فهرست مقالات با موضوع عمومى


    • Open Access Paper

      1 - Cyber Threats Foresight Against Iran Based on Attack Vector
           
      Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Full Text
      Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber threats Foresight. This research can prepare the country for countering cyber threats based on existing and potential attack Vectors. First of all, 18 major cyber threats drivers base on attack Vectors through reviewing resources and interviewing with seven experts were identified. We use cross-impact analysis Future studies method to indicate main drivers of future cyber threats such as social engineering, Denial of service, ransomwares, spoofing and fraud and non-state actors. Mic Mac software will be used for this step. Finally, future scenarios for cyber threats were identified by using scenario-based approach. Scenario Wizard software will be used. The results of the research include two strong scenarios and 18 possible scenarios, based on the strongest scenario, ransomware, spoofing, fraud, social engineering and Denial of service are the most likely cyber threats by non-state actors through in a limited level Paper Details
    • Open Access Paper

      2 - The Participation of Three Brain Tissues in Alzheimer’s disease Diagnosis from Structural MRI
             
      Alzheimer’s disease (AD) is a progressive and irreversible disease which gradually makes patients unable to do their daily routines. Although the present treatments can not cure the disease completely, its early detection can reduce symptoms and enhance the patients’ li Full Text
      Alzheimer’s disease (AD) is a progressive and irreversible disease which gradually makes patients unable to do their daily routines. Although the present treatments can not cure the disease completely, its early detection can reduce symptoms and enhance the patients’ life quality. In the current literature, using the grey matter (GM) tissue which is known as an appropriate biomarker is highly common in AD diagnosis. However, two other brain tissues known as cerebrospinal fluid (CSF) and white matter (WM) seem to reveal beneficial information about the patients’ brain changes. The aim of the present study is to develop an automatic system for the early diagnosis of Alzheimer’s disease from structural MRI by simultaneously considering suitable features of all GM, CSF and WM tissues. A SVM-RBF classifier is trained and evaluated on the OASIS database to separate AD from healthy control (HC) subjects. The obtained results represent higher accuracy and sensitivity of the proposed algorithm in comparison with similar method. Paper Details
    • Open Access Paper

      3 - Parametric analysis of a broadband Archimedean spiral antenna with cavity
         
      In this article an Archimedean spiral antenna is designed and analyzed that has good operation in broadband application. By analyzing this design, the effects that different parameters have on antenna operation will be studied and ways of optimization will be found.  In Full Text
      In this article an Archimedean spiral antenna is designed and analyzed that has good operation in broadband application. By analyzing this design, the effects that different parameters have on antenna operation will be studied and ways of optimization will be found.  Influences of cavity height and number of turns to obtain good matching and gain in a frequency interval of 4 to 18 GHz will be discussed. In addition, using cavity wall around the antenna, side lobes are decreased or deleted. By tapering the arms at feeding center, better matching will be attained. For making S11 bandwidth better, increasing the cavity height or reducing the number of turns can be used. Changing number of turns does not have a significant effect on the gain. To improve the antenna gain, the cavity height needs to be adjusted such that the reflected wave from cavity and radiated wave from spiral arms are constructing. Paper Details
    • Open Access Paper

      4 - Performance Analysis of Device to Device Communications Overlaying/Underlaying Cellular Network
         
      Minimizing the outage probability and maximizing throughput are two important aspects in device to device (D2D) communications, which are greatly related to each other. In this paper, first, the exact formulas of the outage probability for D2D communications underlaying Full Text
      Minimizing the outage probability and maximizing throughput are two important aspects in device to device (D2D) communications, which are greatly related to each other. In this paper, first, the exact formulas of the outage probability for D2D communications underlaying or overlaying cellular network are derived which jointly experience Additive White Gaussian Noise (AWGN) and Rayleigh multipath fading. Then, simulation results of the exact formulas and previously respected approximate formulas are compared in MATLAB for both underlay and overlay scenarios. It is shown that the approximate formula in underlay scenario is a good estimate for exact one while approximate formula for overlaying scenario is a good approximation when the average distance between the transmit/receive nodes of D2D pair is less than half of the maximum distance between these nodes or variance of multipath fading is greater than 1.5. In addition, the probability density functions of Signal to Interference plus Noise Ratio (SINR) for underlay and overlay scenarios are found. Moreover, a new scenario is proposed which jointly considers overlay and underlay scenarios. Furthermore, exact and approximate formulas for outage probability and throughput of D2D users in the proposed scenario are derived. Finally, these formulas are compared to underlay and overlay scenarios in three special cases, low, moderate and high traffic loads Paper Details
    • Open Access Paper

      5 - Modified orthogonal chaotic colonial competition algorithm and its application in improving pattern recognition in multilayer perceptron neural network
           
      Despite the success of the Colonial Competition Algorithm (ICA) in solving optimization problems, this algorithm still suffers from repeated entrapment in the local minimum and low convergence speed. In this paper, a new version of this algorithm, called Modified Orthog Full Text
      Despite the success of the Colonial Competition Algorithm (ICA) in solving optimization problems, this algorithm still suffers from repeated entrapment in the local minimum and low convergence speed. In this paper, a new version of this algorithm, called Modified Orthogonal Chaotic Colonial Competition (COICA), is proposed. In the policy of absorbing the proposed version, each colony seeks the space to move towards the colonizer through the definition of a new orthogonal vector. Also, the possibility of selecting powerful empires is defined through the boltzmann distribution function, and the selection operation is performed through the roulette wheel method. The proposed multilevel perceptron neural network (MLP) algorithm is used to classify standard datasets, including ionosphere and sonar. To evaluate the performance of this algorithm and to evaluate the generalizability of the trained neural network with the proposed version, the K-Fold cross-validation method has been used. The results obtained from the simulations confirm the reduction of network training error as well as the improved generalizability of the proposed algorithm. Paper Details
    • Open Access Paper

      6 - Adaptive rotation models and traffic patterns to reduce light loss in networks on optical chip
             
      Large number of processing cores integrated into a single chip have high growth rates. Networks on an optical chip are one of the simplest ways to solve the addressing problem between bulk interconnected networks. That's why high-performance, high-bandwidth multi-proces Full Text
      Large number of processing cores integrated into a single chip have high growth rates. Networks on an optical chip are one of the simplest ways to solve the addressing problem between bulk interconnected networks. That's why high-performance, high-bandwidth multi-processor chips will be needed in the future. Optical chip networks were introduced as a new generation of on-chip networks that overcome all the limitations of this type of network and have many advantages such as high communication bandwidth, low transmission delay. And power consumption is low. On the other hand, networks on optical chips have challenges, one of the most important of which is the routing of optical data in the optical layer, because how the path is selected affects the optical loss factor. In this paper, routing algorithms free from the impasse of adaptive rotational models, circuit switching and various traffic patterns to reduce light loss in the optical layer by considering a 5-port unobstructed router and two-dimensional grid or Mesh will be provided. Finally, we compare the simulation results with similar methods such as the XY-based algorithm and examine the improvements obtained. Paper Details
    • Open Access Paper

