Latest News
    Journal of Information and Communication Technology ( Scientific )
  • OpenAccess
  • About the journal

    According to the letter No. 3/4817 dated 2007/9/02 of the Research Affairs Office of the Iranian Ministry of Science, Research and Technology and the statement of the vote of the Commission for the Review of Scientific Journals of the country on 2007/7/14, this journal has been awarded a scientific-research degree.

    Journal of Information and Communication Technology (JICT) belongs to the "Iranian Information and Communication Technology Association" and is published with the collaboration of ICT Research Institute. The journal language is Farsi and it is an open-access bi-quarterly journal publishing high-quality scientific papers covering all aspects of the information and communication technologies including computer science and engineering, information technology, communication technology and information technology management. It is an interdisciplinary journal devoted to the publication of original articles, review articles, etc., considering the research ethics and academic rules and regulations.
    All papers are subject to a blind reviewing process. The submitted manuscripts will be published after a thorough review and the editorial board's approval

     


    Recent Articles

    • Open Access Article

      1 - Presenting a novel solution to choose a proper database for storing big data in national network services
      Mohammad Reza Ahmadi davood maleki ehsan arianyan
      Issue 59 , Vol. 16 , Spring_Summer 2024
      The increasing development of tools producing data in different services and the need to store the results of large-scale processing results produced from various activities in the national information network services and also the data produced by the private sector an More
      The increasing development of tools producing data in different services and the need to store the results of large-scale processing results produced from various activities in the national information network services and also the data produced by the private sector and social networks, has made the migration to new databases solutions with appropriate features inevitable. With the expansion and change in the size and composition of data and the formation of big data, traditional practices and patterns do not meet new requirements. Therefore, the necessity of using information storage systems in new and scalable formats and models has become necessary. In this paper, the basic structural dimensions and different functions of both traditional databases and modern storage systems are reviewed and a new technical solution for migrating from traditional databases to modern databases is presented. Also, the basic features regarding the connection of traditional and modern databases for storing and processing data obtained from the comprehensive services of the national information network are presented and the parameters and capabilities of databases in the standard and Hadoop context are examined. In addition, as a practical example, a solution for combining traditional and modern databases has been presented, evaluated and compared using the BSC method. Moreover, it is shown that in different data sets with different data volumes, a combined use of both traditional and modern databases can be the most efficient solution. Manuscript profile

    • Open Access Article

      2 - Priority based Deployment of IoT Applications in Fog
      Masomeh Azimzadeh Ali Rezaee Somayyeh  Jafarali Jassbi MohammadMahdi Esnaashari
      Issue 59 , Vol. 16 , Spring_Summer 2024
      Fog computing technology has emerged to respond to the need for modern IoT applications for low latency, high security, etc. On the other hand, the limitations of fog computing such as heterogeneity, distribution, and resource constraints make service management in this More
      Fog computing technology has emerged to respond to the need for modern IoT applications for low latency, high security, etc. On the other hand, the limitations of fog computing such as heterogeneity, distribution, and resource constraints make service management in this environment challenging. Intelligent service placement means placing application services on fog nodes to ensure their QoS and effective use of resources. Using communities to organize nodes for service placement is one of the approaches in this area, where communities are mainly created based on the connection density of nodes, and applications are placed based on a single-criteria prioritization approach. This leads to the creation of unbalanced communities and inefficient placement of applications. This paper presents a priority-based method for deploying applications in the fog environment. To this end, balanced communities are created and applications are placed in balanced communities based on a multi-criteria prioritization approach. This leads to optimal use of network capacities and increases in QoS. The simulation results show that the proposed method improves deadline by up to 22%, increases availability by about 12%, and increases resource utilization by up to 10%. Manuscript profile

    • Open Access Article

      3 - Identifying and ranking factors affecting the digital transformation strategy in Iran's road freight transportation industry focusing on the Internet of Things and data analytics
      Mehran Ehteshami Mohammad Hasan Cheraghali Bita Tabrizian Maryam Teimourian sefidehkhan
      Issue 59 , Vol. 16 , Spring_Summer 2024
      This research has been done with the aim of identifying and ranking the factors affecting the digital transformation strategy in Iran's road freight transportation industry, focusing on the Internet of Things and data analytics. After reviewing the literature, semi-stru More
      This research has been done with the aim of identifying and ranking the factors affecting the digital transformation strategy in Iran's road freight transportation industry, focusing on the Internet of Things and data analytics. After reviewing the literature, semi-structured interviews were conducted with 20 academic and road freight transportation industry experts in Iran, who were selected using the purposive sampling method and saturation principle. In the quantitative part, the opinions of 170 employees of this industry, who were selected based on Cochran's formula and stratified sampling method, were collected using a researcher-made questionnaire. Delphi technique, literature review and coding were used to analyze the data in the qualitative part. In the quantitative part, inferential statistics and SPSS and smartPLS software were used. Finally, 40 indicators were extracted in the form of 8 factors and ranking of indicators and affecting factors was done using factor analysis. The result of this research shows that the internal factors have the highest rank and software infrastructure, hardware infrastructure, economic, external factors, legal, cultural and penetration factor are in the next ranks respectively. Therefore, it is suggested that organizations consider their human resource empowerment program in line with the use of technology and digital tools. Manuscript profile

    • Open Access Article

      4 - A Review on Hadith Text Processing Tasks
      Sepideh Baradaran Behrooz Minaei Mohammad Ebrahim Shenassa Sayyed Ali Hossayni
      Issue 59 , Vol. 16 , Spring_Summer 2024
      In order to facilitate and achieve higher precision and less processing time, it is recommended to evaluate the authenticity of hadith by intelligent methods. Due to the huge volume of narrative texts (hadith) and the complex concepts and relationships in them, many res More
      In order to facilitate and achieve higher precision and less processing time, it is recommended to evaluate the authenticity of hadith by intelligent methods. Due to the huge volume of narrative texts (hadith) and the complex concepts and relationships in them, many researches have been conducted in the field of automatic hadith processing. In this field, some researchers have evaluated intelligent methods in the fields of Matn (text) and Isnad processing, which according to the review of previous researches, about 47% of them in the field of hadith text processing and 46% in the case of Isnad processing of hadiths and 7% have done research in both fields. By examining 97 researches in the field of processing hadiths, it was found that hadiths were evaluated in the field of measuring the accuracy of the text or Isnad or both cases. Processing tasks can be classified into different categories such as ontology construction, hadith text classification, hadith similarities and hadith authentication. The most used hadith processing method has been the information retrieval method in the field of hadith text processing. Manuscript profile

