List of Articles
-
Open Access Article
1 - Determining the factors affecting the collective financing of knowledge-based IT companies
Ali Haji Gholam Saryazdi ali rajabzadeh ghotri alinaghi mashayekhi alireza hassanzadeThe method of crowdfunding in the world has expanded rapidly due to the need for financing in the early stages of start-up businesses as well as advances in information technology. In Iran, several financing platforms have been established so far, some of which have bee Full TextThe method of crowdfunding in the world has expanded rapidly due to the need for financing in the early stages of start-up businesses as well as advances in information technology. In Iran, several financing platforms have been established so far, some of which have been successful and some of which have been unsuccessful. Therefore, it is necessary to help the development of this method by examining the factors affecting it. Since mass financing is a new and new phenomenon, it is necessary to increase its awareness in the society in an appropriate way while determining the factors affecting this method. The collective modeling method is based on social networks and the Web 2 with the aim of recognizing new phenomena. Therefore, in this article, using collective modeling, the factors affecting crowdfunding in Iran in order to support start-up companies in the field of IT are discussed. Manuscript Document -
Open Access Article
2 - Provide methodology for selecting IT project management strategy
mona jamipour Seyed Mohammadbagher Jafari marziye nasrollahiThe strategic approach to project management is a new approach that has received more and more attention from business thinkers in the last decade. Having a strategic approach in the field of information technology projects requires managers to choose the right strategy Full TextThe strategic approach to project management is a new approach that has received more and more attention from business thinkers in the last decade. Having a strategic approach in the field of information technology projects requires managers to choose the right strategy in the first step of project management, taking into account several factors influencing the choice of strategy. Logical and adaptive approaches are the two dominant strategies in project management, each of which requires different tools, resources, and procedures. Despite the increase in investment in IT projects and the dependence of organizations on such technologies, still No study has been conducted to assist IT managers in choosing the appropriate strategy for such projects. Therefore, the main purpose of this study is to identify the approach of selecting the appropriate strategy in the management of information technology projects. In order to achieve this goal, in the first stage, in order to identify the factors influencing the choice of IT project management strategy, after a comprehensive review of the literature in the relevant field, the opinions of experts in the focus group have been used. In the second stage, in order to validate the extracted factors, and in the third stage, in order to weight each of the factors in selecting the two dominant logical and comparative approaches, experts are surveyed using the survey method. In the developed methodology, the factors that influence the choice of strategy are: process factors, human factors, system related factors and contextual factors. The final strategy of IT project management is obtained as a range of logical strategy and adaptive strategy Manuscript Document -
Open Access Article
3 - Design of FPGA-based processor for SHA-2 series cryptographic algorithms Design ترجمههای design اسمفراوانی طرح plan, design, layout, project, scheme, plot نقشه map, plan, plot, scheme, plat, chart زمینه background, context, ground, setting, base, terrain تدبیر measure, plan, contraption, gimmick, contrivance, scheme قصد intention, intent, purpose, attempt, will, determination طراح ریزی design خیال imagination, phantom, illusion, thought, fiction, mind فعل طرح کردن design, plan, draft, draw, lay, bring forth قصد کردن attempt, decide, design, meditate تخصیص دادن allot, allocate, apportion, consecrate, give, design تدبیر کردن devise, contrive, meditate, compass, machinate, design تعریفهای design اسم ۱ a plan or drawing produced to show the look and function or workings of a building, garment, or other object before it is built or made. he has just unveiled his design for the new museum مترادفها: planblueprintdrawingscale drawingsketchoutlinemapplotdiagramdelineationdraftdepictionrepresentationartist's impressionschememodelprototypeproposal ۲ an arrangement of lines or shapes created to form a pattern or decoration. pottery with a lovely blue and white design مترادفها: patternmotifdevicestylearrangementcompositionmakeuplayoutconstitutionconfigurationorganizationconstructionshapeformformationfigure purpose, planning, or intention that exists or is thought to exist behind an action, fact, or material object. the appearance of design in the universe مترادفها: intentionaimpurposeplanintentobjectiveobjectgoalendtargetpointhopedesirewishdreamaspirationambitionidea فعل ۱ decide upon the look and functioning of (a building, garment, or other object), by making a detailed drawing of it. a number of architectural students were designing a factory مترادفها: plandraw plans ofdrawsketchoutlinemap outplotblock outdelineatedraftdepictinventoriginatecreatethink upcome up withdeviseformformulateconceivemakeproducedevelopfashionfabricateforgehatchcoindream up مترادف design اسم planpatternintention فعل planinventdream upintend ۹۱ مترادف دیگر
