About Journal
According to the letter No. 3/4817 dated 2007/9/02 of the Research Affairs Office of the Iranian Ministry of Science, Research and Technology and the statement of the vote of the Commission for the Review of Scientific Journals of the country on 2007/7/14, this journal has been awarded a scientific-research degree.
Journal of Information and Communication Technology (JICT) belongs to the "Iranian Information and Communication Technology Association" and is a peer-reviewed open-access bi-quarterly journal publishing high-quality scientific papers covering all aspects of the information and communication technologies including computer science and engineering, information technology, communication technology, information technology management. It is an interdisciplinary journal devoted to the publication of original articles, review articles, etc., considering the research ethics and academic rules and regulations.
All papers are subject to a blind reviewing process. The submitted manuscripts will be published after a thorough review and the editorial board's approval.
-
Open Access Article
1 - Design and implementation of a survival model for patients with melanoma based on data mining algorithms
farinaz sanaei Seyed Abdollah Amin Mousavi Abbas Toloie Eshlaghy ali rajabzadeh ghotriIssue 57 , Vol. 15 , Autumn 2023Background/Purpose: Among the most commonly diagnosed cancers, melanoma is the second leading cause of cancer-related death. A growing number of people are becoming victims of melanoma. Melanoma is also the most malignant and rare form of skin cancer. Advanced cases of MoreBackground/Purpose: Among the most commonly diagnosed cancers, melanoma is the second leading cause of cancer-related death. A growing number of people are becoming victims of melanoma. Melanoma is also the most malignant and rare form of skin cancer. Advanced cases of the disease may cause death due to the spread of the disease to internal organs. The National Cancer Institute reported that approximately 99,780 people were diagnosed with melanoma in 2022, and approximately 7,650 died. Therefore, this study aims to develop an optimization algorithm for predicting melanoma patients' survival. Methodology: This applied research was a descriptive-analytical and retrospective study. The study population included patients with melanoma cancer identified from the National Cancer Research Center at Shahid Beheshti University between 2008 and 2013, with a follow-up period of five years. An optimization model was selected for melanoma survival prognosis based on the evaluation metrics of data mining algorithms. Findings: A neural network algorithm, a Naïve Bayes network, a Bayesian network, a combination of decision tree and Naïve Bayes network, logistic regression, J48, and ID3 were selected as the models used in the national database. Statistically, the studied neural network outperformed other selected algorithms in all evaluation metrics. Conclusion: The results of the present study showed that the neural network with a value of 0.97 has optimal performance in terms of reliability. Therefore, the predictive model of melanoma survival showed a better performance both in terms of discrimination power and reliability. Therefore, this algorithm was proposed as a melanoma survival prediction model. Manuscript profile -
Open Access Article
2 - An Intrusion Detection System based on Deep Learning for CAN Bus
Fatemeh Asghariyan Mohsen RajiIssue 57 , Vol. 15 , Autumn 2023In recent years, with the advancement of automotive electronics and the development of modern vehicles with the help of embedded systems and portable equipment, in-vehicle networks such as the controller area network (CAN) have faced new security risks. Since the CAN bu MoreIn recent years, with the advancement of automotive electronics and the development of modern vehicles with the help of embedded systems and portable equipment, in-vehicle networks such as the controller area network (CAN) have faced new security risks. Since the CAN bus lacks security systems such as authentication and encryption to deal with cyber-attacks, the need for an intrusion detection system to detect attacks on the CAN bus seem to be very necessary. In this paper, a deep adversarial neural network (DACNN) is proposed to detect various types of security intrusions in CAN buses. For this purpose, the DACNN method, which is an extension of the CNN method using adversarial learning, detects intrusion in three stages; In the first stage, CNN acts as a feature descriptor and the main features are extracted, and in the second stage, the discriminating classifier classifies these features and finally, the intrusion is detected using the adversarial learning. In order to show the efficiency of the proposed method, a real open source dataset was used in which the CAN network traffic on a real vehicle during message injection attacks is recorded on a real vehicle. The obtained results show that the proposed method performs better than other machine learning methods in terms of false negative rate and error rate, which is less than 0.1% for DoS and drive gear forgery attack and RPM forgery attack while this rate is less than 0.5% for fuzzy attack. Manuscript profile -
Open Access Article
3 - The framework of the national macro plan for transparency and information release based on the grounded theory method