    • Open Access Article

      5 - A Horizon for Sentiment Analysis in Social Networks based on Interpreting Contents
      Maryam Tayefeh Mahmoudi َAmirmansour  Yadegari Parvin Ahmadi Kambiz Badie
      Issue 59 , Vol. 16 , Spring_Summer 2024
      Interpreting contents in social networks with the aim of analyzing the sentiment of their narrators is of particular significance. In this paper, we present a framework for such a purpose, which is able to classify the messages hidden in contents based on using some rul More
      Interpreting contents in social networks with the aim of analyzing the sentiment of their narrators is of particular significance. In this paper, we present a framework for such a purpose, which is able to classify the messages hidden in contents based on using some rule-type protocols with high abstraction level. According to this framework, items such as prosodic of a content's narrator, context of disseminating a content and the key propositions in a content's text are regarded in the condition part of a protocol, while the possible classes for the message in a content are considered as its action part. It is to be noted that the proposed rule-type protocols can equally be used for other languages due to the generic-ness of the above-mentioned items. Results of computer simulations on a variety of different contents in the social networks show that the proposed framework is sufficiently capable of analyzing the sentiment of the contents' narrators in these networks. Manuscript profile

    • Open Access Article

      6 - Anomaly and Intrusion Detection through Datamining and Feature Selection using PSO Algorithm
      Fereidoon Rezaei Mohamad Ali Afshar Kazemi Mohammad Ali Keramati
      Issue 59 , Vol. 16 , Spring_Summer 2024
      Today, considering technology development, increased use of Internet in businesses, and movement of business types from physical to virtual and internet, attacks and anomalies have also changed from physical to virtual. That is, instead of thieving a store or market, th More
      Today, considering technology development, increased use of Internet in businesses, and movement of business types from physical to virtual and internet, attacks and anomalies have also changed from physical to virtual. That is, instead of thieving a store or market, the individuals intrude the websites and virtual markets through cyberattacks and disrupt them. Detection of attacks and anomalies is one of the new challenges in promoting e-commerce technologies. Detecting anomalies of a network and the process of detecting destructive activities in e-commerce can be executed by analyzing the behavior of network traffic. Data mining systems/techniques are used extensively in intrusion detection systems (IDS) in order to detect anomalies. Reducing the size/dimensions of features plays an important role in intrusion detection since detecting anomalies, which are features of network traffic with high dimensions, is a time-consuming process. Choosing suitable and accurate features influences the speed of the proposed task/work analysis, resulting in an improved speed of detection. In this article, by using data mining algorithms such as J48 and PSO, we were able to significantly improve the accuracy of detecting anomalies and attacks. Manuscript profile

    • Open Access Article

      7 - Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning
      Mohammad Mahdi  Abdian majid ghayori Seyed Ahmad  Eftekhari
      Issue 59 , Vol. 16 , Spring_Summer 2024
      Intrusion detection systems seek to realize several objectives, such as increasing the true detection rate, reducing the detection time, reducing the computational load, and preserving the resulting logs in such a way that they cannot be manipulated or deleted by unauth More
      Intrusion detection systems seek to realize several objectives, such as increasing the true detection rate, reducing the detection time, reducing the computational load, and preserving the resulting logs in such a way that they cannot be manipulated or deleted by unauthorized people. Therefore, this study seeks to solve the challenges by benefiting from the advantages of blockchain technology, its durability, and relying on IDS architecture based on multi-node cooperation. The proposed model is an intrusion detection engine based on the decision tree algorithm implemented in the nodes of the architecture. The architecture consists of several connected nodes on the blockchain platform. The resulting model and logs are stored on the blockchain platform and cannot be manipulated. In addition to the benefits of using blockchain, reduced occupied memory, the speed, and time of transactions are also improved by blockchain. In this research, several evaluation models have been designed for single-node and multi-node architectures on the blockchain platform. Finally, proof of architecture, possible threats to architecture, and defensive ways are explained. The most important advantages of the proposed scheme are the elimination of the single point of failure, maintaining trust between nodes, and ensuring the integrity of the model, and discovered logs. Manuscript profile

    • Open Access Article

      8 - Improving resource allocation in mobile edge computing using gray wolf and particle swarm optimization algorithms
      seyed ebrahim dashti saeid shabooei
      Issue 59 , Vol. 16 , Spring_Summer 2024
      Mobile edge computing improves the experience of end users to achieve appropriate services and service quality. In this paper, the problem of improving resource allocation when offloading tasks based on mobile devices to edge servers in computing systems was investigate More
      Mobile edge computing improves the experience of end users to achieve appropriate services and service quality. In this paper, the problem of improving resource allocation when offloading tasks based on mobile devices to edge servers in computing systems was investigated. Some tasks are processed locally and some are offloaded to edge servers. The main issue is that the offloaded tasks for virtual machines in computing networks are properly scheduled to minimize computing time, service cost, computing network waste, and the maximum connection of a task with the network. In this paper, it was introduced using the hybrid algorithm of particle swarm and gray wolf to manage resource allocation and task scheduling to achieve an optimal result in edge computing networks. The comparison results show the improvement of waiting time and cost in the proposed approach. The results show that, on average, the proposed model has performed better by reducing the work time by 10% and increasing the use of resources by 16%. Manuscript profile

    • Open Access Article

      9 - Multi-level ternary quantization for improving sparsity and computation in embedded deep neural networks
      Hosna Manavi Mofrad Seyed Ali ansarmohammadi Mostafa Salehi
      Issue 59 , Vol. 16 , Spring_Summer 2024
      Deep neural networks (DNNs) have achieved great interest due to their success in various applications. However, the computation complexity and memory size are considered to be the main obstacles for implementing such models on embedded devices with limited memory and co More
      Deep neural networks (DNNs) have achieved great interest due to their success in various applications. However, the computation complexity and memory size are considered to be the main obstacles for implementing such models on embedded devices with limited memory and computational resources. Network compression techniques can overcome these challenges. Quantization and pruning methods are the most important compression techniques among them. One of the famous quantization methods in DNNs is the multi-level binary quantization, which not only exploits simple bit-wise logical operations, but also reduces the accuracy gap between binary neural networks and full precision DNNs. Since, multi-level binary can’t represent the zero value, this quantization does’nt take advantage of sparsity. On the other hand, it has been shown that DNNs are sparse, and by pruning the parameters of the DNNs, the amount of data storage in memory is reduced while computation speedup is also achieved. In this paper, we propose a pruning and quantization-aware training method for multi-level ternary quantization that takes advantage of both multi-level quantization and data sparsity. In addition to increasing the accuracy of the network compared to the binary multi-level networks, it gives the network the ability to be sparse. To save memory size and computation complexity, we increase the sparsity in the quantized network by pruning until the accuracy loss is negligible. The results show that the potential speedup of computation for our model at the bit and word-level sparsity can be increased by 15x and 45x compared to the basic multi-level binary networks. Manuscript profile

