and mitigation strategy formulation.

      • KCI등재

        Determining load carrying capacity of a manipulator by game theory: Closed-loop nonzero-sum differential game approach

        M. H. Korayem,H. Esfandiar,R. Dargahi 대한기계학회 2016 JOURNAL OF MECHANICAL SCIENCE AND TECHNOLOGY Vol.30 No.11

        The aim of this study is to determine the load capacity of a manipulator in closed-loop form and specified path. In open-loop mode, due to the lack of controller in the system, end effector accuracy constraint is considered as the main constraint in load carrying capacity and the motors are not able to use their maximum capacity for carrying larger load. In this study, for increasing the load carrying capacity of the robots and the use of saturation limit of the motors, the design of the controller is proposed based on game theory. The controller design is aroused as a problem of nonzero-sum differential game. In the method proposed, the motors driven are considered as the players and the track of specific path for end effector with a maximum load are regarded as objective function of the players. The players' optimal strategy is calculated based on Nash equilibrium strategy. By using iterative algorithm according to Riccati equations, optimal values of the control inputs are represented. In general, optimal strategy of the manipulator means to determine the best torques applied by the motors for carrying maximum load. To evaluate the effectiveness of the method proposed, the simulation is performed for Scout mobile robot and a manipulator with flexible joints. The results represent that differential game method when dealing with elastic deformation of the joints has a better performance and efficiency compared with LQR method.

      • KCI등재

        Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures

        Pooneh Nikkhah Bahrami,Ali Dehghantanha,Tooska Dargahi,Reza M. Parizi,Kim-Kwang Raymond Choo,Hamid H. S. Javadi 한국정보처리학회 2019 Journal of information processing systems Vol.15 No.4

        The need for cyber resilience is increasingly important in our technology-dependent society where computingdevices and data have been, and will continue to be, the target of cyber-attackers, particularly advancedpersistent threat (APT) and nation-state/sponsored actors. APT and nation-state/sponsored actors tend to bemore sophisticated, having access to significantly more resources and time to facilitate their attacks, which inmost cases are not financially driven (unlike typical cyber-criminals). For example, such threat actors oftenutilize a broad range of attack vectors, cyber and/or physical, and constantly evolve their attack tactics. Thus,having up-to-date and detailed information of APT’s tactics, techniques, and procedures (TTPs) facilitates thedesign of effective defense strategies as the focus of this paper. Specifically, we posit the importance oftaxonomies in categorizing cyber-attacks. Note, however, that existing information about APT attackcampaigns is fragmented across practitioner, government (including intelligence/classified), and academicpublications, and existing taxonomies generally have a narrow scope (e.g., to a limited number of APTcampaigns). Therefore, in this paper, we leverage the Cyber Kill Chain (CKC) model to “decompose” anycomplex attack and identify the relevant characteristics of such attacks. We then comprehensively analyze morethan 40 APT campaigns disclosed before 2018 to build our taxonomy. Such taxonomy can facilitate incidentresponse and cyber threat hunting by aiding in understanding of the potential attacks to organizations as wellas which attacks may surface. In addition, the taxonomy can allow national security and intelligence agenciesand businesses to share their analysis of ongoing, sensitive APT campaigns without the need to disclose detailedinformation about the campaigns. It can also notify future security policies and mitigation strategy formulation.

      • SCOPUSKCI등재

        Upregulation of the RNF8 gene can predict the presence of sperm in azoospermic individuals

        Nazari, Majid,Babakhanzadeh, Emad,Zarch, Mohsen Aghaei,Talebi, Mehrdad,Narimani, Nima,Dargahi, Mandana,Sabbaghian, Marjan,Ghasemi, Nasrin The Korean Society for Reproductive Medicine 2020 Clinical and Experimental Reproductive Medicine Vol.47 No.1

        Objective: In this study, specimens from testicular biopsies of men with nonobstructive azoospermia (NOA) were used to investigate whether RNF8 gene could serve as a biomarker to predict the presence of sperm in these patients. Methods: Testicular biopsy specimens from 47 patients were classified according to the presence of sperm (positive vs. negative groups) and investigated for the expression of RNF8. The level of RNF8 gene expression in the testes was compared between these groups using reverse-transcription polymerase chain reaction. Results: The expression level of RNF8 was significantly higher in testicular samples from the positive group than in those from the negative group. Moreover, the area under the curve of RNF8 expression for the entire study population was 0.84, showing the discriminatory power of RNF8 expression in differentiating between the positive and negative groups of men with NOA. A receiver operating characteristic curve analysis showed that RNF8 expression had a sensitivity of 81% and a specificity of 84%, with a cutoff level of 1.76. Conclusion: This study points out a significant association between the expression of RNF8 and the presence of sperm in NOA patients, which suggests that quantified RNF8 expression in testicular biopsy samples may be a valuable biomarker for predicting the presence of spermatozoa in biopsy samples.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