Mahdi Azizi MehmanDoost Mohammad Reza Hosseini reza taghipour Mojtaba MazoochiIssue 57 , Vol. 15 , Autumn 2023The purpose of this research is to present the framework of the national plan for transparency and information release. The research employs an integrated approach (qualitative and quantitative) and grounded theory as its research methodology. In the qualitative part، w MoreThe purpose of this research is to present the framework of the national plan for transparency and information release. The research employs an integrated approach (qualitative and quantitative) and grounded theory as its research methodology. In the qualitative part، with an in-depth and exploratory review of upstream laws and documents، models، theories، plans، and white papers of different countries related to transparency and information release، data analysis was done until theoretical saturation through three stages of open، axial، and selective coding. To acquire the dimensions، components، and subcomponents of this framework، 129 concepts were extracted from 620 primary codes، which were reduced to 593 secondary codes by removing the duplicated elements. Finally، 24 subcategories were placed under the five main components based on the paradigm model. In the quantitative section، the results of the analysis of the questionnaire indicated that، from a validity standpoint، the total value of the questionnaire، in different dimensions، was between 0.87 and 0.92، and the reliability coefficient was between 0.73 and 0.78. Based on data analysis، the establishment of a supranational management institution for transparency and information release، the precise determination of exceptions، network governance، demanding transparency، adherence to frameworks، maximum disclosure and support for legitimate disclosure، and the establishment of a data governance center are among the subcategories emphasized in this framework. Manuscript profile -
Open Access Article
4 - Drivers, Obstacles and consequences of digital entrepreneurship in Iran's road freight transportation industry
Azam sadtat Mortazavi kahangi Parviz Saketi Javad MehrabiIssue 57 , Vol. 15 , Autumn 2023The purpose of this research is to identify the drivers, obstacles and consequences of digital entrepreneurship in Iran's road freight transportation industry. The statistical society of this research in the qualitative part was made up of 20 experts in this field who w MoreThe purpose of this research is to identify the drivers, obstacles and consequences of digital entrepreneurship in Iran's road freight transportation industry. The statistical society of this research in the qualitative part was made up of 20 experts in this field who were selected using theoretical saturation. In the quantitative part, using Cochran's formula and cluster sampling method, 170 employees of this industry were selected as samples. In order to collect data, a semi-structured interview was used in the qualitative part and a researcher-made questionnaire was used in the quantitative part, whose validity and reliability were checked and confirmed. In the data analysis, systematic literature review and coding and Maxqda software were used in the qualitative part, and inferential statistics and SPSS and Lisrel software were used in the quantitative part. Finally, 9 indicators in 4 driver factors, 11 indicators in 3 obstacle factors and 55 indicators in 8 consequence categories were extracted and prioritized using factor analysis. The result of this research shows that the political component is a priority as a driver and political obstacles are a priority as an obstacle. Therefore, the role of the government in this field is very important. Manuscript profile -
Open Access Article
5 - WSTMOS: A Method For Optimizing Throughput, Energy, And Latency In Cloud Workflow Scheduling
Arash Ghorbannia Delavar Reza Akraminejad sahar mozafariIssue 57 , Vol. 15 , Autumn 2023Application of cloud computing in different datacenters around the world has led to generation of more co2 gas. In addition, energy and throughput are the two most important issues in this field. This paper has presented an energy and throughput-aware algorithm for sche MoreApplication of cloud computing in different datacenters around the world has led to generation of more co2 gas. In addition, energy and throughput are the two most important issues in this field. This paper has presented an energy and throughput-aware algorithm for scheduling of compressed-instance workflows in things-internet by cluster processing in cloud. A method is presented for scheduling cloud workflows with aim of optimizing energy, throughput, and latency. In the proposed method, time and energy consumption has been improved in comparison to previous methods by creating distance parameters, clustering inputs, and considering real execution time. In WSTMOS method by considering special parameters and real execution time, we managed to reach the optimized objective function. Moreover, in the proposed method parameter of time distance of tasks to virtual machines for reduction of number of migration in virtual machines was applied. In WSTMOS method by organizing the workflow inputs to low, medium and heavy groups and also by distributing appropriate load on more suitable servers for processors threshold, we accomplished to optimize energy and cost. Energy consumption was reduced by 4.8 percent while the cost was cut down by 4.4 percent using this method in comparison to studied method. Finally, average delay time, power and workload are optimized in comparison to previous methods. Manuscript profile -
Open Access Article
6 - Presenting a web recommender system for user nose pages using DBSCAN clustering algorithm and machine learning SVM method.