    • Open Access Article

      10 - computer security models and proposing a new perspective: A review paper
      Hadi sadjadi Reza Kalantari
      Issue 59 , Vol. 16 , Spring_Summer 2024
      In this article first the use of computer security models and its benefits are discussed in a novel way. Then, while briefly introducing the space of computer security encounters in the form of ontology, for the first time, three perspectives in the study of patterns in More
      In this article first the use of computer security models and its benefits are discussed in a novel way. Then, while briefly introducing the space of computer security encounters in the form of ontology, for the first time, three perspectives in the study of patterns in this field have been identified and distinguished from each other. These three perspectives include the view of secure models, the view of security models, and the view of the framework and system to security models. The first and third perspectives are briefly explained and the second perspective is studied in detail from the perspective of the organization of patterns, including the five types of organization. The five types mentioned include software-based lifecycle organization, logical-level organization-based organization, threat-based classification-based organization, attack-based classification-based organization, and application-based organization. In this type of introduction of patterns, the audience acquires a comprehensive view of the discourse of computer security patterns and acquires the necessary knowledge to make better use of these patterns. Finally, the analysis and idea of this research is presented in the form of introducing a new type of organization in order to facilitate the proper use and addressing of patterns. In this idea, it is stated that the existing categories are mostly static and forward-looking and do not have the necessary dynamism and backwardness, and the idea of covering all stakeholders and security ontology can have this feature and, in addition, include agile patterns as well. . Manuscript profile

    • Open Access Article

      11 - Identifying the Key Drivers of Digital Signature Implementation in Iran (using fuzzy Delphi method)
      Ghorbanali Mehrabani Fatemeh Zargaran khouzani
      Issue 59 , Vol. 16 , Spring_Summer 2024
      iThe purpose of this article is to identify and analyze the key drivers of digital signature implementation in Iran with a fuzzy Delphi approach. In terms of practical purpose and in terms of information gathering, the research has benefited from a hybrid approach. The More
      iThe purpose of this article is to identify and analyze the key drivers of digital signature implementation in Iran with a fuzzy Delphi approach. In terms of practical purpose and in terms of information gathering, the research has benefited from a hybrid approach. The statistical community consists of all experts and specialists in the field of information technology and digital signature and articles in this field. The sample size of the statistical community of experts is 13 people who were selected by the purposeful sampling method. 30 articles were selected based on their availability and downloadable, non-technical nature, and relevance to the topic. The method of data analysis was done according to the fuzzy Delphi approach. Validity and reliability were calculated and confirmed using the CVR index and Cohen's kappa test with coefficients of 0.83 and 0.93, respectively. The results prove that the key drivers of digital signature implementation in Iran include 5 main dimensions and 30 concepts, which are 1) security (information confidentiality, information security, sender authentication, document authentication, privacy protection, trust between parties), 2) business (digital business models, communication needs, staff management, organization size, organizational structure, organization resources, organizational culture, top managers, competition ecosystem, e-governance), 3) user (perceived convenience, perceived benefit, consumer behavior, consumer literacy, consumer lifestyle), 4) technical (development of technical infrastructure, systems integration, system complexity, system tanks, design quality, technical speed of certificate production and verification, impermeability of hackers) and 5) Legal (legal licenses, penal laws, legislative body, e-commerce laws). Manuscript profile

    • Open Access Article

      12 - Community Detection in Bipartite Networks Using HellRank Centrality Measure
      Ali Khosrozadeh Ali Movaghar Mohammad Mehdi Gilanian Sadeghi Hamidreza Mahyar
      Issue 59 , Vol. 16 , Spring_Summer 2024
      Community structure is a common and important feature in many complex networks, including bipartite networks. In recent years, community detection has received attention in many fields and many methods have been proposed for this purpose, but the heavy consumption of ti More
      Community structure is a common and important feature in many complex networks, including bipartite networks. In recent years, community detection has received attention in many fields and many methods have been proposed for this purpose, but the heavy consumption of time in some methods limits their use in large-scale networks. There are methods with lower time complexity, but they are mostly non-deterministic, which greatly reduces their applicability in the real world. The usual approach that is adopted to community detection in bipartite networks is to first construct a unipartite projection of the network and then communities detect in that projection using methods related to unipartite networks, but these projections inherently lose information. In this paper, based on the bipartite modularity measure that quantifies the strength of partitions in bipartite networks and using the HellRank centrality measure, a quick and deterministic method for community detection from bipartite networks directly and without need to projection, proposed. The proposed method is inspired by the voting process in election activities in the social society and simulates it. Manuscript profile

    • Open Access Article

      13 - Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models
      Yahya Poursoltani Mohammad Hassan Shirali-Shahreza S. Alireza Hashemi Golpayegani
      Issue 59 , Vol. 16 , Spring_Summer 2024
      BPMN2.0 Standard is a modeling language, which can be understood and used by a wide range of users. However, because of its non-formal nature, models (designed using it) can be containing structural errors such as Deadlock (impossibility of executing some of process tas More
      BPMN2.0 Standard is a modeling language, which can be understood and used by a wide range of users. However, because of its non-formal nature, models (designed using it) can be containing structural errors such as Deadlock (impossibility of executing some of process tasks) and Livelock (infinite repetition of tasks) may be produced by using them. These semantic errors can create anomalies in the workflow of the organization. So far, some researches has been conducted on the validation of these process models and various solutions have been provided to discover some of these structural errors. The question that may be raised about these methods is whether it is possible to definitely guarantee the structural accuracy of a BPMN method model by using any of them? To answer this question, we need a comprehensive definition of a correct BPMN2.0 process model, based on which we can evaluate the comprehensiveness of validation methods and strongly make sure that the considered method can discover all of the structural errors of the process model. In this paper, based on concept of general process models and the concept of soundness (based on process models created using Petri nets) and the generalization of its properties, i.e. Liveness and Boundness to BPMN2.0 process models, a comprehensive definition for a correct (sound) BPMN2 process model provided. Then, the comprehensiveness of the suggested methods of some of the most important researches conducted has been evaluated based on it. This definition can be used as a measure for efficiency of BPMN validation methods. Manuscript profile

