• Home
  • About Rimag
  • Contact Us
  • Register
  • Log in
  • Order
Advanced
  • Home
  • Periods
  • Vol. 10
  • Iss. 37 , 38 Vol.10
  • 37
    Iss. 37 , 38   Vol. 10 Autumn_Winter 2019
    Reviewers of this Issue
  • List of Articles


      • Open Access Article
        • Abstract Page
        • Full-Text

        1 - Determining the factors affecting the collective financing of knowledge-based IT companies
        Ali Haji Gholam Saryazdi ali rajabzadeh ghotri alinaghi mashayekhi alireza hassanzade
        The method of crowdfunding in the world has expanded rapidly due to the need for financing in the early stages of start-up businesses as well as advances in information technology. In Iran, several financing platforms have been established so far, some of which have bee Full Text
        The method of crowdfunding in the world has expanded rapidly due to the need for financing in the early stages of start-up businesses as well as advances in information technology. In Iran, several financing platforms have been established so far, some of which have been successful and some of which have been unsuccessful. Therefore, it is necessary to help the development of this method by examining the factors affecting it. Since mass financing is a new and new phenomenon, it is necessary to increase its awareness in the society in an appropriate way while determining the factors affecting this method. The collective modeling method is based on social networks and the Web 2 with the aim of recognizing new phenomena. Therefore, in this article, using collective modeling, the factors affecting crowdfunding in Iran in order to support start-up companies in the field of IT are discussed. Manuscript Document
      • Open Access Article
        • Abstract Page
        • Full-Text

        2 - Provide methodology for selecting IT project management strategy
        mona jamipour Seyed Mohammadbagher Jafari marziye nasrollahi
        The strategic approach to project management is a new approach that has received more and more attention from business thinkers in the last decade. Having a strategic approach in the field of information technology projects requires managers to choose the right strategy Full Text
        The strategic approach to project management is a new approach that has received more and more attention from business thinkers in the last decade. Having a strategic approach in the field of information technology projects requires managers to choose the right strategy in the first step of project management, taking into account several factors influencing the choice of strategy. Logical and adaptive approaches are the two dominant strategies in project management, each of which requires different tools, resources, and procedures. Despite the increase in investment in IT projects and the dependence of organizations on such technologies, still No study has been conducted to assist IT managers in choosing the appropriate strategy for such projects. Therefore, the main purpose of this study is to identify the approach of selecting the appropriate strategy in the management of information technology projects. In order to achieve this goal, in the first stage, in order to identify the factors influencing the choice of IT project management strategy, after a comprehensive review of the literature in the relevant field, the opinions of experts in the focus group have been used. In the second stage, in order to validate the extracted factors, and in the third stage, in order to weight each of the factors in selecting the two dominant logical and comparative approaches, experts are surveyed using the survey method. In the developed methodology, the factors that influence the choice of strategy are: process factors, human factors, system related factors and contextual factors. The final strategy of IT project management is obtained as a range of logical strategy and adaptive strategy Manuscript Document
      • Open Access Article
        • Abstract Page
        • Full-Text

        3 - Design of FPGA-based processor for SHA-2 series cryptographic algorithms Design ترجمه‌های design اسمفراوانی طرح plan, design, layout, project, scheme, plot نقشه map, plan, plot, scheme, plat, chart زمینه background, context, ground, setting, base, terrain تدبیر measure, plan, contraption, gimmick, contrivance, scheme قصد intention, intent, purpose, attempt, will, determination طراح ریزی design خیال imagination, phantom, illusion, thought, fiction, mind فعل طرح کردن design, plan, draft, draw, lay, bring forth قصد کردن attempt, decide, design, meditate تخصیص دادن allot, allocate, apportion, consecrate, give, design تدبیر کردن devise, contrive, meditate, compass, machinate, design تعریف‌های design اسم ۱ a plan or drawing produced to show the look and function or workings of a building, garment, or other object before it is built or made. he has just unveiled his design for the new museum مترادف‌ها: planblueprintdrawingscale drawingsketchoutlinemapplotdiagramdelineationdraftdepictionrepresentationartist's impressionschememodelprototypeproposal ۲ an arrangement of lines or shapes created to form a pattern or decoration. pottery with a lovely blue and white design مترادف‌ها: patternmotifdevicestylearrangementcompositionmakeuplayoutconstitutionconfigurationorganizationconstructionshapeformformationfigure purpose, planning, or intention that exists or is thought to exist behind an action, fact, or material object. the appearance of design in the universe مترادف‌ها: intentionaimpurposeplanintentobjectiveobjectgoalendtargetpointhopedesirewishdreamaspirationambitionidea فعل ۱ decide upon the look and functioning of (a building, garment, or other object), by making a detailed drawing of it. a number of architectural students were designing a factory مترادف‌ها: plandraw plans ofdrawsketchoutlinemap outplotblock outdelineatedraftdepictinventoriginatecreatethink upcome up withdeviseformformulateconceivemakeproducedevelopfashionfabricateforgehatchcoindream up مترادف design اسم planpatternintention فعل planinventdream upintend ۹۱ مترادف دیگر
        neda sedghahrabi Mohammad Ali Jabraeil Jamali
        20.1001.1.27170414.1397.10.37.1.6
        Secure decryption algorithms are a type of cryptographic algorithms whose importance in today's society has been highlighted by applications such as the use of personal digital tools to maintain confidentiality. On the other hand, with the advancement of technology, the Full Text
        Secure decryption algorithms are a type of cryptographic algorithms whose importance in today's society has been highlighted by applications such as the use of personal digital tools to maintain confidentiality. On the other hand, with the advancement of technology, the need to implement these algorithms on flexible platforms can be challenging. Reducing the area and speeding up the execution of operations are the main challenges for designing and implementing these algorithms. This paper proposes a new architecture for the FPGA-based processor for SHA-2 series cryptographic algorithms. In the proposed processor, the use of memory units and multi-port data path, followed by parallel processor performance, has reduced the use of resources and increased the speed of data processing. Processor architecture for SHA-2 cryptographic algorithms is modeled in VHDL and implemented on the FPGA platform in the Virtex series by ISE software. Implementation results show that the proposed compact processor compared to previous tasks with similar objectives, was able to increase the operating frequency for the SHA-256 cryptographic algorithm by 25% and occupy 55% less space for the SHA-512 cryptographic algorithm to the desired level of operational power and efficiency. Also maintain. The proposed processor is suitable for applications such as trusted mobile platforms (TMP), digital currency (Bitcoin) and secure on-chip network routing (NoC). Manuscript Document
      • Open Access Article
        • Abstract Page
        • Full-Text