reza molaee fard mohammad moslehIssue 57 , Vol. 15 , Autumn 2023Recommender systems can predict future user requests and then generate a list of the user's favorite pages. In other words, recommender systems can obtain an accurate profile of users' behavior and predict the page that the user will choose in the next move, which can s MoreRecommender systems can predict future user requests and then generate a list of the user's favorite pages. In other words, recommender systems can obtain an accurate profile of users' behavior and predict the page that the user will choose in the next move, which can solve the problem of the cold start of the system and improve the quality of the search. In this research, a new method is presented in order to improve recommender systems in the field of the web, which uses the DBSCAN clustering algorithm to cluster data, and this algorithm obtained an efficiency score of 99%. Then, using the Page rank algorithm, the user's favorite pages are weighted. Then, using the SVM method, we categorize the data and give the user a combined recommender system to generate predictions, and finally, this recommender system will provide the user with a list of pages that may be of interest to the user. The evaluation of the results of the research indicated that the use of this proposed method can achieve a score of 95% in the recall section and a score of 99% in the accuracy section, which proves that this recommender system can reach more than 90%. It detects the user's intended pages correctly and solves the weaknesses of other previous systems to a large extent. Manuscript profile -
Open Access Article
7 - Face recognition and Liveness Detection Based on Speech Recognition for Electronical Authentication
ahmad dolatkhah Behnam Dorostkar Yaghouti raheb hashempourIssue 57 , Vol. 15 , Autumn 2023As technology develops, institutions and organizations provide many services electronically and intelligently over the Internet. The police, as an institution that provides services to people and other institutions, aims to make its services smarter. Various electronic MoreAs technology develops, institutions and organizations provide many services electronically and intelligently over the Internet. The police, as an institution that provides services to people and other institutions, aims to make its services smarter. Various electronic and intelligent systems have been offered in this regard. Because these systems lack authentication, many services that can be provided online require a visit to +10 police stations. Budget and equipment limitations for face-to-face responses, limitations of the police force and their focus on essential issues, a lack of service offices in villages and a limited number of service offices in cities, and the growing demand for online services, especially in crisis situations like Corona disease, electronic authentication is becoming increasingly important. This article reviews electronic authentication and its necessity, liveness detection methods and face recognition which are two of the most important technologies in this area. In the following, we present an efficient method of face recognition using deep learning models for face matching, as well as an interactive liveness detection method based on Persian speech recognition. A final section of the paper presents the results of testing these models on relevant data from this field. Manuscript profile -
Open Access Article
8 - Estimating the Value of Digital Economy Core Spillover in Iran
Niloufar Moradhassel Bita MohebikhahIssue 57 , Vol. 15 , Autumn 2023Background and Purpose: In most of the studies, the direct effects of the ICT sector have been discussed, but the indirect effects (spillover) and how to measure them have not been addressed. This issue is on the agenda of this article. For this purpose, while determini MoreBackground and Purpose: In most of the studies, the direct effects of the ICT sector have been discussed, but the indirect effects (spillover) and how to measure them have not been addressed. This issue is on the agenda of this article. For this purpose, while determining the territory of the digital economy, the gross value of the core of the country's digital economy has been estimated. Methodology: In this article, using the Solow growth model, the spillover effects of the core of the digital economy (ICT) have been estimated for the period of 2002-2019. Findings: The results imply that in the period under review, according to the elasticity of labor productivity relative to the share of net capital formation of the ICT sector in the national economy (about 0.3), the spillover effects of the digital economy core have increased from 210 thousand billion Rials in 2015 to 279 thousand billion of Rials in 2019. Manuscript profile -
Open Access Article
9 - Applying deep learning for improving the results of sentiment analysis of Persian comments of Online retail stores
faezeh forootan Mohammad RabieiIssue 57 , Vol. 15 , Autumn 2023چكيده انگليسيThe retail market industry is one of the industries that affects the economies of countries, the life of which depends on the level of satisfaction and trust of customers to buy from these markets. In such a situation, the retail market industry is trying t Moreچكيده انگليسيThe retail market industry is one of the industries that affects the economies of countries, the life of which depends on the level of satisfaction and trust of customers to buy from these markets. In such a situation, the retail market industry is trying to provide conditions for customer feedback and interaction with retailers based on web pages and online platforms. Because the analysis of published opinions play a role not only in determining customer satisfaction but also in improving products. Therefore, in recent years, sentiment analysis techniques in order to analyze and summarize opinions, has been considered by researchers in various fields, especially the retail market industry. Manuscript profile -
Open Access Article
10 - Artefacts and Producers Mapping of Iran's Artificial Intelligence Ecosystem based on Transformational Levels