      7 - Provide a framework for enhancing the security of IoT-based smart homes using the IoT-A reference architecture
         
      Today, the smart home is one of the main and growing applications of the Internet of Things, which brings comfort, security, reduced energy consumption and cost of living. In addition to the benefits and advantages that this technology has brought, the issue of security Full Text
      Today, the smart home is one of the main and growing applications of the Internet of Things, which brings comfort, security, reduced energy consumption and cost of living. In addition to the benefits and advantages that this technology has brought, the issue of security and privacy has become one of the major concerns that needs serious attention. The IoT-A reference architecture is based on examining existing protocols and resources, ensuring the compatibility of objects and communication protocols, and providing a comprehensive solution for various IoT applications. This paper seeks to provide a general framework for improving security at all levels of design, implementation, and use of equipment and protocols, using the IoT-A reference architecture to address the security challenge of the Internet of Things and smart homes. In this article, the term security framework is used to identify the set of technologies, mechanisms, software and components needed to provide a set of security needs. After examining and mapping vulnerabilities and threats in the architectural application model, this paper presents an improved security framework compared to the standard reference architecture framework. Based on the theoretical evaluation, the new framework, which was formed by adding two components of threat and vulnerability management and field management and making some changes in the licensing component, meets the security requirements of the smart home to an acceptable level and provides an appropriate degree of security and protection. Enhances IoT-A-based smart home privacy. Paper Details
    • Open Access Paper

      8 - Persian digit recognition system in aerial writing based on depth image
         
      Recognizing handwriting on paper, screen or in the air are some of the challenges in machine vision. Recognizing aerial text has many challenges due to its three-dimensional nature. In this research work, Persian digit recognition is considered in aerial text in which t Full Text
      Recognizing handwriting on paper, screen or in the air are some of the challenges in machine vision. Recognizing aerial text has many challenges due to its three-dimensional nature. In this research work, Persian digit recognition is considered in aerial text in which the user writes the digits zero to nine in front of the Kinect sensor in the air and the system is able to detect the above digits using the sensor depth information. In the proposed system, the k-means automatic clustering method is used to separate the hand and fingertip from the background, the proposed linear slope change method is used to extract the feature, and the hidden Markov model (HMM) category is used to identify the feature and figure. The detection accuracy of the proposed system for Persian cultivars with local database and 10-fold cross-validation is 98%. The proposed system was compared with the results of several similar works, these comparisons show that the proposed system works relatively better than the systems under comparison. Paper Details
    • Open Access Paper

      9 - Identification and Prioritization of Parameters Affecting Information Security Management System (Case Study: Social Security Branches of Guilan Province)
           
      Information and its protection is one of the most important pillars of survival of today's organizations. Defines and considers many ISMS implementation failures to be rooted in organizational issues and disregard for the organization's readiness prior to implementation Full Text
      Information and its protection is one of the most important pillars of survival of today's organizations. Defines and considers many ISMS implementation failures to be rooted in organizational issues and disregard for the organization's readiness prior to implementation. Therefore, assessing the situation and prioritizing information security risks and creating an overview and hierarchy of it, is important in the successful establishment of the information security system. However, in terms of dimensions, effects and various causes of security risks and considering the multiplicity of indicators and effective parameters of ISMS implementation, it is necessary to use multi-criteria decision-making models in their evaluation and ranking. . In this study, an attempt has been made to classify the factors affecting the information security management system into two groups of soft and hard factors and in order to accurately rank and focus more, especially in conditions of uncertainty that is inherent in human decision making, Fuzzy hierarchical analysis (FAHP) was performed. Based on this and with the help of a questionnaire to quantify the results, the opinions of technical experts including academic experts, managers and employees of the information technology department of social security branches in Guilan province have been used as a case study of this research. The results show that soft factors including managerial and cultural / social factors are more important than hard factors including financial and technical / technological factors in information security management system and management factors are more important than other soft factors as well as technical / technological factors. They are more important than other difficult factors. Paper Details
    • Open Access Paper

      10 - Discover product defect reports from the text of users' online comments
           
      With the development of Web 2 and social networks, customers and users can share their opinions about different products They leave. These ideas can be used as a valuable resource to determine the position of the product and its success in marketing. Extracting the rep Full Text
      With the development of Web 2 and social networks, customers and users can share their opinions about different products They leave. These ideas can be used as a valuable resource to determine the position of the product and its success in marketing. Extracting the reported shortcomings from the large volume of comments generated by users is one of the major problems in this field of research. By comparing the products of different manufacturers, customers and consumers express the strengths and weaknesses of the products in the form of positive and negative comments. Classification of comments based on positive and negative sensory words in the text does not lead to accurate results without reference to documents containing a defect report. Because defects are not reported solely in negative comments. It is possible for a customer to feel positive about a product and still report a defect in their opinion. Therefore, another challenge of this research field is the correct and accurate classification of opinions. To solve these problems and challenges, this article provides an effective and efficient way to extract comments containing product defect reports from users' online comments. For this purpose, stochastic forest classifiers were used to identify the defect report and the unattended thematic modeling technique used the Dirichlet hidden allocation to provide a summary of the defect report. Data from the Amazon website has been used to analyze and evaluate the proposed method. The results showed that random forest has an acceptable performance for defect reporting even with a small number of educational data. Results and outputs extracted from documents containing the defect report, including a summary of the defect report to facilitate manufacturers' decision making, finding patterns of the defect report in the text automatically, and discovering the aspects of the product that reported the most defects Related to themDemonstrates the ability of Dirichlet's latent allocation method. Paper Details
    • Open Access Paper

      11 - Determining the factors affecting the collective financing of knowledge-based IT companies
             
      The method of crowdfunding in the world has expanded rapidly due to the need for financing in the early stages of start-up businesses as well as advances in information technology. In Iran, several financing platforms have been established so far, some of which have bee Full Text
      The method of crowdfunding in the world has expanded rapidly due to the need for financing in the early stages of start-up businesses as well as advances in information technology. In Iran, several financing platforms have been established so far, some of which have been successful and some of which have been unsuccessful. Therefore, it is necessary to help the development of this method by examining the factors affecting it. Since mass financing is a new and new phenomenon, it is necessary to increase its awareness in the society in an appropriate way while determining the factors affecting this method. The collective modeling method is based on social networks and the Web 2 with the aim of recognizing new phenomena. Therefore, in this article, using collective modeling, the factors affecting crowdfunding in Iran in order to support start-up companies in the field of IT are discussed. Paper Details
    • Open Access Paper

