• List of Articles


      • Open Access Article

        1 - Modified orthogonal chaotic colonial competition algorithm and its application in improving pattern recognition in multilayer perceptron neural network
        پیمان معلم مهرداد صادقی حریری مهدی هاشمی
        Despite the success of the Colonial Competition Algorithm (ICA) in solving optimization problems, this algorithm still suffers from repeated entrapment in the local minimum and low convergence speed. In this paper, a new version of this algorithm, called Modified Orthog Full Text
        Despite the success of the Colonial Competition Algorithm (ICA) in solving optimization problems, this algorithm still suffers from repeated entrapment in the local minimum and low convergence speed. In this paper, a new version of this algorithm, called Modified Orthogonal Chaotic Colonial Competition (COICA), is proposed. In the policy of absorbing the proposed version, each colony seeks the space to move towards the colonizer through the definition of a new orthogonal vector. Also, the possibility of selecting powerful empires is defined through the boltzmann distribution function, and the selection operation is performed through the roulette wheel method. The proposed multilevel perceptron neural network (MLP) algorithm is used to classify standard datasets, including ionosphere and sonar. To evaluate the performance of this algorithm and to evaluate the generalizability of the trained neural network with the proposed version, the K-Fold cross-validation method has been used. The results obtained from the simulations confirm the reduction of network training error as well as the improved generalizability of the proposed algorithm. Manuscript Document
      • Open Access Article

        2 - Adaptive rotation models and traffic patterns to reduce light loss in networks on optical chip
        بهاره  اسدی میدیا  رشادی احمد خادم زاده مصطفی کرباسی
        Large number of processing cores integrated into a single chip have high growth rates. Networks on an optical chip are one of the simplest ways to solve the addressing problem between bulk interconnected networks. That's why high-performance, high-bandwidth multi-proces Full Text
        Large number of processing cores integrated into a single chip have high growth rates. Networks on an optical chip are one of the simplest ways to solve the addressing problem between bulk interconnected networks. That's why high-performance, high-bandwidth multi-processor chips will be needed in the future. Optical chip networks were introduced as a new generation of on-chip networks that overcome all the limitations of this type of network and have many advantages such as high communication bandwidth, low transmission delay. And power consumption is low. On the other hand, networks on optical chips have challenges, one of the most important of which is the routing of optical data in the optical layer, because how the path is selected affects the optical loss factor. In this paper, routing algorithms free from the impasse of adaptive rotational models, circuit switching and various traffic patterns to reduce light loss in the optical layer by considering a 5-port unobstructed router and two-dimensional grid or Mesh will be provided. Finally, we compare the simulation results with similar methods such as the XY-based algorithm and examine the improvements obtained. Manuscript Document
      • Open Access Article

        3 - Provide a framework for enhancing the security of IoT-based smart homes using the IoT-A reference architecture
        ستار هاشمی شهروز ستوده
        Today, the smart home is one of the main and growing applications of the Internet of Things, which brings comfort, security, reduced energy consumption and cost of living. In addition to the benefits and advantages that this technology has brought, the issue of security Full Text
        Today, the smart home is one of the main and growing applications of the Internet of Things, which brings comfort, security, reduced energy consumption and cost of living. In addition to the benefits and advantages that this technology has brought, the issue of security and privacy has become one of the major concerns that needs serious attention. The IoT-A reference architecture is based on examining existing protocols and resources, ensuring the compatibility of objects and communication protocols, and providing a comprehensive solution for various IoT applications. This paper seeks to provide a general framework for improving security at all levels of design, implementation, and use of equipment and protocols, using the IoT-A reference architecture to address the security challenge of the Internet of Things and smart homes. In this article, the term security framework is used to identify the set of technologies, mechanisms, software and components needed to provide a set of security needs. After examining and mapping vulnerabilities and threats in the architectural application model, this paper presents an improved security framework compared to the standard reference architecture framework. Based on the theoretical evaluation, the new framework, which was formed by adding two components of threat and vulnerability management and field management and making some changes in the licensing component, meets the security requirements of the smart home to an acceptable level and provides an appropriate degree of security and protection. Enhances IoT-A-based smart home privacy. Manuscript Document
      • Open Access Article