hamed ojaghi Iman Zohoorian Nadali Fatemeh Soleymani RoozbahaniIssue 57 , Vol. 15 , Autumn 2023As an emerging technological field, artificial intelligence has received increasing attention from companies and governments. The development of artificial intelligence both at business and country levels depends on knowing the current situation. This paper identifies t MoreAs an emerging technological field, artificial intelligence has received increasing attention from companies and governments. The development of artificial intelligence both at business and country levels depends on knowing the current situation. This paper identifies the artifacts and producers presented in this field and maps them to transformational levels. Products/services and producers are achieved through capabilities provided by artificial intelligence. Then, based on the classification methodology and meta-characteristics, the transformational levels of the artifacts of Iran's artificial intelligence ecosystem have been extracted. 562 products/services were identified, which were offered by 112 companies. Machine vision and natural language processing have been at the top of the technologies used, with 44 and 27 percent of the products allocated to them, respectively. Artifacts and producers were classified into seven transformative levels: individual, organization, industry, electronic chip/hardware, society, platform, code/algorithm/library, and infrastructure. Iran's artificial intelligence productions have not grown in a balanced way. The three levels of platform, code/algorithm/library, and infrastructure as the main generator of other artificial intelligence products/services have had the lowest amount of production. It is suggested that a specialized marketplace for the supply of artificial intelligence application programming interfaces should be put on the agenda to stimulate the formation of the ecosystem. Manuscript profile -
Open Access Article
11 - Noor Analysis: A Benchmark Dataset for Evaluating Morphological Analysis Engines
Huda Al-Shohayyeb Behrooz Minaei Mohammad Ebrahim Shenassa Sayyed Ali HossayniIssue 57 , Vol. 15 , Autumn 2023The Arabic language has a very rich and complex morphology, which is very useful for the analysis of the Arabic language, especially in traditional Arabic texts such as historical and religious texts, and helps in understanding the meaning of the texts. In the morpholog MoreThe Arabic language has a very rich and complex morphology, which is very useful for the analysis of the Arabic language, especially in traditional Arabic texts such as historical and religious texts, and helps in understanding the meaning of the texts. In the morphological data set, the variety of labels and the number of data samples helps to evaluate the morphological methods, in this research, the morphological dataset that we present includes about 22, 3690 words from the book of Sharia alـIslam, which have been labeled by experts, and this dataset is the largest in terms of volume and The variety of labels is superior to other data provided for Arabic morphological analysis. To evaluate the data, we applied the Farasa system to the texts and we report the annotation quality through four evaluation on the Farasa system. Manuscript profile -
Open Access Article
12 - Improvement of intrusion detection system on Industrial Internet of Things based on deep learning using metaheuristic algorithms
mohammadreza zeraatkarmoghaddam majid ghayoriIssue 57 , Vol. 15 , Autumn 2023Due to the increasing use of industrial Internet of Things (IIoT) systems, one of the most widely used security mechanisms is intrusion detection system (IDS) in the IIoT. In these systems, deep learning techniques are increasingly used to detect attacks, anomalies or i MoreDue to the increasing use of industrial Internet of Things (IIoT) systems, one of the most widely used security mechanisms is intrusion detection system (IDS) in the IIoT. In these systems, deep learning techniques are increasingly used to detect attacks, anomalies or intrusions. In deep learning, the most important challenge for training neural networks is determining the hyperparameters in these networks. To overcome this challenge, we have presented a hybrid approach to automate hyperparameter tuning in deep learning architecture by eliminating the human factor. In this article, an IDS in IIoT based on convolutional neural networks (CNN) and recurrent neural network based on short-term memory (LSTM) using metaheuristic algorithms of particle swarm optimization (PSO) and Whale (WOA) is used. This system uses a hybrid method based on neural networks and metaheuristic algorithms to improve neural network performance and increase detection rate and reduce neural network training time. In our method, considering the PSO-WOA algorithm, the hyperparameters of the neural network are determined automatically without the intervention of human agent. In this paper, UNSW-NB15 dataset is used for training and testing. In this research, the PSO-WOA algorithm has use optimized the hyperparameters of the neural network by limiting the search space, and the CNN-LSTM neural network has been trained with this the determined hyperparameters. The results of the implementation indicate that in addition to automating the determination of hyperparameters of the neural network, the detection rate of are method improve 98.5, which is a good improvement compared to other methods. Manuscript profile -
Open Access Article
13 - Improving the load balancing in Cloud computing using a rapid SFL algorithm (R-SFLA)
Kiomars Salimi Mahdi MollamotalebiIssue 57 , Vol. 15 , Autumn 2023Nowadays, Cloud computing has many applications due to various services. On the other hand, due to rapid growth, resource constraints and final costs, Cloud computing faces with several challenges such as load balancing. The purpose of load balancing is management of th MoreNowadays, Cloud computing has many applications due to various services. On the other hand, due to rapid growth, resource constraints and final costs, Cloud computing faces with several challenges such as load balancing. The purpose of load balancing is management of the load distribution among the processing nodes in order to have the best usage of resources while having minimum response time for the users’ requests. Several methods for load balancing in Cloud computing have been proposed in the literature. The shuffled frog leaping algorithm for load balancing is a dynamic, evolutionary, and inspired by nature. This paper proposed a modified rapid shuffled frog leaping algorithm (R-SFLA) that converge the defective evolution of frogs rapidly. In order to evaluate the performance of R-SFLA, it is compared to Shuffled Frog Leaping Algorithm (SFLA) and Augmented Shuffled Frog Leaping Algorithm (ASFLA) by the overall execution cost, Makespan, response time, and degree of imbalance. The simulation is performed in CloudSim, and the results obtained from the experiments indicated that the proposed algorithm acts more efficient compared to other methods based on the above mentioned factors. Manuscript profile -