      12 - Provide methodology for selecting IT project management strategy
           
      The strategic approach to project management is a new approach that has received more and more attention from business thinkers in the last decade. Having a strategic approach in the field of information technology projects requires managers to choose the right strategy Full Text
      The strategic approach to project management is a new approach that has received more and more attention from business thinkers in the last decade. Having a strategic approach in the field of information technology projects requires managers to choose the right strategy in the first step of project management, taking into account several factors influencing the choice of strategy. Logical and adaptive approaches are the two dominant strategies in project management, each of which requires different tools, resources, and procedures. Despite the increase in investment in IT projects and the dependence of organizations on such technologies, still No study has been conducted to assist IT managers in choosing the appropriate strategy for such projects. Therefore, the main purpose of this study is to identify the approach of selecting the appropriate strategy in the management of information technology projects. In order to achieve this goal, in the first stage, in order to identify the factors influencing the choice of IT project management strategy, after a comprehensive review of the literature in the relevant field, the opinions of experts in the focus group have been used. In the second stage, in order to validate the extracted factors, and in the third stage, in order to weight each of the factors in selecting the two dominant logical and comparative approaches, experts are surveyed using the survey method. In the developed methodology, the factors that influence the choice of strategy are: process factors, human factors, system related factors and contextual factors. The final strategy of IT project management is obtained as a range of logical strategy and adaptive strategy Paper Details
    • Open Access Paper

      13 - Design of FPGA-based processor for SHA-2 series cryptographic algorithms Design ترجمه‌های design اسمفراوانی طرح plan, design, layout, project, scheme, plot نقشه map, plan, plot, scheme, plat, chart زمینه background, context, ground, setting, base, terrain تدبیر measure, plan, contraption, gimmick, contrivance, scheme قصد intention, intent, purpose, attempt, will, determination طراح ریزی design خیال imagination, phantom, illusion, thought, fiction, mind فعل طرح کردن design, plan, draft, draw, lay, bring forth قصد کردن attempt, decide, design, meditate تخصیص دادن allot, allocate, apportion, consecrate, give, design تدبیر کردن devise, contrive, meditate, compass, machinate, design تعریف‌های design اسم ۱ a plan or drawing produced to show the look and function or workings of a building, garment, or other object before it is built or made. he has just unveiled his design for the new museum مترادف‌ها: planblueprintdrawingscale drawingsketchoutlinemapplotdiagramdelineationdraftdepictionrepresentationartist's impressionschememodelprototypeproposal ۲ an arrangement of lines or shapes created to form a pattern or decoration. pottery with a lovely blue and white design مترادف‌ها: patternmotifdevicestylearrangementcompositionmakeuplayoutconstitutionconfigurationorganizationconstructionshapeformformationfigure purpose, planning, or intention that exists or is thought to exist behind an action, fact, or material object. the appearance of design in the universe مترادف‌ها: intentionaimpurposeplanintentobjectiveobjectgoalendtargetpointhopedesirewishdreamaspirationambitionidea فعل ۱ decide upon the look and functioning of (a building, garment, or other object), by making a detailed drawing of it. a number of architectural students were designing a factory مترادف‌ها: plandraw plans ofdrawsketchoutlinemap outplotblock outdelineatedraftdepictinventoriginatecreatethink upcome up withdeviseformformulateconceivemakeproducedevelopfashionfabricateforgehatchcoindream up مترادف design اسم planpatternintention فعل planinventdream upintend ۹۱ مترادف دیگر
         
      Secure decryption algorithms are a type of cryptographic algorithms whose importance in today's society has been highlighted by applications such as the use of personal digital tools to maintain confidentiality. On the other hand, with the advancement of technology, the Full Text
      Secure decryption algorithms are a type of cryptographic algorithms whose importance in today's society has been highlighted by applications such as the use of personal digital tools to maintain confidentiality. On the other hand, with the advancement of technology, the need to implement these algorithms on flexible platforms can be challenging. Reducing the area and speeding up the execution of operations are the main challenges for designing and implementing these algorithms. This paper proposes a new architecture for the FPGA-based processor for SHA-2 series cryptographic algorithms. In the proposed processor, the use of memory units and multi-port data path, followed by parallel processor performance, has reduced the use of resources and increased the speed of data processing. Processor architecture for SHA-2 cryptographic algorithms is modeled in VHDL and implemented on the FPGA platform in the Virtex series by ISE software. Implementation results show that the proposed compact processor compared to previous tasks with similar objectives, was able to increase the operating frequency for the SHA-256 cryptographic algorithm by 25% and occupy 55% less space for the SHA-512 cryptographic algorithm to the desired level of operational power and efficiency. Also maintain. The proposed processor is suitable for applications such as trusted mobile platforms (TMP), digital currency (Bitcoin) and secure on-chip network routing (NoC). Paper Details
    • Open Access Paper

      14 - Learning to Rank for the Persian Web Using the Layered Genetic Programming
       
      Learning to rank (L2R) has emerged as a promising approach in handling the existing challenges of Web search engines. However, there are major drawbacks with the present learning to rank techniques. Current L2R algorithms do not take into account to the search behavio Full Text
      Learning to rank (L2R) has emerged as a promising approach in handling the existing challenges of Web search engines. However, there are major drawbacks with the present learning to rank techniques. Current L2R algorithms do not take into account to the search behavior of the users embedded in their search sessions’ logs. On the other hand, machine-learning as a data-intensive process requires a large volume of data about users’ queries as well as Web documents. This situation has made the usage of L2R techniques questionable in the real-world applications. Recently, by the use of the click-through data model and based on the generation of click-through features, a novel approach is proposed, named as MGP-Rank. Using the layered genetic-programming model, MGP-Rank has achieved noticeable performance on the ranking of the English Web content. In this study, with respect to the specific characteristics of the Persian language, some suitable scenarios are presented for the generation of the click-through features. In this way, a customized version of the MGP-Rank is proposed of the Persian Web retrieval. The evaluation results of this algorithm on the dotIR dataset, indicate its considerable improvement in comparison with major ranking methods. The improvement of the performance is particularly more noticeable in the top part of the search results lists, which are most frequently visited by the Web users. Paper Details
    • Open Access Paper

      15 - Scheduling tasks in cloud environments using mapping framework - reduction and genetic algorithm
         
      Task scheduling is a vital component of any distributed system such as grids, clouds, and peer-to-peer networks that refer tasks to appropriate resources for execution. Common scheduling methods have disadvantages such as high time complexity, inconsistent execution of Full Text
      Task scheduling is a vital component of any distributed system such as grids, clouds, and peer-to-peer networks that refer tasks to appropriate resources for execution. Common scheduling methods have disadvantages such as high time complexity, inconsistent execution of input tasks, and increased program execution time. Exploration-based scheduling algorithms to prioritize tasks from Paper Details
    • Open Access Paper