    • Open Access Article

      14 - Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method
      Nazila Mohammadi Gholamreza   Memarzadeh Tehran Sedigheh Tootian Isfahani
      Issue 59 , Vol. 16 , Spring_Summer 2024
      It is inevitable to properly manage the implementation of information and communication technology policies in a planned way in order to improve the country's position in the fields of science and technology. The purpose of this research is to provide a model of the eff More
      It is inevitable to properly manage the implementation of information and communication technology policies in a planned way in order to improve the country's position in the fields of science and technology. The purpose of this research is to provide a model of the effective factors on the implementation of Iran's ICT policies with the help of the neural network technique and based on Giddens' constructive theory. From the point of view of conducting it, this research is of a survey type and based on the purpose, it is of an applied type because it is trying to use the results of the research in the Ministry of Communication and Information Technology and the Iranian Telecommunications Company. Data collection is based on library and field method. The tool for collecting information is research researcher-made questionnaire. The statistical population of the research is information and communication technology experts at the headquarters of Iran Telecommunication Company (810 people), of which 260 people were randomly selected as a sample based on Cochran's formula. MATLAB software was used for data analysis. According to the findings, the best combination for development is when all input variables are considered at the same time, and the worst case is when the infrastructure development variable is ignored, and the most important based on network sensitivity analysis is related to infrastructure development and the least important is related to content supply. Manuscript profile

    • Open Access Article

      15 - Test case Selection based on Test-Driven Development
      Zohreh Mafi mirian mirian
      Issue 59 , Vol. 16 , Spring_Summer 2024
      Test-Driven Development (TDD) is one of the test-first software production methods in which the production of each component of the code begins with writing the test case. This method has been noticed due to many advantages, including the readable, regular and short cod More
      Test-Driven Development (TDD) is one of the test-first software production methods in which the production of each component of the code begins with writing the test case. This method has been noticed due to many advantages, including the readable, regular and short code, as well as increasing the quality, productivity and reliability, and the possibility of regression testing due to the creation of a comprehensive set of unit tests. The large number of unit test cases produced in this method is considered as a strong point in order to increase the reliability of the code, however, the repeated execution of test cases increases the duration of the regression testing in this method. The purpose of this article is to present an algorithm for selecting test cases to reduce the time of the regression test in TDD method. So far, various ideas have been proposed to select test cases and reduce the regression test time. Most of these ideas are based on programming language and software production methods. The idea presented in this article is based on the program difference method and the nature of the TDD method. In this method, meaningful semantic and structural connections are created between unit tests and code blocks, and the test case selection is done based on these relationships. Manuscript profile

    • Open Access Article

      16 - Survey on the Applications of the Graph Theory in the Information Retrieval
      Maryam Piroozmand Amir Hosein Keyhanipour Ali Moeini
      Issue 59 , Vol. 16 , Spring_Summer 2024
      Due to its power in modeling complex relations between entities, graph theory has been widely used in dealing with real-world problems. On the other hand, information retrieval has emerged as one of the major problems in the area of algorithms and computation. As graph- More
      Due to its power in modeling complex relations between entities, graph theory has been widely used in dealing with real-world problems. On the other hand, information retrieval has emerged as one of the major problems in the area of algorithms and computation. As graph-based information retrieval algorithms have shown to be efficient and effective, this paper aims to provide an analytical review of these algorithms and propose a categorization of them. Briefly speaking, graph-based information retrieval algorithms might be divided into three major classes: the first category includes those algorithms which use a graph representation of the corresponding dataset within the information retrieval process. The second category contains semantic retrieval algorithms which utilize the graph theory. The third category is associated with the application of the graph theory in the learning to rank problem. The set of reviewed research works is analyzed based on both the frequency as well as the publication time. As an interesting finding of this review is that the third category is a relatively hot research topic in which a limited number of recent research works are conducted. Manuscript profile

    • Open Access Article

      17 - Application identification through intelligent traffic classification
      Shaghayegh Naderi
      Issue 59 , Vol. 16 , Spring_Summer 2024
      Traffic classification and analysis is one of the big challenges in the field of data mining and machine learning, which plays an important role in providing security, quality assurance and network management. Today, a large amount of transmission traffic in the network More
      Traffic classification and analysis is one of the big challenges in the field of data mining and machine learning, which plays an important role in providing security, quality assurance and network management. Today, a large amount of transmission traffic in the network is encrypted by secure communication protocols such as HTTPS. Encrypted traffic reduces the possibility of monitoring and detecting suspicious and malicious traffic in communication infrastructures (instead of increased security and privacy of the user) and its classification is a difficult task without decoding network communications, because the payload information is lost, and only the header information (which is encrypted too in new versions of network communication protocols such as TLS1.03) is accessible. Therefore, the old approaches of traffic analysis, such as various methods based on port and payload, have lost their efficiency, and new approaches based on artificial intelligence and machine learning are used in cryptographic traffic analysis. In this article, after reviewing the traffic analysis methods, an operational architectural framework for intelligent traffic analysis and classification has been designed. Then, an intelligent model for Traffic Classification and Application Identification is presented and evaluated using machine learning methods on Kaggle141. The obtained results show that the random forest model, in addition to high interpretability compared to deep learning methods, has been able to provide high accuracy in traffic classification compared to other machine learning methods. Finally, tips and suggestions about using machine learning methods in the operational field of traffic classification have been provided. Manuscript profile

    • Open Access Article

      18 - Explanation the role of standardization in the proposed solutions for privacy protection in health data
      batool mehrshad Mohammad mehraeen Mohammad Khansari saeed mortazavi
      Issue 59 , Vol. 16 , Spring_Summer 2024
      Introduction: Due to the importance of data sharing in the digital era and the two main considerations related to it that are; standardization and privacy protection,this article aims to answer a critical question that is,does standardization play a role in the proposed More
      Introduction: Due to the importance of data sharing in the digital era and the two main considerations related to it that are; standardization and privacy protection,this article aims to answer a critical question that is,does standardization play a role in the proposed solutions for health data privacy protection? Methods: The present study is a systematic review conducted by searching databases such as Web of Science, PubMed, ScienceDirect, Springer, Magiran and SID and by applying a time limit filter.After applying the criteria for inclusion and exclusion and evaluating the results,relevant studies were selected. Findings: Articles addressing standardization and privacy protection in health data have been analyzed by taking 5 indicators into account. The need for standardization and its role to preserve privacy in health data have also been explained by examining the findings and discussing various laws related to privacy in the health field and its relationship with standardization.After the investigation,our study reveals that due to the technical structure of the fourth and fifth generation of health care, which has facilitated standardization, privacy protection can also be achieved through standardization.Finally,directions for future research on this topic are also suggested. Conclusion: The results of this research showed that the fourth- and fifth-generation health care systems that are technology-oriented; are formed based on standards,and these standards provide the possibility of their evaluation. Thus if laws related to health data privacy protection are developed based on standards,they will have a high execution guarantee. This further highlights the critical role of standard development organizations in this field. Manuscript profile
    Most Viewed Articles