Open Access Article
14 - Evaluation of Interpolation Methods for Estimating the Fading Channels in Digital TV Broadcasting
Ali Pouladsadeh Mohammadali SebghatiIssue 57 , Vol. 15 , Autumn 2023Variations in telecommunication channels is a challenge of the wireless communication which makes the channel estimation and equalization a noteworthy issue. In OFDM systems, some subcarriers can be considered as pilots for channel estimation. In the pilot-aided channel MoreVariations in telecommunication channels is a challenge of the wireless communication which makes the channel estimation and equalization a noteworthy issue. In OFDM systems, some subcarriers can be considered as pilots for channel estimation. In the pilot-aided channel estimation procedure, interpolation is an essential step to achieve channel response in data subcarriers. Choosing the best interpolation method has been the subject of various researches, because there is no interpolator as the best method in all conditions, and their performance depends on the fading model, signal-to-noise ratio and pilot overhead ratio. In this paper, the effect of different interpolation methods on the quality of DVB-T2 broadcast links is evaluated. A simulation platform is prepared in which different channel models are defined according to the real-world measurements. The interpolation is performed by five widely-used methods (nearest neighbor, linear, cubic, spline, and Makima) for different pilot ratios. After channel equalization by the results of the interpolator, the bit error rate is calculated as the main criterion for evaluation and comparison. The rules of selecting the appropriate interpolator in different conditions is presented. It is generally concluded that for fading scenarios close to flat fading or high pilot overhead ratio, the simple interpolators such as linear interpolator are proper choices. But in harsh conditions, i.e. severe frequency-selective fading channels or low pilot overhead ratio, the more complicated interpolators such as cubic and spline methods yield better results. The amount of improvements and differences are quantified in this study. Manuscript profile -
Open Access Article
15 - A framework for architecture the electronic trust in e-commerce:online shopping segment
amir Mohtarami Akbar aminiIssue 57 , Vol. 15 , Autumn 2023Today, e-commerce is rapidly expanding as a way of doing business in the modern world due to its advantages and benefits. The purpose of this study is to extract dimensions and criteria for providing electronic trust arrangements in B2C services, improving the internal MoreToday, e-commerce is rapidly expanding as a way of doing business in the modern world due to its advantages and benefits. The purpose of this study is to extract dimensions and criteria for providing electronic trust arrangements in B2C services, improving the internal processes of the business environment, and also determining the importance and priority of each criterion to ensure electronic trust in order to gain the trust and satisfaction of the customer. A mixed method of research is employed includes: litrature review, field study and opinion gathering alongside of statistical techniques. The statistical population includes all expert customers of online stores in the city of Tehran, among which random sampling has been done. Questions in the context of the electronic trust and provision of e-business services and their priority in relation to each other, are discussed through inferential statistics. The results of the data analysis show that there is a meaningful relationship between the 12 criteria identified and customer's trust. The results obtained in the context of the conceptual framework show the impact of three dimensions of psychological, technical and legal, according to the criteria and indicators of electronic trust Manuscript profile -
Open Access Article
16 - Improving IoT resource management using fog calculations and ant lion optimization algorithm
payam shams Seyedeh Leili Mirtaheri reza shahbazian ehsan arianyanIssue 57 , Vol. 15 , Autumn 2023In this paper, a model based on meta-heuristic algorithms for optimal allocation of IoT resources based on fog calculations is proposed. In the proposed model, the user request is first given to the system as a workflow; For each request, the resource requirements (proc MoreIn this paper, a model based on meta-heuristic algorithms for optimal allocation of IoT resources based on fog calculations is proposed. In the proposed model, the user request is first given to the system as a workflow; For each request, the resource requirements (processing power, storage memory, and bandwidth) are first extracted. This component determines the requested traffic status of the application in terms of real-time. If the application is not real-time and is somewhat resistant to latency, the request will be referred to the cloud environment, but if the application needs to respond promptly and is sensitive to latency, it will be dealt with as a fog calculation. It will be written to one of the Cloudletes. In this step, in order to select the best solution in allocating resources to serve the users of the IoT environment, the ant milk optimization algorithm was used. The proposed method is simulated in MATLAB software environment and to evaluate its performance, five indicators of fog cells energy consumption, response time, fog cell imbalance, latency and bandwidth have been used. The results show that the proposed method reduces the energy consumption, latency rate in fog cells, bandwidth consumption rate, load balance rate and response time compared to the base design (ROUTER) 22, 18, 12, 22 and 47, respectively. Percentage has improved. Manuscript profile -
Open Access Article
17 - The effect of emotional intelligence of project managers on the effectiveness of team communication in Iranian research institutes (Case study: Research Institute of Communication and Information Technology)