      16 - A greedy new method based on the cascade model to calculate maximizing penetration in social networks
         
      In the case of penetration maximization, the goal is to find the minimum number of nodes that have the most propagation and penetration in the network. Studies on maximizing penetration and dissemination are becoming more widespread. In recent years, many algorithms hav Full Text
      In the case of penetration maximization, the goal is to find the minimum number of nodes that have the most propagation and penetration in the network. Studies on maximizing penetration and dissemination are becoming more widespread. In recent years, many algorithms have been proposed to maximize the penetration of social networks. These studies include viral marketing, spreading rumors, innovating and spreading epidemics, and so on. Each of the previous studies has shortcomings in finding suitable nodes or high time complexity. In this article, we present a new method called ICIM-GREEDY to solve the problem of maximizing penetration. In the ICIM-GREEDY algorithm, we consider two important criteria that have not been considered in the previous work, one is penetration power and the other is penetration sensitivity. These two criteria are always present in human social life. The proposed method is evaluated on standard datasets. The obtained results show that this method has a better quality in finding penetrating nodes in 30 seed nodes than other compared algorithms. This method also performs better in terms of time compared to the comparative algorithms in terms of relatively fast convergence. Paper Details
    • Open Access Paper

      17 -
         
    • Open Access Paper

      18 -
         
    • Open Access Paper

      19 -
           
    • Open Access Paper

      21 -
         
    • Open Access Paper

      22 -
             
    • Open Access Paper

      23 -
         
    • Open Access Paper

      24 -
           
    • Open Access Paper

      25 -
             
    • Open Access Paper

      26 -
         
    • Open Access Paper

      27 - Routing of Multipartite Computer Networks Using Ant Genetic Algorithm
         
      With the growth and development of computer networks, the importance of routing has become a thing of the past. The importance of using multi-sectoral networks cannot be ignored today. Many multimedia applications require sending a packet from one source to multiple des Full Text
      With the growth and development of computer networks, the importance of routing has become a thing of the past. The importance of using multi-sectoral networks cannot be ignored today. Many multimedia applications require sending a packet from one source to multiple destinations over a communication network. To support such programs, you need to create an optimal multipart tree , Which indicates the optimal routes to reach from one sender source to several desired destinations. Paper Details
    • Open Access Paper

      28 - Classify and implement hardware trojans and provide a new way to detect them
           
      In recent years, a type of hardware attack called hardware trojan has been introduced, which the hostile person prepares to achieve his goal by malicious changes on the chip. The purpose of these attacks is to disable the chip, change specifications, and obtain sensitiv Full Text
      In recent years, a type of hardware attack called hardware trojan has been introduced, which the hostile person prepares to achieve his goal by malicious changes on the chip. The purpose of these attacks is to disable the chip, change specifications, and obtain sensitive information. Paper Details
    • Open Access Paper

      29 - A model for improving banking services using customer knowledge management and mobile banking and examining its impact on customer loyalty in Bank Mellat
         
      With the development of new communication technologies, the use of information technology has been proposed as a success factor in developing organizations. One of the most important industries that must adapt to technological changes is the banking industry. The practi Full Text
      With the development of new communication technologies, the use of information technology has been proposed as a success factor in developing organizations. One of the most important industries that must adapt to technological changes is the banking industry. The practical capabilities of some private banks in attracting and retaining customers have made them a top priority for investment. The purpose of this study is to investigate the effect of customer knowledge management and mobile banking on improving banking services and customer loyalty. Bank Mellat was selected as a statistical population with 180 service management experts and 130 simple questionnaires were distributed among the sample using simple random sampling. 120 acceptable questionnaires were referred. Structural equation model was selected for data analysis. The results indicate the positive and direct impact of knowledge management and mobile banking on improving the services provided and customer loyalty. Paper Details
    • Open Access Paper

      30 - Improving recommender systems with the help of Semantic Web
           
      In order to provide for the necessities of life, human beings always use the advice and suggestions of others, which are provided orally or in writing, and take them into account in their decisions. Today, with the advancement of technology and the expansion of e-busine Full Text
      In order to provide for the necessities of life, human beings always use the advice and suggestions of others, which are provided orally or in writing, and take them into account in their decisions. Today, with the advancement of technology and the expansion of e-business in the context of Internet websites, a new chapter of digital life has begun with the help of advisory systems. The most important goal in these systems is to attract customers and gain their trust by offering the best and most appropriate offer to buy products, according to their interests and tastes in the midst of a multitude of choices. In this research, an attempt has been made to extract information related to the field of film with the help of connections in DBpedia's ontology. Then the structure of the recommender system is designed and implemented and with the help of the information available in the MovieLens database, the performance of the recommender system is evaluated. According to the evaluations, the proposed model is more efficient among other methods that somehow use the semantic web. Paper Details
    • Open Access Paper

      31 - Provide a basic method for estimating software projects based on logical transactions
         
      In this study, in order to determine the level of visual attention of users to the right menu and to the left menu of web pages, the number of dazzles on the right and left menu was measured using an eye tracker to determine which menu is preferable to users in terms of Full Text
      In this study, in order to determine the level of visual attention of users to the right menu and to the left menu of web pages, the number of dazzles on the right and left menu was measured using an eye tracker to determine which menu is preferable to users in terms of visual attention. contract. Method: 116 pages containing two right and left menus were displayed in the form of 3 sets of Persian-English and English-Persian for 30 subjects and the subjects were required to find a word in the menus. Data related to the number of users' dazzle on each menu, which was an indication of their visual attention to that menu, was recorded and collected using the gaze tracker. Results: The total number of user idiots on the menus of the English collection did not differ according to the order of the menus (right or left). But the total number of user wonders on the menus of the Persian collection, the Persian-English collection and in general in all the pages of the three collections was different due to the jump in the arrangement of the menus (right or left) and on the right menu more than the left menu. Conclusion: Considering the higher number of dumbbells on the right menu in this study and the proven advantages of the right menu, as well as the fact that the advantage of having a left-hand menu in China has been in cultures whose mother tongue is read from left to right. Although the results of previous studies on the high speed of homework and interaction with the left-hand menu are inconsistent, web designers can be advised to use the right-hand menu when designing native websites. Paper Details
    • Open Access Paper

      32 - Provide a new architecture for the decision support system to manage stock trading based on a combination of financial indicators
           