    • Open Access Article

      1 - Determining the factors affecting the collective financing of knowledge-based IT companies
      Ali Haji Gholam Saryazdi ali rajabzadeh ghotri alinaghi mashayekhi alireza hassanzade
      Issue 37 , Vol. 10 , Autumn_Winter 2019
      The method of crowdfunding in the world has expanded rapidly due to the need for financing in the early stages of start-up businesses as well as advances in information technology. In Iran, several financing platforms have been established so far, some of which have bee More
      The method of crowdfunding in the world has expanded rapidly due to the need for financing in the early stages of start-up businesses as well as advances in information technology. In Iran, several financing platforms have been established so far, some of which have been successful and some of which have been unsuccessful. Therefore, it is necessary to help the development of this method by examining the factors affecting it. Since mass financing is a new and new phenomenon, it is necessary to increase its awareness in the society in an appropriate way while determining the factors affecting this method. The collective modeling method is based on social networks and the Web 2 with the aim of recognizing new phenomena. Therefore, in this article, using collective modeling, the factors affecting crowdfunding in Iran in order to support start-up companies in the field of IT are discussed. Manuscript profile

    • Open Access Article

      2 - Image Processing of steel sheets for Defect Detection by using Gabor Wavelet
      masoud shafiee mostafa sadeghi
      Issue 13 , Vol. 4 , Spring 1391
      In different steps of steel production, various defects appear on the surface of the sheet. Putting aside the causes of defects, precise identification of their kinds helps classify steel sheet correctly, thereby it allocates a high percentage of quality control process More
      In different steps of steel production, various defects appear on the surface of the sheet. Putting aside the causes of defects, precise identification of their kinds helps classify steel sheet correctly, thereby it allocates a high percentage of quality control process. QC of steel sheet for promotion of product quality and maintaining the competitive market is of great importance. In this paper, in addition to quick review of image process techniques used, using image process by means of Gabor wavelet, a fast and precise solution for detection of texture defects in steel sheet is presented. In first step, the approach extracts considerable texture specification from image by using Gabor wavelet. The specification includes both different directions and different frequencies. Then using statistical methods, images are selected that have more obvious defects, and location of defects is determined. Offering the experimental samples, the accuracy and speed of the method is indicated. Manuscript profile

    • Open Access Article

      3 - A model information technology adoption in academic research projects in the filed ICT based on Information Technology Adoption Integrated Modeling (ITAIM)
      Shahram Aliyari masoud movahedi sirous kazemian
      Issue 41 , Vol. 11 , Autumn_Winter 2020
      Today, the emergence and expansion of technologies that provide the widest possible connection have brought about significant changes in the private life and professional life of individuals. Correct implementation of information technology is the source of economic and More
      Today, the emergence and expansion of technologies that provide the widest possible connection have brought about significant changes in the private life and professional life of individuals. Correct implementation of information technology is the source of economic and cultural development and the promotion of quality of life through the exchange of information and the provision of public and private services. The purpose of this research is to present the model of information technology acceptance in Iranian ICT research centers. Employed experts worked on ICT projects in this research Statistical population. It was provided in one of the university searching centers. And so a convenience and purposeful Nonprobability sampling does (30 person). This paper examines the factors and parameters affecting the acceptance of information technology in ICT projects of the university research centers in the field of information technology. To collect the required data and information, a questionnaire was used & to analyze the data and information obtained from the questionnaires using the Spss 22 and Smart pls3 software. According to the calculations, the factors affecting the acceptance of information technology in university research centers can be divided into four categories: IT related factors, organizational factors, factors related to executive director and individual factors that are related to management (0.497), IT (0.460) and Individual factors (0.457) have an impact on the individual acceptance of information technology respectively and organizational factors (0.469) on the adoption of an IT organization Manuscript profile

    • Open Access Article

      4 - Provide a conceptual model to identify the quality of electronic services in the country's online stores
      marziye rahmani Mohammad Fathian saied yaghoubi
      Issue 30 , Vol. 8 , Autumn_Winter 2016
      This study explains the gap in scientific studies in the field of localization of factors affecting the quality of electronic services in the country's online stores, to present a conceptual model using structural equation modeling. This is a quantitative survey study i More
      This study explains the gap in scientific studies in the field of localization of factors affecting the quality of electronic services in the country's online stores, to present a conceptual model using structural equation modeling. This is a quantitative survey study in which a structured questionnaire is distributed among the buyers of three online stores. Cronbach's alpha is used to evaluate the reliability, heuristic factor analysis to classify sub-indicators and confirmatory factor analysis to examine the validity of the structure and the variables and resulting indices. Manuscript profile

    • Open Access Article

      5 - A Satellite Control Method Using Laguerre Model Predictive Control Approach
      shekoofeh jafari fesharaki farzad tihidkhah heydarali talebi
      Issue 15 , Vol. 5 , Summer 1392
      In this paper a Model Predictive Method based controller is proposed to control a satellite. Model Predictive Control (MPC) has been well known as a practical control method for various systems in industry. A problem with this method is its computational effort and time More
      In this paper a Model Predictive Method based controller is proposed to control a satellite. Model Predictive Control (MPC) has been well known as a practical control method for various systems in industry. A problem with this method is its computational effort and time consuming. To reduce computational load Laguerre functions have been proposed in this literature. Simulation results are given to show feasibility and the validity of the design. A comparison between the time consumed in the presence and the absence of the Laguerre functions is done too. Manuscript profile

    • Open Access Article

      6 - طراحی اولین پایگاه داده کلمات دستنویس کردی برای سیستم های تشخیص تصویری کلمات
      fatemeh daneshfar basir alagheband vahid sharafi
      Issue 17 , Vol. 5 , Spring_Summer 1393
      چکیده: یکی از اجزای زیربنایی سیستم های تشخیص تصویری کلمات پایگاه داده هاست. هر سیستمی که در این زمینه طراحی گردد لاجرم می بایست از یک نوع پایگاه داده ها استفاده کند. بدیهی است چون موضوع مورد مطالعه در این سیستم ها شکل نوشتاری زبان های مختلف میباشد پس برای هر زبان مشخص More
      چکیده: یکی از اجزای زیربنایی سیستم های تشخیص تصویری کلمات پایگاه داده هاست. هر سیستمی که در این زمینه طراحی گردد لاجرم می بایست از یک نوع پایگاه داده ها استفاده کند. بدیهی است چون موضوع مورد مطالعه در این سیستم ها شکل نوشتاری زبان های مختلف میباشد پس برای هر زبان مشخص پایگاه داده بخصوصی لازم است. زبانی که این مقاله بر آن متمرکز شده کردی است و در این مقاله مراحل مختلف چگونگی طراحی اولین پایگاه داده دستنویس برای زبان کردی شرح داده شده است. از آنجا که تاکنون هیچ پایگاه داده ای مخصوص تشخیص تصویری کلمات، مربوط به زبان کردی طراحی نشده است بنابراین زمینه ای بکر و مستعد برای انجام تحقیق محسوب می گردد. همچنین با توجه به اینکه زبان کردی دارای دو رسم الخط مختلف لاتین و آرامی می باشد در این مقاله منحصرا به رسم الخط آرامی البته از نوع دستنویس آن پرداخته شده است. Manuscript profile