        4 - Persian digit recognition system in aerial writing based on depth image
        رضا  ملکی شهرام محمدی
        Recognizing handwriting on paper, screen or in the air are some of the challenges in machine vision. Recognizing aerial text has many challenges due to its three-dimensional nature. In this research work, Persian digit recognition is considered in aerial text in which t Full Text
        Recognizing handwriting on paper, screen or in the air are some of the challenges in machine vision. Recognizing aerial text has many challenges due to its three-dimensional nature. In this research work, Persian digit recognition is considered in aerial text in which the user writes the digits zero to nine in front of the Kinect sensor in the air and the system is able to detect the above digits using the sensor depth information. In the proposed system, the k-means automatic clustering method is used to separate the hand and fingertip from the background, the proposed linear slope change method is used to extract the feature, and the hidden Markov model (HMM) category is used to identify the feature and figure. The detection accuracy of the proposed system for Persian cultivars with local database and 10-fold cross-validation is 98%. The proposed system was compared with the results of several similar works, these comparisons show that the proposed system works relatively better than the systems under comparison. Manuscript Document
      • Open Access Article

        5 - Identification and Prioritization of Parameters Affecting Information Security Management System (Case Study: Social Security Branches of Guilan Province)
        اسدالله شاه بهرامی رامین رفیع زاده کاسانی حسین پوریوسفی درگاه
        Information and its protection is one of the most important pillars of survival of today's organizations. Defines and considers many ISMS implementation failures to be rooted in organizational issues and disregard for the organization's readiness prior to implementation Full Text
        Information and its protection is one of the most important pillars of survival of today's organizations. Defines and considers many ISMS implementation failures to be rooted in organizational issues and disregard for the organization's readiness prior to implementation. Therefore, assessing the situation and prioritizing information security risks and creating an overview and hierarchy of it, is important in the successful establishment of the information security system. However, in terms of dimensions, effects and various causes of security risks and considering the multiplicity of indicators and effective parameters of ISMS implementation, it is necessary to use multi-criteria decision-making models in their evaluation and ranking. . In this study, an attempt has been made to classify the factors affecting the information security management system into two groups of soft and hard factors and in order to accurately rank and focus more, especially in conditions of uncertainty that is inherent in human decision making, Fuzzy hierarchical analysis (FAHP) was performed. Based on this and with the help of a questionnaire to quantify the results, the opinions of technical experts including academic experts, managers and employees of the information technology department of social security branches in Guilan province have been used as a case study of this research. The results show that soft factors including managerial and cultural / social factors are more important than hard factors including financial and technical / technological factors in information security management system and management factors are more important than other soft factors as well as technical / technological factors. They are more important than other difficult factors. Manuscript Document
      • Open Access Article

        6 - Discover product defect reports from the text of users' online comments
        نرگس نعمتی فرد محرم منصوری زاده مهدی سخائی نیا
        With the development of Web 2 and social networks, customers and users can share their opinions about different products They leave. These ideas can be used as a valuable resource to determine the position of the product and its success in marketing. Extracting the rep Full Text
        With the development of Web 2 and social networks, customers and users can share their opinions about different products They leave. These ideas can be used as a valuable resource to determine the position of the product and its success in marketing. Extracting the reported shortcomings from the large volume of comments generated by users is one of the major problems in this field of research. By comparing the products of different manufacturers, customers and consumers express the strengths and weaknesses of the products in the form of positive and negative comments. Classification of comments based on positive and negative sensory words in the text does not lead to accurate results without reference to documents containing a defect report. Because defects are not reported solely in negative comments. It is possible for a customer to feel positive about a product and still report a defect in their opinion. Therefore, another challenge of this research field is the correct and accurate classification of opinions. To solve these problems and challenges, this article provides an effective and efficient way to extract comments containing product defect reports from users' online comments. For this purpose, stochastic forest classifiers were used to identify the defect report and the unattended thematic modeling technique used the Dirichlet hidden allocation to provide a summary of the defect report. Data from the Amazon website has been used to analyze and evaluate the proposed method. The results showed that random forest has an acceptable performance for defect reporting even with a small number of educational data. Results and outputs extracted from documents containing the defect report, including a summary of the defect report to facilitate manufacturers' decision making, finding patterns of the defect report in the text automatically, and discovering the aspects of the product that reported the most defects Related to themDemonstrates the ability of Dirichlet's latent allocation method. Manuscript Document