      Financial indicators are often used to analyze the market and predict the future of stocks. But because of the complexity of the stock market, what index to use and how reliable the output of the index used is has always been an issue. In this paper, a hybrid approach i Full Text
      Financial indicators are often used to analyze the market and predict the future of stocks. But because of the complexity of the stock market, what index to use and how reliable the output of the index used is has always been an issue. In this paper, a hybrid approach in the form of a decision support system is used to offer the best stocks to buy or sell. The best stocks are selected from a set of stocks using a set of financial indicators. Each of these indicators acts as a model and shows its status in the future, given the stock situation in the past. Therefore, using a combination of indicators allows us to make decisions with more certainty. The efficiency of this system has been evaluated on the Iranian stock market data collection collected from 2001 to 2011. The results show that the indicators used and the combined use of them have led to the decision support system to produce proposals with high accuracy Paper Details
    • Open Access Paper

      33 - Investigating the Effect of Hardware Parameters Adjustments on Energy Consumption in Thin Matrix Multiplication Algorithm on GPUs
         
      Multiplication of thin algorithmic matrices is a simple but very important part of linear and scientific algebra programs in mathematics and physics, and due to its parallel nature, GPUs are one of the most suitable and important options. To select its executive platfor Full Text
      Multiplication of thin algorithmic matrices is a simple but very important part of linear and scientific algebra programs in mathematics and physics, and due to its parallel nature, GPUs are one of the most suitable and important options. To select its executive platform. In recent years, due to the emphasis of researchers to consider energy consumption as one of the main design goals along with efficiency, very little effort has been made to improve the energy consumption of this algorithm on the GPU. In this article, this issue is addressed from the perspective of energy efficiency in efficiency obtained. Utilizing the configuration capability introduced in modern GPUs, by statistically examining the behavior of this algorithm when using different thin matrix storage formats and different hardware settings for more than 200 matrices Slim example, the best configuration settings for the thin matrix multiplication algorithm with different storage formats on the GPU are obtained. This configuration for each storage format is selected to give the best configuration in all samples tested. Paper Details
    • Open Access Paper

      34 - Provide a conceptual model to identify the quality of electronic services in the country's online stores
           
      This study explains the gap in scientific studies in the field of localization of factors affecting the quality of electronic services in the country's online stores, to present a conceptual model using structural equation modeling. This is a quantitative survey study i Full Text
      This study explains the gap in scientific studies in the field of localization of factors affecting the quality of electronic services in the country's online stores, to present a conceptual model using structural equation modeling. This is a quantitative survey study in which a structured questionnaire is distributed among the buyers of three online stores. Cronbach's alpha is used to evaluate the reliability, heuristic factor analysis to classify sub-indicators and confirmatory factor analysis to examine the validity of the structure and the variables and resulting indices. Paper Details
    • Open Access Paper

      35 - Door detection based on car vision in outdoor scenes
           
      Doors are an important sign for blind people and robots to enter and leave the building. Detection of doors in outdoor environments has become one of the most difficult issues in computer vision; Because usually in outdoor doors, the features of a simple door such as ha Full Text
      Doors are an important sign for blind people and robots to enter and leave the building. Detection of doors in outdoor environments has become one of the most difficult issues in computer vision; Because usually in outdoor doors, the features of a simple door such as handles, corners and empty space between the door and the floor are not obvious. In this article, a method for detecting doors in outdoor environments is presented. After extracting the lines and removing the extra lines, the area between the vertical lines is formed and the characteristics of each area including height, width, location, color, texture and number of lines inside the area are extracted. Additional knowledge such as the presence of the door at the bottom of the image, the reasonable height and width of the door, and the difference in color and texture of the door with the surrounding area are then used to determine the presence of the door. This method has been tested on our eTRIMS image collection and our image collection, including doors of houses, apartments and shops, and the presented results show the superiority of the proposed method over the previous methods. Paper Details
    • Open Access Paper

      36 -
           
    • Open Access Paper

      37 -
         
    • Open Access Paper

      38 -
           
    • Open Access Paper

      39 -
           
    • Open Access Paper

      40 -
           
    • Open Access Paper

      41 -
           
    • Open Access Paper

      42 -
             
    • Open Access Paper

      43 -
         
    • Open Access Paper

      44 -
             
    • Open Access Paper

      45 -
         
    • Open Access Paper

      46 -
         
    • Open Access Paper

      47 -
         
    • Open Access Paper

      48 -
         
    • Open Access Paper

      49 -
           
    • Open Access Paper

      50 -
         
    • Open Access Paper

      51 -
         
    • Open Access Paper

      52 -
    • Open Access Paper

      53 - Using web analytics in forecasting the stock price of chemical products group in the stock exchange
           
      Forecasting markets, including stocks, has been attractive to researchers and investors due to the high volume of transactions and liquidity. The ability to predict the price enables us to achieve higher returns by reducing risk and avoiding financial losses. News plays Full Text
      Forecasting markets, including stocks, has been attractive to researchers and investors due to the high volume of transactions and liquidity. The ability to predict the price enables us to achieve higher returns by reducing risk and avoiding financial losses. News plays an important role in the process of assessing current stock prices. The development of data mining methods, computational intelligence and machine learning algorithms have led to the creation of new models in prediction. The purpose of this study is to store news agencies' news and use text mining methods and support vector machine algorithm to predict the next day's stock price. For this purpose, the news published in 17 news agencies has been stored and categorized using a thematic language in Phoenician. Then, using text mining methods, support vector machine algorithm and different kernels, the stock price forecast of the chemical products group in the stock exchange is predicted. In this study, 300,000 news items in political and economic categories and stock prices of 25 selected companies in the period from November to March 1997 in 122 trading days have been used. The results show that with the support vector machine model with linear kernel, prices can be predicted by an average of 83%. Using nonlinear kernels and the quadratic equation of the support vector machine, the prediction accuracy increases by an average of 85% and other kernels show poorer results. ارسال Paper Details
    • Open Access Paper

      54 - Routing improvement to control congestion in software defined networks by using distributed controllers
         
      Software defined networks (SDNs) are flexible for use in determining network traffic routing because they separate data plane and control plane. One of the major challenges facing SDNs is choosing the right locations to place and distribute controllers; in such a way th Full Text
      Software defined networks (SDNs) are flexible for use in determining network traffic routing because they separate data plane and control plane. One of the major challenges facing SDNs is choosing the right locations to place and distribute controllers; in such a way that the delay between controllers and switches in wide area networks can be reduced. In this regard, most of the proposed methods have focused on reducing latency. But latency is just one factor in network efficiency and overall cost reduction between controllers and related switches. This article examines more factors to reduce the cost between controllers and switches, such as communication link traffic. In this regard, a cluster-based algorithm is provided for network segmentation. Using this algorithm, it can be ensured that each part of the network can reduce the maximum cost (including delays and traffic on links) between the controller and its related switches. In this paper, using Topology Zoo, extensive simulations have been performed under real network topologies. The results of the simulations show that when the probability of congestion in the network increases, the proposed algorithm has been able to control the congestion in the network by identifying the bottleneck links in the communication paths of each node with other nodes. Therefore, considering the two criteria of delay and the degree of busyness of the links, the process of placing and distributing the controllers in the clustering operation has been done with higher accuracy. By doing so, the maximum end-to-end cost between each controller and its related switches, in the topologies Chinanet of China, Uunet of the United States, DFN of Germany, and Rediris of Spain, is decreased 41.2694%, 29.2853%, 21.3805% and 46.2829% respectively. Paper Details
    • Open Access Paper