    • Open Access Article

      7 - پردازش تصاویر ورق های فولادی به منظور آشکارسازی عیوب به کمک موجک گابور
      Mostafa Sadeghie masoud shafiee
      Issue 14 , Vol. 4 , Autumn_Winter 2012
      In different stages of steel production, many defects appear on the surface of the sheet. Regardless of the causes of failures, accurate detection of their types helps to correctly classify the steel sheet and thus occupies a high percentage of the quality control proce More
      In different stages of steel production, many defects appear on the surface of the sheet. Regardless of the causes of failures, accurate detection of their types helps to correctly classify the steel sheet and thus occupies a high percentage of the quality control process. Quality control of steel sheets is of great importance in order to improve product quality and maintain a competitive market. In this article, while reviewing the used image processing techniques, by using image processing with the help of two-dimensional Gabor wavelet, a fast and high-accuracy solution is presented for revealing textural defects of steel sheets. At first, using Gabor wavelet, it extracts significant textural features from the images, which includes both different directions and different frequencies. Then, using the statistical method, the images that contain the defects are selected more clearly and the location of the defect is determined. By presenting test samples, the accuracy and speed of the method used have been shown. Manuscript profile

    • Open Access Article

      8 - An Investigation on the Effect of Multifactor Model of Improving Critical Thinking in E-learning Environments
      mohammadreza nili jamshid heydari hossein moradi
      Issue 21 , Vol. 6 , Spring 1394
      In the third millennium, people deal with multiple, diverse, and complicated problems as they cannot possess full control over the information, which is constantly produced and accumulated. Having a high skill of critical thinking for assessing the results of different More
      In the third millennium, people deal with multiple, diverse, and complicated problems as they cannot possess full control over the information, which is constantly produced and accumulated. Having a high skill of critical thinking for assessing the results of different issues and decision making about them based on evidences is an unavoidable necessity. The researchers of this work proposed a model with seven factors (components) for critical thinking in e-learning environments. The statistical group of this work is the M.Sc. medical education students of  AZAD university e-learning environments, and the students of the same field from Islamic Azad University traditional education system studying during 2011-2012. Among the research community, 47 members were selected based on a simple random method and divided into two trial (with 23 members) and reference (with 42 members) groups. To train the trial group, the seven-factor critical thinking training scale was utilized in e-learning environments in 15 sessions with empirical sciences course. In the reference group, the same seven-factor critical thinking training scale was used in the classroom environment in lecturing in 15 sessions with empirical sciences course. The model factors and components are challenge, representation, creation of opportunity, creation of motivation, logical analysis, encouragement, responsibility, and commitment. Both groups were subject to two pretest and posttest steps within two trial groups, which were considered as reference to each other. Both groups responded to the Watson- Glaser™ Critical Thinking Appraisal within two pretest and posttest steps, while the covariance analysis statistical test was used for analysis of the results. The results indicate significant difference between the scores between trial and reference groups in improving the critical thinking of the students in terms of inferential, assumption detection, deduction, interpretation, and logical reasoning evaluation components (p=0.001). According to the results, in terms of improving critical thinking, the trial group trained in the e-learning environment indicates higher scores as compared to the group trained in the traditional classroom environment. Manuscript profile

    • Open Access Article

      9 - Evaluation of e-learning with optimal mining approach 1 case study: Iran's higher education
      abbas anarinejad aliakbar safavi farshad moradi
      Issue 12 , Vol. 4 , Spring_Summer 2012
      The general purpose of this article is to evaluate e-learning in Iran's higher education using the optimal mining approach. The statistical population studied included the students of four universities that provide electronic education in Iran (A, B, C and D) and 702 of More
      The general purpose of this article is to evaluate e-learning in Iran's higher education using the optimal mining approach. The statistical population studied included the students of four universities that provide electronic education in Iran (A, B, C and D) and 702 of them were selected by cluster sampling. The research tool included a researcher-made questionnaire consisting of the dimensions of e-learning (including organization and management, technology, educational aspects, presentation environment design, support services, evaluation, and ethical and legal considerations), which after calculating its validity and reliability among students Sample distribution and using the statistical methods of analysis of variance and Sheffe's post hoc test, the obtained data were analyzed. The results showed that "D" University, having the highest average in all dimensions, had the best situation compared to other universities, and among the other three universities; University "B" was superior in five dimensions and University "C" in two dimensions of the seven dimensions of e-learning. In addition, optimal mining can be used more by examining and testing processes and models in other universities and adapting their techniques and approaches. Manuscript profile

    • Open Access Article

      10 - Designing a fuzzy expert system for choosing the right contractor in information technology outsourcing
      nadia kalantari nadia kalantari alireza Hasanzadeh shaban elahi
      Issue 6 , Vol. 2 , Autumn_Winter 2010
      The increase in the complexity and cost of information technology systems has created many problems for companies in the field of infrastructure and manpower, which have been reduced by using outsourcing. All organizations try to increase the probability of success of t More
      The increase in the complexity and cost of information technology systems has created many problems for companies in the field of infrastructure and manpower, which have been reduced by using outsourcing. All organizations try to increase the probability of success of their outsourcing projects in different ways. One of the reasons for the failure of these projects, especially in the field of information technology, due to its important role in gaining a competitive advantage, is the selection of an inappropriate contractor, which is complicated due to the existence of multiple and contradictory criteria. The purpose of this research is to find the important criteria for selecting the contractor and provide its framework and specify the importance of the criteria and finally to design a fuzzy expert system for choosing the right contractor in intra-border outsourcing of information technology. The method of obtaining knowledge from experts, which includes information technology specialists and managers, is a questionnaire, and it has been used in an information technology company to validate the system, and the results indicate the optimal performance of the system. Manuscript profile
    Upcoming Articles

    • Open Access Article

      1 - Persian Stance Detection Based On Multi-Classifier Fusion
      Mojgan Farhoodi Abbas Toloie Eshlaghy محمدرضا معتدل
      Stance detection (also known as stance classification, stance prediction, and stance analysis) is a recent research topic which has become an emerging opinion mining paradigm of importance. Stance detection is to determine the author's viewpoint toward a given target. I More
      Stance detection (also known as stance classification, stance prediction, and stance analysis) is a recent research topic which has become an emerging opinion mining paradigm of importance. Stance detection is to determine the author's viewpoint toward a given target. It is a core part of a set of approaches to fake news assessment. In this paper, we applied three approach includes machine learning, deep learning and transfer learning for Persian stance detection and then proposed a framework of multi-classifier fusion for getting final decision on output results. We used majority voting fusing method based on accuracy of the classifiers to combine their results and achieve the final estimation. The experimental results showed that the performance of proposed multi-classifier fusion method is better than individual classifiers. Manuscript profile