Mansoureh Mohammadnezhad Fadard Ehram SafariIssue 57 , Vol. 15 , Autumn 2023Generally, in performing technical projects, especially in the field of information and communication technology, the most important criterion for handing over the project is having technical capabilities, and less attention is paid to the communication skills of projec MoreGenerally, in performing technical projects, especially in the field of information and communication technology, the most important criterion for handing over the project is having technical capabilities, and less attention is paid to the communication skills of project managers, such as having emotional intelligence. Lack of attention to this issue seems to reduce the effectiveness of team communication and thus lead to project failure. The aim of this study was to measure the effect of emotional intelligence of project managers on the effectiveness of team communication in the projects of the Institute of Communication and Information Technology. The method of the present research is descriptive-analytical of correlation type, the statistical population of which consists of project managers and members of the project teams of the Research Institute of Communication and Information Technology. The statistical population includes 19 project teams that have been selected by census method. Data collection tools are Bar-On Emotional Intelligence Questionnaire and Senior Questionnaire to evaluate the effectiveness of project team communication. Pearson correlation coefficient, multivariate regression and imaginary variable regression and dependent t-test were used to analyze the data. The results show that the emotional intelligence of project managers affects effective communication in the project team. However, only interpersonal skills, interpersonal skills, and adaptability can predict effective communication within the project team, and the dimensions of general mood and stress management do not affect these relationships Manuscript profile -
Open Access Article
18 - Energy procurement of a cellular base station in independent microgrids with electric vehicles and renewable energy sources: Mixed-integer nonlinear programming model
Reza Bahri saeed zeynaliIssue 57 , Vol. 15 , Autumn 2023The cellular base stations are communication devices that ensure the connection in the world. Nevertheless, they are usually installed in remote places. This paper, studied the energy procurement of a cellular base stations in an independent microgrid with a hydrogen-ba MoreThe cellular base stations are communication devices that ensure the connection in the world. Nevertheless, they are usually installed in remote places. This paper, studied the energy procurement of a cellular base stations in an independent microgrid with a hydrogen-based energy storage system, photovoltaic (PV) system, electric vehicles and a diesel generator. A new mixed-integer nonlinear programming model was used to deal with nonlinearities of the system components. The paper studied different uncertainties, such as the connection rate in cellular base stations, the driver of the electric vehicle, and PV generation, using stochastic programming method. The potency of the proposed method was studied in different case studies. The results prove that smart electric vehicle chargers reduce the risks and also cost/emission objective functions. The usage of this model can reduce the emissions as much as 18.60%. Manuscript profile
-
Open Access Article
1 - Determining the factors affecting the collective financing of knowledge-based IT companies
Ali Haji Gholam Saryazdi ali rajabzadeh ghotri alinaghi mashayekhi alireza hassanzadeIssue 37 , Vol. 10 , Autumn_Winter 2019The method of crowdfunding in the world has expanded rapidly due to the need for financing in the early stages of start-up businesses as well as advances in information technology. In Iran, several financing platforms have been established so far, some of which have bee MoreThe method of crowdfunding in the world has expanded rapidly due to the need for financing in the early stages of start-up businesses as well as advances in information technology. In Iran, several financing platforms have been established so far, some of which have been successful and some of which have been unsuccessful. Therefore, it is necessary to help the development of this method by examining the factors affecting it. Since mass financing is a new and new phenomenon, it is necessary to increase its awareness in the society in an appropriate way while determining the factors affecting this method. The collective modeling method is based on social networks and the Web 2 with the aim of recognizing new phenomena. Therefore, in this article, using collective modeling, the factors affecting crowdfunding in Iran in order to support start-up companies in the field of IT are discussed. Manuscript profile -
Open Access Article
2 - طراحی اولین پایگاه داده کلمات دستنویس کردی برای سیستم های تشخیص تصویری کلمات
fatemeh daneshfar basir alagheband vahid sharafiIssue 17 , Vol. 5 , Spring_Summer 1393چکیده: یکی از اجزای زیربنایی سیستم های تشخیص تصویری کلمات پایگاه داده هاست. هر سیستمی که در این زمینه طراحی گردد لاجرم می بایست از یک نوع پایگاه داده ها استفاده کند. بدیهی است چون موضوع مورد مطالعه در این سیستم ها شکل نوشتاری زبان های مختلف میباشد پس برای هر زبان مشخص Moreچکیده: یکی از اجزای زیربنایی سیستم های تشخیص تصویری کلمات پایگاه داده هاست. هر سیستمی که در این زمینه طراحی گردد لاجرم می بایست از یک نوع پایگاه داده ها استفاده کند. بدیهی است چون موضوع مورد مطالعه در این سیستم ها شکل نوشتاری زبان های مختلف میباشد پس برای هر زبان مشخص پایگاه داده بخصوصی لازم است. زبانی که این مقاله بر آن متمرکز شده کردی است و در این مقاله مراحل مختلف چگونگی طراحی اولین پایگاه داده دستنویس برای زبان کردی شرح داده شده است. از آنجا که تاکنون هیچ پایگاه داده ای مخصوص تشخیص تصویری کلمات، مربوط به زبان کردی طراحی نشده است بنابراین زمینه ای بکر و مستعد برای انجام تحقیق محسوب می گردد. همچنین با توجه به اینکه زبان کردی دارای دو رسم الخط مختلف لاتین و آرامی می باشد در این مقاله منحصرا به رسم الخط آرامی البته از نوع دستنویس آن پرداخته شده است. Manuscript profile -
Open Access Article
3 - Image Processing of steel sheets for Defect Detection by using Gabor Wavelet