      55 - Provide a model of human resource knowledge architecture in knowledge-based organizations using a mixed approach
             
      Knowledge architecture of human resources is more important than any other tool or element in the way of creating, organizing, storing, distributing and applying knowledge to achieve organizational goals. The present study was conducted to present the architectural mode Full Text
      Knowledge architecture of human resources is more important than any other tool or element in the way of creating, organizing, storing, distributing and applying knowledge to achieve organizational goals. The present study was conducted to present the architectural model of human resource knowledge in knowledge-based organizations using a mixed approach. This research is based on mixed research and quantitatively and qualitatively, which is descriptive-survey in terms of purpose, application and nature and method. The statistical population of the present study consists of knowledge-based organizations in Lorestan province, 30 of whose experts have been selected based on the principle of theoretical adequacy and using purposive sampling. The data collection tool in the qualitative part of the research is a semi-structured interview and in the quantitative part is a questionnaire. In the qualitative section, data and information were identified using Atlas.ti software and analysis coding method and architectural indicators of human resource knowledge. In the quantitative part of the research, the final model of the research has been developed and presented using Matlab software and interpretive structural modeling method. The research results include the indicators and components of human resource knowledge architecture and the presentation of human resource knowledge architecture model in knowledge-based organizations. Thus, in addition to developing a human resource knowledge architecture architecture model, the findings indicate the identification of the main components of human resource knowledge architecture, knowledge management infrastructure, professional characteristics, situational characteristics and achievements of human resource knowledge architecture. Paper Details
    • Open Access Paper

      56 - Investigating the effect of using various marketing strategies on social networks on gaining the trust of council customers Investigating ترجمه‌های investigate فعلفراوانی بررسی کردن investigate, check, peruse, survey, study رسیدگی کردن consider, attend, check, investigate, inspect, investigate استفسار کردن investigate وارسی کردن sift, investigate پژوهیدن investigate, inquire, research, search تحقیق کردن investigate, inquire, verify, assay, interrogate, question اطلاعات مقدماتی بدست اوردن investigate جستار کردن investigate تفتیش کردن inquire, inspect, investigate, revise باز جویی کردن examine, assay, inquire, interrogate, investigate, cross-examine تعریف‌های investigate فعل ۱ carry out a systematic or formal inquiry to discover and examine the facts of (an incident, allegation, etc.) so as to establish the truth. police are investigating the alleged beating مترادف‌ها: check outsuss outgive something the once-overscope outinquire intolook intogo intolook overprobeexplorescrutinizeconduct an investigation intoconduct an inquiry intomake inquiries abouttry to get to the bottom ofinspectanalyzestudyexamineconsiderresearchsearch/sift the evidence concerningpore overdelve intoauditevaluatefollow up مترادف investigate فعل check outsuss outgive something the once-overscope out inquire intolook intogo intolook overprobeexplorescrutinizeconduct an investigation intoconduct an inquiry intomake inquiries abouttry to get to the bottom ofinspectanalyzestudyexamineconsiderresearchsearch/sift the evidence concerningpore overdelve intoauditevaluatefollow up همچنین ببینید investigate
         
      The aim of this study is to investigate the effect of using variety of marketing strategies in social networks to build customers’ trust. Marketing through social networks has made appropriate opportunities for companies to attract more customers. Building customers' tr Full Text
      The aim of this study is to investigate the effect of using variety of marketing strategies in social networks to build customers’ trust. Marketing through social networks has made appropriate opportunities for companies to attract more customers. Building customers' trust and attracting the customers can be mentioned as marketing challenges on these networks. So, in order to create competitive advantages, companies need to use appropriate strategies of building trust. The population of this study consists of all Iranian users of social networking sites that affected by companies advertisements. Also the sample size by using snowball sampling method is 446. The research method is descriptive survey research and data collection tool is questionnaire. To test hypotheses the partial least squares (PLS) technique and SmartPLS 3 software has been used. The results show that all four variables include: transactional, relationship, database and knowledge-based marketing strategies in social networks have a significant impact to build customers’ trust. Indeed, transactional strategy has negative impact on trust so the relation between this variable and dependent variable is reverse. knowledge-based marketing strategy has the most positive impact on customers’ trust. Paper Details
    • Open Access Paper

      57 - Criteria for evaluating the effectiveness of social media users - a framework based on social media exploration
         
      Nowadays, users' interactive behaviors on social media have become an important and influential resource on marketing activities in various businesses. Despite the importance of this issue, providing appropriate criteria for evaluating the influential behavior of user Full Text
      Nowadays, users' interactive behaviors on social media have become an important and influential resource on marketing activities in various businesses. Despite the importance of this issue, providing appropriate criteria for evaluating the influential behavior of users in recent studies has received less attention. For this purpose, in the first step, an innovative theory framework including two main dimensions: potential of the influence and the level of the influence is presented. Then, in order to define criteria for measuring each dimension, by providing a comprehensive and combined classification including three domains, user-based analysis, relationship-based analysis and content-based analysis, exploration techniques Social media has been examined to analyze the effective behaviors of users. In the following, according to the literature review, the criteria of "number of active users", “ranked of users based on the structural indexes and activity", “quality and the subjectiveness of content” have been defined to measure each of the aforementioned dimensions. The criteria proposed in this article are effective for creating dashboards to assess the value of users' influence in various businesses. It also a comprehensive roadmap has been provided for businesses about the data they need to collect and the required techniques to determine each of these metrics through a cross-disciplinary and academic classification of social media exploration techniques. Paper Details
    • Open Access Paper

      58 - New Method to Improve Illumination Variations in Adult Images Based on Fuzzy Deep Neural Network
         
      In the era of the Internet, recognition of adult images is important to children's physical and mental protection. It is a challenge to recognize adult images with changes in the illumination and skin color. In this paper, we proposed a new method for solving illumi Full Text
      In the era of the Internet, recognition of adult images is important to children's physical and mental protection. It is a challenge to recognize adult images with changes in the illumination and skin color. In this paper, we proposed a new method for solving illumination normalization with skin color classification in the diagnosis of the adult image. In this paper, the deep fuzzy neural network method is utilized to improve the illumination normalization of adult images, which has improved the recognization of adult images is utilized. Using Xception to dividing the images and reduce the illumination variations in each part separately, which makes it possible to reduce the illumination variation in the whole image without losing details. In addition, the advanced color combination algorithm based on Gaussian-KNN algorithm is used for skin color classification, a non-parametric method is used for classifications and regressions. Finally, the SVM algorithm is utilized for image classification. In this paper, 33,000 different types of images are collected from the Internet. The results show that the proposed method of 1/3 has improved the accuracy of the recognization. Paper Details
    • Open Access Paper