neda sedghahrabi Mohammad Ali Jabraeil JamaliSecure decryption algorithms are a type of cryptographic algorithms whose importance in today's society has been highlighted by applications such as the use of personal digital tools to maintain confidentiality. On the other hand, with the advancement of technology, the Full TextSecure decryption algorithms are a type of cryptographic algorithms whose importance in today's society has been highlighted by applications such as the use of personal digital tools to maintain confidentiality. On the other hand, with the advancement of technology, the need to implement these algorithms on flexible platforms can be challenging. Reducing the area and speeding up the execution of operations are the main challenges for designing and implementing these algorithms. This paper proposes a new architecture for the FPGA-based processor for SHA-2 series cryptographic algorithms. In the proposed processor, the use of memory units and multi-port data path, followed by parallel processor performance, has reduced the use of resources and increased the speed of data processing. Processor architecture for SHA-2 cryptographic algorithms is modeled in VHDL and implemented on the FPGA platform in the Virtex series by ISE software. Implementation results show that the proposed compact processor compared to previous tasks with similar objectives, was able to increase the operating frequency for the SHA-256 cryptographic algorithm by 25% and occupy 55% less space for the SHA-512 cryptographic algorithm to the desired level of operational power and efficiency. Also maintain. The proposed processor is suitable for applications such as trusted mobile platforms (TMP), digital currency (Bitcoin) and secure on-chip network routing (NoC). Manuscript Document -
Open Access Article
4 - Learning to Rank for the Persian Web Using the Layered Genetic Programming
Amir Hosein KeyhanipourLearning to rank (L2R) has emerged as a promising approach in handling the existing challenges of Web search engines. However, there are major drawbacks with the present learning to rank techniques. Current L2R algorithms do not take into account to the search behavio Full TextLearning to rank (L2R) has emerged as a promising approach in handling the existing challenges of Web search engines. However, there are major drawbacks with the present learning to rank techniques. Current L2R algorithms do not take into account to the search behavior of the users embedded in their search sessions’ logs. On the other hand, machine-learning as a data-intensive process requires a large volume of data about users’ queries as well as Web documents. This situation has made the usage of L2R techniques questionable in the real-world applications. Recently, by the use of the click-through data model and based on the generation of click-through features, a novel approach is proposed, named as MGP-Rank. Using the layered genetic-programming model, MGP-Rank has achieved noticeable performance on the ranking of the English Web content. In this study, with respect to the specific characteristics of the Persian language, some suitable scenarios are presented for the generation of the click-through features. In this way, a customized version of the MGP-Rank is proposed of the Persian Web retrieval. The evaluation results of this algorithm on the dotIR dataset, indicate its considerable improvement in comparison with major ranking methods. The improvement of the performance is particularly more noticeable in the top part of the search results lists, which are most frequently visited by the Web users. Manuscript Document -
Open Access Article
5 - Scheduling tasks in cloud environments using mapping framework - reduction and genetic algorithm
nima khezr nima jafari novimipourTask scheduling is a vital component of any distributed system such as grids, clouds, and peer-to-peer networks that refer tasks to appropriate resources for execution. Common scheduling methods have disadvantages such as high time complexity, inconsistent execution of Full TextTask scheduling is a vital component of any distributed system such as grids, clouds, and peer-to-peer networks that refer tasks to appropriate resources for execution. Common scheduling methods have disadvantages such as high time complexity, inconsistent execution of input tasks, and increased program execution time. Exploration-based scheduling algorithms to prioritize tasks from Manuscript Document -
Open Access Article
6 - A greedy new method based on the cascade model to calculate maximizing penetration in social networks
Asgarali Bouyer Hamid AhmadiIn the case of penetration maximization, the goal is to find the minimum number of nodes that have the most propagation and penetration in the network. Studies on maximizing penetration and dissemination are becoming more widespread. In recent years, many algorithms hav Full TextIn the case of penetration maximization, the goal is to find the minimum number of nodes that have the most propagation and penetration in the network. Studies on maximizing penetration and dissemination are becoming more widespread. In recent years, many algorithms have been proposed to maximize the penetration of social networks. These studies include viral marketing, spreading rumors, innovating and spreading epidemics, and so on. Each of the previous studies has shortcomings in finding suitable nodes or high time complexity. In this article, we present a new method called ICIM-GREEDY to solve the problem of maximizing penetration. In the ICIM-GREEDY algorithm, we consider two important criteria that have not been considered in the previous work, one is penetration power and the other is penetration sensitivity. These two criteria are always present in human social life. The proposed method is evaluated on standard datasets. The obtained results show that this method has a better quality in finding penetrating nodes in 30 seed nodes than other compared algorithms. This method also performs better in terms of time compared to the comparative algorithms in terms of relatively fast convergence. Manuscript Document