masoud shafiee mostafa sadeghiIssue 13 , Vol. 4 , Spring 1391In different steps of steel production, various defects appear on the surface of the sheet. Putting aside the causes of defects, precise identification of their kinds helps classify steel sheet correctly, thereby it allocates a high percentage of quality control process MoreIn different steps of steel production, various defects appear on the surface of the sheet. Putting aside the causes of defects, precise identification of their kinds helps classify steel sheet correctly, thereby it allocates a high percentage of quality control process. QC of steel sheet for promotion of product quality and maintaining the competitive market is of great importance. In this paper, in addition to quick review of image process techniques used, using image process by means of Gabor wavelet, a fast and precise solution for detection of texture defects in steel sheet is presented. In first step, the approach extracts considerable texture specification from image by using Gabor wavelet. The specification includes both different directions and different frequencies. Then using statistical methods, images are selected that have more obvious defects, and location of defects is determined. Offering the experimental samples, the accuracy and speed of the method is indicated. Manuscript profile -
Open Access Article
4 - A model information technology adoption in academic research projects in the filed ICT based on Information Technology Adoption Integrated Modeling (ITAIM)
Shahram Aliyari masoud movahedi sirous kazemianIssue 41 , Vol. 11 , Autumn_Winter 2020Today, the emergence and expansion of technologies that provide the widest possible connection have brought about significant changes in the private life and professional life of individuals. Correct implementation of information technology is the source of economic and MoreToday, the emergence and expansion of technologies that provide the widest possible connection have brought about significant changes in the private life and professional life of individuals. Correct implementation of information technology is the source of economic and cultural development and the promotion of quality of life through the exchange of information and the provision of public and private services. The purpose of this research is to present the model of information technology acceptance in Iranian ICT research centers. Employed experts worked on ICT projects in this research Statistical population. It was provided in one of the university searching centers. And so a convenience and purposeful Nonprobability sampling does (30 person). This paper examines the factors and parameters affecting the acceptance of information technology in ICT projects of the university research centers in the field of information technology. To collect the required data and information, a questionnaire was used & to analyze the data and information obtained from the questionnaires using the Spss 22 and Smart pls3 software. According to the calculations, the factors affecting the acceptance of information technology in university research centers can be divided into four categories: IT related factors, organizational factors, factors related to executive director and individual factors that are related to management (0.497), IT (0.460) and Individual factors (0.457) have an impact on the individual acceptance of information technology respectively and organizational factors (0.469) on the adoption of an IT organization Manuscript profile -
Open Access Article
5 - Routing improvement to control congestion in software defined networks by using distributed controllers
saied bakhtiyari Ardeshir AzarnejadIssue 39 , Vol. 11 , Spring_Summer 2019Software defined networks (SDNs) are flexible for use in determining network traffic routing because they separate data plane and control plane. One of the major challenges facing SDNs is choosing the right locations to place and distribute controllers; in such a way th MoreSoftware defined networks (SDNs) are flexible for use in determining network traffic routing because they separate data plane and control plane. One of the major challenges facing SDNs is choosing the right locations to place and distribute controllers; in such a way that the delay between controllers and switches in wide area networks can be reduced. In this regard, most of the proposed methods have focused on reducing latency. But latency is just one factor in network efficiency and overall cost reduction between controllers and related switches. This article examines more factors to reduce the cost between controllers and switches, such as communication link traffic. In this regard, a cluster-based algorithm is provided for network segmentation. Using this algorithm, it can be ensured that each part of the network can reduce the maximum cost (including delays and traffic on links) between the controller and its related switches. In this paper, using Topology Zoo, extensive simulations have been performed under real network topologies. The results of the simulations show that when the probability of congestion in the network increases, the proposed algorithm has been able to control the congestion in the network by identifying the bottleneck links in the communication paths of each node with other nodes. Therefore, considering the two criteria of delay and the degree of busyness of the links, the process of placing and distributing the controllers in the clustering operation has been done with higher accuracy. By doing so, the maximum end-to-end cost between each controller and its related switches, in the topologies Chinanet of China, Uunet of the United States, DFN of Germany, and Rediris of Spain, is decreased 41.2694%, 29.2853%, 21.3805% and 46.2829% respectively. Manuscript profile -
Open Access Article
6 - A Satellite Control Method Using Laguerre Model Predictive Control Approach
shekoofeh jafari fesharaki farzad tihidkhah heydarali talebiIssue 15 , Vol. 5 , Summer 1392In this paper a Model Predictive Method based controller is proposed to control a satellite. Model Predictive Control (MPC) has been well known as a practical control method for various systems in industry. A problem with this method is its computational effort and time MoreIn this paper a Model Predictive Method based controller is proposed to control a satellite. Model Predictive Control (MPC) has been well known as a practical control method for various systems in industry. A problem with this method is its computational effort and time consuming. To reduce computational load Laguerre functions have been proposed in this literature. Simulation results are given to show feasibility and the validity of the design. A comparison between the time consumed in the presence and the absence of the Laguerre functions is done too. Manuscript profile -