      59 - A model information technology adoption in academic research projects in the filed ICT based on Information Technology Adoption Integrated Modeling (ITAIM)
           
      Today, the emergence and expansion of technologies that provide the widest possible connection have brought about significant changes in the private life and professional life of individuals. Correct implementation of information technology is the source of economic and Full Text
      Today, the emergence and expansion of technologies that provide the widest possible connection have brought about significant changes in the private life and professional life of individuals. Correct implementation of information technology is the source of economic and cultural development and the promotion of quality of life through the exchange of information and the provision of public and private services. The purpose of this research is to present the model of information technology acceptance in Iranian ICT research centers. Employed experts worked on ICT projects in this research Statistical population. It was provided in one of the university searching centers. And so a convenience and purposeful Nonprobability sampling does (30 person). This paper examines the factors and parameters affecting the acceptance of information technology in ICT projects of the university research centers in the field of information technology. To collect the required data and information, a questionnaire was used & to analyze the data and information obtained from the questionnaires using the Spss 22 and Smart pls3 software. According to the calculations, the factors affecting the acceptance of information technology in university research centers can be divided into four categories: IT related factors, organizational factors, factors related to executive director and individual factors that are related to management (0.497), IT (0.460) and Individual factors (0.457) have an impact on the individual acceptance of information technology respectively and organizational factors (0.469) on the adoption of an IT organization Paper Details
    • Open Access Paper

      60 - Comparing A Hybridization of Fuzzy Inference System and Particle Swarm Optimization Algorithm with Deep Learning to Predict Stock Prices
         
      Predicting stock prices by data analysts have created a great business opportunity for a wide range of investors in the stock markets. But the fact is difficulte, because there are many affective economic factors in the stock markets that they are too dynamic and compl Full Text
      Predicting stock prices by data analysts have created a great business opportunity for a wide range of investors in the stock markets. But the fact is difficulte, because there are many affective economic factors in the stock markets that they are too dynamic and complex. In this paper, two models are designed and implemented to identify the complex relationship between 10 economic factors on the stock prices of companies operating in the Tehran stock market. First, a Mamdani Fuzzy Inference System (MFIS) is designed that the fuzzy rules set of its inference engine is found by the Particle Swarm Optimization Algorithm (PSO). Then a Deep Learning model consisting of 26 neurons is designed wiht 5 hidden layers. The designed models are implemented to predict the stock prices of nine companies operating on the Tehran Stock Exchange. The experimental results show that the designed deep learning model can obtain better results than the hybridization of MFIS-PSO, the neural network and SVM, although the interperative ability of the obtained patterns, more consistent behavior with much less variance, as well as higher convergence speed than other models can be mentioned as significant competitive advantages of the MFIS-PSO model Paper Details
    • Open Access Paper

      61 - Introducing a genetic algorithm based Method for Community person's stance Detection in social media and news
         
      News reports in social media are presented with large volumes of different kinds of documents. The presented topics in these documents focus on different communities and person stances and opinions. Knowing the relationships among persons in the documents can help the r Full Text
      News reports in social media are presented with large volumes of different kinds of documents. The presented topics in these documents focus on different communities and person stances and opinions. Knowing the relationships among persons in the documents can help the readers to obtain a basic knowledge about the subject and the purpose of various documents. In the present paper, we introduce a method for detecting communities that includes the persons with the same stances and ideas. To do this, the persons referenced in different documents are clustered into communities that have related positions and stances. In the presented method. Community-based personalities are identified based on a friendship network as a base method. Then by using a genetic algorithm, the way that these communities are identified is improved. The criterion in the tests is rand index of detection of these communities. The experiments are designed based on real databases that published in Google News on a particular topic. The results indicate the efficiency and desirability of the proposed method Paper Details
    • Open Access Paper

      62 - context-aware travel recommender system exploiting from Geo-tagged photos
           
      Recommender systems are the systems that help users find and select their target items. Most of the available events for recommender systems are focused on recommending the most relevant items to the users and do not include any context information such as time, locatio Full Text
      Recommender systems are the systems that help users find and select their target items. Most of the available events for recommender systems are focused on recommending the most relevant items to the users and do not include any context information such as time, location . This paper is presented by the use of geographically tagged photo information which is highly accurate. The distinction point between this thesis and other similar articles is that this paper includes more context (weather conditions, users’ mental status, traffic level, etc.) than similar articles which include only time and location as context. This has brought the users close to each other in a cluster and has led to an increase in the accuracy. The proposed method merges the Colonial Competitive Algorithm and fuzzy clustering for a better and stronger processing against using merely the classic clustering and this has increased the accuracy of the recommendations. Flickr dataset is used to evaluate the presented method. Results of the evaluation indicate that the proposed method can provide location recommendations proportionate to the users’ preferences and their current visiting location. Paper Details
    • Open Access Paper

      63 - Polar Diagram of Points with Moving Pole
         
      Polar diagram is a generalization of Voronoi diagram in which the angle is used as the metric. This Problem has many applications in visibility, image Processing, telecommunication, antenna, and Path Planning Problems. In recent years two kinds of Polar diagram have bee Full Text
      Polar diagram is a generalization of Voronoi diagram in which the angle is used as the metric. This Problem has many applications in visibility, image Processing, telecommunication, antenna, and Path Planning Problems. In recent years two kinds of Polar diagram have been proposed and appropriate algorithm have been Presented for some types of sites. Also, some algorithms has presented for kinetic data and dynamic states. In this Paper, it is assumed that the Pole is moving and an algorithm is presented that updates near Pole Polar diagram of sites with moving pole efficiently and in a sub linear time. In this approach, the Preprocessing time is 〖O(n^4 log〗_2⁡〖n)〗 and updating time for diagram with each successive movement is 〖 O(log〗_2⁡〖n +k)〗 that k is the number of sites in region T which its site’s regions may be changed Paper Details
    • Open Access Paper

      64 - An Improved Method Based on Label Propagation and Greedy Approaches for Community Detection in Dynamic Social Networks
         