    • Open Access Article

      2 - Enteprise ontology based on intelligent agents. case study: knowledge based production export actors.
      mohammad rahim banakar ُShaban Elahi shaghayegh sahraee
      To develop ontology and investigate the role of intelligent factors in enriching ontology. On the other hand, the study of trade documents in the Trade Development Organization and Iran's Export and Import Statistics in the past few years creates the need in practice to More
      To develop ontology and investigate the role of intelligent factors in enriching ontology. On the other hand, the study of trade documents in the Trade Development Organization and Iran's Export and Import Statistics in the past few years creates the need in practice to address Iran's trade weaknesses by an ontology of knowledge-based export actors. Methodology: Grounded theory (Systematic Litreture Review) Conclusion: Ontology is the formal representation of the entities of a particular domain, which makes it possible to represent tacit and explicit knowledge of a particular field as a knowledge base through field research. Intelligent agent capabilities can be used to create an automation process in the development and enrichment of ontology. A systematic review is needed to evaluate, summarize, and compile studies on ontology and intelligent agents and establish an interaction between the two. A search of the database from January 2017 to the end of 2021 identified 38 relevant articles eligible for a qualitative evaluation of 15 articles. Intelligent agents identified the following nine concepts of ontology enrichment. Manuscript profile

    • Open Access Article

      3 - Fault detection and identification in photovoltaic systems using VGG16 deep neural network
      ُSamaneh Azimi Mohammad Manthouri Mehdi Akhbari
      Fault detection in photovoltaic (PV) arrays is necessary to increase the output power and also the useful life of a PV system. The presence of conditions such as partial shade, high impedance faults, and the maximum power point detector (MPPT) system make the fault dete More
      Fault detection in photovoltaic (PV) arrays is necessary to increase the output power and also the useful life of a PV system. The presence of conditions such as partial shade, high impedance faults, and the maximum power point detector (MPPT) system make the fault detection of PV in environmental conditions more challenging. The literature identified and classified defects just in few scenarios. In this study two-dimensional scalograms are generated from PV system data. The VGG16 as a pretrained convolutional neural network is used for feature extraction. Finally, to identify and classify faults in the PV system a fully connected neural network is trained. Unlike the previous methods proposed in the literature on the subject of defect detection and classification, various defective cases with MPPT combination are considered in this research. It has been shown that the proposed method including pre-trained CNN performs better than the existing methods and achieves an error detection accuracy of 83.375%. Manuscript profile

    • Open Access Article

      4 - An Overview on Replica Consistency Methods in Distributed Systems and Future Works
      mahsa beigrezaei
      Nowadays, applications generate huge amounts of data, in the range of several terabytes or petabytes. This data is shared among many users around the world. Distributed systems such as grid and cloud provide a suitable platform for these applications, enabling the use o More
      Nowadays, applications generate huge amounts of data, in the range of several terabytes or petabytes. This data is shared among many users around the world. Distributed systems such as grid and cloud provide a suitable platform for these applications, enabling the use of these diverse mass data applications in a distributed manner. In these systems, they use data replication to face performance problems, guarantee service quality, and increase data accessibility. Replication, despite its many advantages, also brings administrative costs. The balance between the consistency cost of replication and the benefits of replication is a hotly debated topic among researchers in this field. Therefore, paying attention to the consistency of replication plays an effective role in the efficiency of these systems. Many strategies have been proposed by researchers in the field of data replication consistency. Each of these strategies try to reduce consistency costs and provide effective solutions in this field by considering various parameters such as read rate, write rate, old data tolerance rate, number of replicas and communication bandwidth in determining the consistency levels of replicas. In this article, we will examine the concepts related to replication and replica consistency and categorize its types and review previous works in this field. The done works have been compared from the perspective of system type, decision parameters, compatibility model and improved parameters. At the end, the open issues in this field are raised. Manuscript profile

    • Open Access Article

      5 - The relevance, importance and dependence of critical infrastructures of the Islamic Republic of Iran from a cyber perspective
      Hossein Gharaee Garakani ابوذر صولت رفیعی Fatemeh saghafi Mohammad Malekinia
      In recent years, cyber attacks on the critical infrastructures of countries have increased significantly. The types of critical infrastructure and their dependencies based on national requirements are different from one country to another. Disruption in the mission or s More
      In recent years, cyber attacks on the critical infrastructures of countries have increased significantly. The types of critical infrastructure and their dependencies based on national requirements are different from one country to another. Disruption in the mission or services of a critical infrastructure has a cascading effect on other infrastructures and causes them serious problems. In different studies, different approaches have been taken to model these dependencies, the important point is not to generalize those models to other countries due to the national requirements of each country. In this research, by forming 11 focus groups consisting of top and middle managers of each infrastructure area, the network analysis method based on the DEMATEL technique was used, and the most influential and influential critical infrastructure from a cyber perspective on other critical infrastructures was identified and the relationship between the infrastructure Critical issues and their prioritization were determined from a cyber perspective. The results of this research can be useful in the design of the national warning sharing system in order to calculate the national situational awareness in the cyber field and other researches based on the dependence of critical infrastructures. Manuscript profile

    • Open Access Article

      6 - The belief of Persian text mining based on deep learning with emotion-word separation
      Hossein Alikarami AmirMasoud Bidgoli Hamid Haj Seyyed Javadi
      Belief analysis or the classification of texts based on the feelings and opinions of users on websites and social media helps people, companies and organizations to make important decisions. Belief mining includes a system for analyzing people's opinions and feelings ab More
      Belief analysis or the classification of texts based on the feelings and opinions of users on websites and social media helps people, companies and organizations to make important decisions. Belief mining includes a system for analyzing people's opinions and feelings about an entity such as products, people, organizations, according to the opinions, messages and tweets of users in social media. In this article, the belief analysis of Persian texts based on the messages, comments and tweets of users in social media and websites of 4 datasets using two deep learning methods, CNN, LSTM, taking into account the sense of the word, in two poles, positive and negative with intervals. 2- and 2+ are classified. In the proposed method, first the process of data pre-processing based on character to number conversion, removing the list of extra words and multi-word analysis is done, then for belief analysis and classification of Persian texts CNN, LSTM machine learning algorithm with word sense separation (WSD) is used to Recognize the intensity of emotions according to the words. We call the proposed model CNN_WSD and LSTM_WSD. In the proposed method, the Persian Twitter dataset is used for evaluation and then it is compared with other machine learning and deep learning methods, DNN, CNN, LSTM, in the implementation of this method, python software is used. The accuracy rate of the proposed method for LSTM-WSD and CNN-WSD is 95.8 and 94.3%, respectively. Manuscript profile