Open Access Article
7 - An Investigation on the Effect of Multifactor Model of Improving Critical Thinking in E-learning Environments
mohammadreza nili jamshid heydari hossein moradiIssue 21 , Vol. 6 , Spring 1394In the third millennium, people deal with multiple, diverse, and complicated problems as they cannot possess full control over the information, which is constantly produced and accumulated. Having a high skill of critical thinking for assessing the results of different MoreIn the third millennium, people deal with multiple, diverse, and complicated problems as they cannot possess full control over the information, which is constantly produced and accumulated. Having a high skill of critical thinking for assessing the results of different issues and decision making about them based on evidences is an unavoidable necessity. The researchers of this work proposed a model with seven factors (components) for critical thinking in e-learning environments. The statistical group of this work is the M.Sc. medical education students of AZAD university e-learning environments, and the students of the same field from Islamic Azad University traditional education system studying during 2011-2012. Among the research community, 47 members were selected based on a simple random method and divided into two trial (with 23 members) and reference (with 42 members) groups. To train the trial group, the seven-factor critical thinking training scale was utilized in e-learning environments in 15 sessions with empirical sciences course. In the reference group, the same seven-factor critical thinking training scale was used in the classroom environment in lecturing in 15 sessions with empirical sciences course. The model factors and components are challenge, representation, creation of opportunity, creation of motivation, logical analysis, encouragement, responsibility, and commitment. Both groups were subject to two pretest and posttest steps within two trial groups, which were considered as reference to each other. Both groups responded to the Watson- Glaser™ Critical Thinking Appraisal within two pretest and posttest steps, while the covariance analysis statistical test was used for analysis of the results. The results indicate significant difference between the scores between trial and reference groups in improving the critical thinking of the students in terms of inferential, assumption detection, deduction, interpretation, and logical reasoning evaluation components (p=0.001). According to the results, in terms of improving critical thinking, the trial group trained in the e-learning environment indicates higher scores as compared to the group trained in the traditional classroom environment. Manuscript profile -
Open Access Article
8 -
mostafa sadeghi masoud shafieeIssue 14 , Vol. 4 , Autumn_Winter 2012 -
Open Access Article
9 - Medial-axis Enhancement of Tubular Structures and its Application in the Extraction of Portal Veins
amirhossein forouza reza aghaeizade youshi sato masa houriIssue 13 , Vol. 4 , Spring 1391I In this paper, a new filter is designed to enhance medial-axis of tubular structures. Based on a multi-scale method and using eigenvectors of Hessian matrix, the distance of a point to the edges of the tube is found. To do this, a hypothetical line with a deliberate d MoreI In this paper, a new filter is designed to enhance medial-axis of tubular structures. Based on a multi-scale method and using eigenvectors of Hessian matrix, the distance of a point to the edges of the tube is found. To do this, a hypothetical line with a deliberate direction is passed through the point which cuts the tube at its edges. For points which are located on the medial-axis, this distance is symmetric with respect to any deliberate direction. We find samples of the distances in different directions and assign a measure to the points based on this symmetry property. The output of this step is an enhanced image in which noise is removed and tubes can be seen more clearly. Then, we employ the filter developed by Pock et al. to enhance medial axis. Evaluation of the proposed method is performed using 2D/3D synthetic/clinical datasets both quantitatively and qualitatively. Manuscript profile -
Open Access Article
10 - Using web analytics in forecasting the stock price of chemical products group in the stock exchange
amir daee Omid Mahdi Ebadati E. keyvan bornaIssue 39 , Vol. 11 , Spring_Summer 2019Forecasting markets, including stocks, has been attractive to researchers and investors due to the high volume of transactions and liquidity. The ability to predict the price enables us to achieve higher returns by reducing risk and avoiding financial losses. News plays MoreForecasting markets, including stocks, has been attractive to researchers and investors due to the high volume of transactions and liquidity. The ability to predict the price enables us to achieve higher returns by reducing risk and avoiding financial losses. News plays an important role in the process of assessing current stock prices. The development of data mining methods, computational intelligence and machine learning algorithms have led to the creation of new models in prediction. The purpose of this study is to store news agencies' news and use text mining methods and support vector machine algorithm to predict the next day's stock price. For this purpose, the news published in 17 news agencies has been stored and categorized using a thematic language in Phoenician. Then, using text mining methods, support vector machine algorithm and different kernels, the stock price forecast of the chemical products group in the stock exchange is predicted. In this study, 300,000 news items in political and economic categories and stock prices of 25 selected companies in the period from November to March 1997 in 122 trading days have been used. The results show that with the support vector machine model with linear kernel, prices can be predicted by an average of 83%. Using nonlinear kernels and the quadratic equation of the support vector machine, the prediction accuracy increases by an average of 85% and other kernels show poorer results. ارسال Manuscript profile