        4 - Learning to Rank for the Persian Web Using the Layered Genetic Programming
        Amir Hosein Keyhanipour
        Learning to rank (L2R) has emerged as a promising approach in handling the existing challenges of Web search engines. However, there are major drawbacks with the present learning to rank techniques. Current L2R algorithms do not take into account to the search behavio Full Text
        Learning to rank (L2R) has emerged as a promising approach in handling the existing challenges of Web search engines. However, there are major drawbacks with the present learning to rank techniques. Current L2R algorithms do not take into account to the search behavior of the users embedded in their search sessions’ logs. On the other hand, machine-learning as a data-intensive process requires a large volume of data about users’ queries as well as Web documents. This situation has made the usage of L2R techniques questionable in the real-world applications. Recently, by the use of the click-through data model and based on the generation of click-through features, a novel approach is proposed, named as MGP-Rank. Using the layered genetic-programming model, MGP-Rank has achieved noticeable performance on the ranking of the English Web content. In this study, with respect to the specific characteristics of the Persian language, some suitable scenarios are presented for the generation of the click-through features. In this way, a customized version of the MGP-Rank is proposed of the Persian Web retrieval. The evaluation results of this algorithm on the dotIR dataset, indicate its considerable improvement in comparison with major ranking methods. The improvement of the performance is particularly more noticeable in the top part of the search results lists, which are most frequently visited by the Web users. Manuscript Document
      • Open Access Article
        • Abstract Page
        • Full-Text

        5 - Scheduling tasks in cloud environments using mapping framework - reduction and genetic algorithm
        nima khezr nima jafari novimipour
        20.1001.1.27170414.1397.10.37.2.7
        Task scheduling is a vital component of any distributed system such as grids, clouds, and peer-to-peer networks that refer tasks to appropriate resources for execution. Common scheduling methods have disadvantages such as high time complexity, inconsistent execution of Full Text
        Task scheduling is a vital component of any distributed system such as grids, clouds, and peer-to-peer networks that refer tasks to appropriate resources for execution. Common scheduling methods have disadvantages such as high time complexity, inconsistent execution of input tasks, and increased program execution time. Exploration-based scheduling algorithms to prioritize tasks from Manuscript Document
      • Open Access Article
        • Abstract Page
        • Full-Text

        6 - A greedy new method based on the cascade model to calculate maximizing penetration in social networks
        Asgarali Bouyer Hamid Ahmadi
        20.1001.1.27170414.1397.10.37.3.8
        In the case of penetration maximization, the goal is to find the minimum number of nodes that have the most propagation and penetration in the network. Studies on maximizing penetration and dissemination are becoming more widespread. In recent years, many algorithms hav Full Text
        In the case of penetration maximization, the goal is to find the minimum number of nodes that have the most propagation and penetration in the network. Studies on maximizing penetration and dissemination are becoming more widespread. In recent years, many algorithms have been proposed to maximize the penetration of social networks. These studies include viral marketing, spreading rumors, innovating and spreading epidemics, and so on. Each of the previous studies has shortcomings in finding suitable nodes or high time complexity. In this article, we present a new method called ICIM-GREEDY to solve the problem of maximizing penetration. In the ICIM-GREEDY algorithm, we consider two important criteria that have not been considered in the previous work, one is penetration power and the other is penetration sensitivity. These two criteria are always present in human social life. The proposed method is evaluated on standard datasets. The obtained results show that this method has a better quality in finding penetrating nodes in 30 seed nodes than other compared algorithms. This method also performs better in terms of time compared to the comparative algorithms in terms of relatively fast convergence. Manuscript Document

Rimag


Rimag is an integrated platform to accomplish all Scientific Journal requirements such as Submission, Evaluating and Reviewing, Editing, DOR assignment and publishing in the web.

Links


  • Regional Information Center for Science and Technology
  • RICeST Journal Finder
  • Reference Generator
  • Islamic World Citation Office
  • ISC Journal Performance Indicator
  • ISC Master Journals List
  • Relevant Journals of the Ministry of Science, Research and Technology
  • Iranian Journals IndexedIn ISI

Related Centers


  • Office of the Supreme Leader
  • Presidential Institution
  • Ministry of Science, Research and Technology
  • Ministry of Health and Medical Education
  • Community Communication Center (SAMS)

Technical Support


  • Phone : +98 21 88910048
  • Email : rimag@ricest.ac.ir

Official pages



  • Home Page
  • Site Map
  • مرکز منطقه ای اطلاع رسانی علوم و فناوری
  • Contact Us
  • Home
  • Site Map
  • Regional Science and Technology Information Center
  • Contact Us

The rights to this website are owned by the Raimag Press Management System.
Copyright © 2017-2022

Home| Login| About Rimag| Contact Us|
[فارسی] [العربية] [fa] [ar]
  • Ricest
  • Login
  • email