    • Open Access Article

      7 - Energy-Efficient Fixed-Point Hardware Accelerator for Embedded DNNs
      Mostafa Salehi Marzie Mastalizade ali ansarmohammadi Najme Nazari
      Deep Neural Networks (DNNs) have demonstrated remarkable performance in various application domains, such as computer vision, pattern recognition, and natural language processing. However, deploying these models on edge-computing devices poses a challenge due to their e More
      Deep Neural Networks (DNNs) have demonstrated remarkable performance in various application domains, such as computer vision, pattern recognition, and natural language processing. However, deploying these models on edge-computing devices poses a challenge due to their extensive memory requirements and computational complexity. These factors make it difficult to deploy DNNs on low-power and limited-resource devices. One promising technique to address this challenge is quantization, particularly fixed-point quantization. Previous studies have shown that reducing the bit-width of weights and activations, such as to 3 or 4 bits, through fixed-point quantization can preserve the classification accuracy of full-precision neural networks. Despite extensive research on the compression efficiency of fixed-point quantization techniques, their energy efficiency, a critical metric in evaluating embedded systems, has not been thoroughly explored. Therefore, this research aims to assess the energy efficiency of fixed-point quantization techniques while maintaining accuracy. To accomplish this, we present a model and design an architecture for each quantization method. Subsequently, we compare their area and energy efficiency at the same accuracy level. Our experimental results indicate that incorporating scaling factors and offsets into LSQ, a well-known quantization method, improves DNN accuracy by 0.1%. However, this improvement comes at the cost of a 3× decrease in hardware energy efficiency. This research highlights the significance of evaluating fixed-point quantization techniques not only in terms of compression efficiency but also in terms of energy efficiency when applied to edge-computing device. Manuscript profile

    • Open Access Article

      8 - A Recommender System based on the analysis of personality traits in Telegram social network
      Mohammad Javad shayegan mohadeseh valizadeh
      Analysis of personality traits of individuals has always been one of the interesting research topics. In addition, achieving personality traits based on data obtained from individuals' behavior is a challenging issue. Most people spend most of their time on social media More
      Analysis of personality traits of individuals has always been one of the interesting research topics. In addition, achieving personality traits based on data obtained from individuals' behavior is a challenging issue. Most people spend most of their time on social media and may engage in behaviors that represent a character in cyberspace. There are many social networks today, one of which is the Telegram social network. Telegram also has a large audience in Iran and people use it to communicate, interact with others, educate, introduce products and so on. This research seeks to find out how a recommendation system can be built based on the personality traits of individuals. For this purpose, the personality of the users of a telegram group is identified using three algorithms, Cosine Similarity, MLP and Bayes, and finally, with the help of a recommending system, telegram channels tailored to each individual's personality are suggested to him. The research results show that this recommending system has attracted 65.42% of users' satisfaction. Manuscript profile

    • Open Access Article

      9 - The local strategic model of smart police of the Islamic Republic of Iran
      ahmad dolatkhah mohammad reza movahedi sefat mehrab ramak
      . For integrated management and command and control over situations and issuing appropriate orders, it is necessary for an organization like the police to intelligently monitor all issues and create an intelligent command and control center to complete missions efficien More
      . For integrated management and command and control over situations and issuing appropriate orders, it is necessary for an organization like the police to intelligently monitor all issues and create an intelligent command and control center to complete missions efficiently. One of the components of increasing security is people's cooperation with the police in order to scientifically detect crimes, as well as benefiting from the latest technologies at the organization level. Despite the wide role of information technology in Faraja, in order for Faraja to carry out the assigned missions and establish order and security, the police organization must be transformed from a technology-oriented to a smart police, so the purpose of this research is to "provide a model It is a native strategy of the smart police of the Islamic Republic of Iran. This research is applied-developmental in terms of type and descriptive-analytical in terms of method. The statistical population of this research is targeted among the experts whose common feature is management experience in smart projects, with expertise in the fields of systems design or information technology, a strategic job position, which is estimated at 50 people. The analysis of the information and data obtained from the study of the sources has been done in a qualitative way and the information obtained from the questionnaire has been analyzed using the method of structural equations with the partial least squares approach and the use of SmartPLS software. Manuscript profile

    Word Cloud

  • Affiliated to
    Iranian Society of Information and Communication Technology
    Director-in-Charge
    Dr. Masoud Shafiee (Amirkabir University of Technology)
    Editor-in-Chief
    Dr. Mohammad-Shahram Moin (ICT Research Institute)
    Executive Manager
    Dr. Alireza Mansouri (ICT Research Institute)
    Editorial Board
    Dr. Hossein Nezamabadi-pour (دانشگاه شهید باهنر کرمان) Dr. Ramezan Ali Sadeghzadeh (دانشگاه صنعتی خواجه نصیر الدین طوسی) Dr. Hassan Rashidi (دانشگاه علامه طباطبائی) Dr. Alireza Behrad (دانشگاه شاهد) Dr. Mir Mohsen Pedram (دانشگاه خوارزمی) Dr. Fatemeh saghafi (دانشگاه تهران) Dr. Mir Hadi Seyed Arabi (دانشگاه تبريز) Dr. Mohamad Hesam Tadayon (پژوهشگاه ارتباطات و فناوری اطلاعات) Dr. Mohsen Ebrahimi-Moghaddam (دانشگاه شهید بهشتی) Dr. Masoud Shafiee (دانشگاه صنعتی امیرکبیر) Dr. Mohamadreza Aref (دانشگاه صنعتي شريف) Dr. Seyed Ahmad Motamedi (دانشگاه صنعتی امیرکبیر) Dr. Seyed Ahmad-Reza Sherafat (دانشگاه تربيت مدرس) Dr. Reza FarajiDana (دانشگاه تهران) Dr. Mohammad Teshnelab (دانشگاه صنعتي خواجه نصيرالدين طوسي) Dr. Mohammad-Shahram Moin (پژوهشگاه ارتباطات و فناوری اطلاعات) Dr. Mahmoud Kamarei (دانشگاه تهران)
    Print ISSN: 2717-0411
    Online ISSN:2783-2783

    Publication period: TwoQuarterly
    Email
    jouraict@itrc.ac.ir
    Address
    ICT Research Institute, End of North Kargar Street, Tehran, Iran
    Phone
    02184977848
    Postal Code
    1439955471

    Search

    Statistics

    Number of Volumes 15
    Number of Issues 28
    Printed Articles 315
    Number of Authors 1659
    Article Views 1654011
    Article Downloads 216437
    Number of Submitted Articles 1077
    Number of Rejected Articles 271
    Number of Accepted Articles 338
    Acceptance 27 %
    Time to Accept(day) 178
    Reviewer Count 415
    Last Update 7/19/2024