      Community detection in temporal social networks is one of the most important topics of research which attract many researchers around the world. There are variety of approaches in detecting communities in dynamic social network among which label propagation approach is Full Text
      Community detection in temporal social networks is one of the most important topics of research which attract many researchers around the world. There are variety of approaches in detecting communities in dynamic social network among which label propagation approach is simple and fast approach. This approach consists of many methods such as LabelRankT is one with high speed and less complexity. Similar to most methods for detecting communities in dynamic social networks, this one is not trouble free. That is, it is not considered the internal connection of communities, when it expands communities of the previous snapshots in the current snapshot. This drawback decreases the accuracy of community detection in dynamic social networks. For solving the drawback, a greedy approach based on local modularity optimization is added to LabelRankT method. Here, the newly proposed GreedyLabelRankT, LabelRankT and non-overlapping version of Dominant Label Propagation Algorithm Evolutionary (DLPAE-Non Overlapping) on real and synthetic datasets are implemented. Experimental results on both real and synthetic network show that the proposed method detect communities more accurately compared to the benchmark methods. Moreover, the finding here show that running time of the proposed method is close to LabelRankT. Therefore, the proposed method increase the accuracy of community detection in dynamic social networks with no noticeable change in the running time of that. Paper Details
    • Open Access Paper

      65 - Assessing E-Government Readiness in Iranian Universities, Case Study: Tarbiat Modares University
         
      Due to the recent advances in electronic government (e-government) and given the fact that universities are recognized as the Leading of innovation and progress in society, the expectation of electronic-government maturity levels in universities is higher than other gov Full Text
      Due to the recent advances in electronic government (e-government) and given the fact that universities are recognized as the Leading of innovation and progress in society, the expectation of electronic-government maturity levels in universities is higher than other governmental agencies. Given the high human capital capacity, universities are able to adapt themselves to e-government faster than other governmental organizations. In order to meet these expectations, e-government in universities and higher education institutions must be continuously evaluated. In this paper, we developed a model for assessing e-government readiness at university level, which includes "university-affiliated" indicators and "university-independent" indicators; university affiliates indicators are: " Trust "," Executive Policy and Laws "," Human Resources "," Integrity "," Budget "," Technological Infrastructure "," Digital Culture" and "Supervision, Support and Coordination ", as well as the "National Infrastructure" indicator is an independent indicator of the university. In the field study, the model was used to evaluate e-government readiness at Tarbiat Modares University Paper Details
    • Open Access Paper

      66 - Increasing the value of collected data and reducing energy consumption by using network coding and mobile sinks in wireless sensor networks
           
      The wireless sensor network includes a number of fixed sensor nodes that move sink nodes to collect data between nodes. To reduce energy consumption and increase the value of collected data, it is necessary to determine the optimum route and residence location of mobile Full Text
      The wireless sensor network includes a number of fixed sensor nodes that move sink nodes to collect data between nodes. To reduce energy consumption and increase the value of collected data, it is necessary to determine the optimum route and residence location of mobile sinks, which increases the life of wireless sensor networks. Using network coding, this paper presents a Mixed Integer Linear Programming Model to determine the optimal multicast routing of source sensor nodes to mobile sinks in wireless sensor networks, which determines the time and location of sinks to collect maximum coded data and reduces the delay in sink movement and energy consumption. Solving this problem in polynomial time is not possible due to the involvement of various parameters and the constrained resources of wireless sensor networks. Therefore, several exploratory and greedy and fully distributed algorithms are proposed to determine the movement of sinks and their residence location based on maximizing the value of coded data and the type of data dead time. By simulating, the optimal method and the use of coding and proposed algorithms, reduce the runtime and energy consumption and increase the value of collected data and network lifetime than non-coding methods. Paper Details
    • Open Access Paper

      67 - An Improved Method for Detecting Phishing Websites Using Data Mining on Web Pages
         
      Phishing plays a negative role in reducing the trust among the users in the business network based on the E-commerce framework. therefore, in this research, we tried to detect phishing websites using data mining. The detection of the outstanding features of phishing is Full Text
      Phishing plays a negative role in reducing the trust among the users in the business network based on the E-commerce framework. therefore, in this research, we tried to detect phishing websites using data mining. The detection of the outstanding features of phishing is regarded as one of the important prerequisites in designing an accurate detection system. Therefore, in order to detect phishing features, a list of 30 features suggested by phishing websites was first prepared. Then, a two-stage feature reduction method based on feature selection and extraction were proposed to enhance the efficiency of phishing detection systems, which was able to reduce the number of features significantly. Finally, the performance of decision tree J48, random forest, naïve Bayes methods were evaluated{cke_protected_1}{cke_protected_2}{cke_protected_3}{cke_protected_4} on the reduced features. The results indicated that accuracy of the model created to determine the phishing websites by using the two-stage feature reduction based Wrapper and Principal Component Analysis (PCA) algorithm in the random forest method of 96.58%, which is a desirable outcome compared to other methods. Paper Details
    • Open Access Paper

      68 - Using a multi-objective optimization algorithm for tasks allocate in the cloud-based systems to reduce energy consumption
         
      Nowadays, new technologies have increased the demand for business in the web environment.Increasing demand will increase the variety and number of services. As a result, the creation of large-scale computing data centers has high operating costs and consumes huge amount Full Text
      Nowadays, new technologies have increased the demand for business in the web environment.Increasing demand will increase the variety and number of services. As a result, the creation of large-scale computing data centers has high operating costs and consumes huge amounts of electrical power. On the other hand, inadequate and inadequate cooling systems not only cause excessive heating of resources and shorten the life of the machines. It also produces carbon that plays an important role in the weather. Therefore, they should reduce the total energy consumption of these systems with proper methods. In this research, an efficient energy management approach is provided in virtual cloud data centers, which reduces energy consumption and operational costs, and brings about an increase in the quality of services. It aims to provide a resource allocation strategy for cloud systems with the goal of reducing energy, cost of implementation and examining its use in cloud computing. The results of the simulation show that the proposed method in comaprision to NPA, DVFS, ST and MM methods can reduce the average energy consumption up to 0.626 kWh, also the need to immigration and SLA violation declined up to 186 and 30.91% respectively. Paper Details
    • Open Access Paper

      69 - Incentive reward mechanism for Participants to the human computing system of Intrusion Detection Based on Game Theory
         
      Despite the tremendous advances in the design of human computing systems, most of them suffer from low participation or poor quality participation and a high percentage of them fail. To a large extent, the success of these systems depends on people who really behave in Full Text
      Despite the tremendous advances in the design of human computing systems, most of them suffer from low participation or poor quality participation and a high percentage of them fail. To a large extent, the success of these systems depends on people who really behave in the system. Because human computing systems include small units of work, and each job yields little benefit to the participants, humans display a good behavior in the system if they are well-stimulated for doing so. In this paper, this issue investigated in the Intrusion Detection Human Computation system. Our purpose of creating the stimulus for increasing of employee participation is to do their jobs carefully and effortlessly with the lowest possible cost. After selecting the appropriate stimuli for this system, we designed the mechanism of rewarding incentives. The idea behind this mechanism is to use the skill of the staff in determining their rewards. After designing this mechanism, we used the theory of games to analyze and determine the game's balance. Then, we determine the minimum possible reward for each category of work using the results obtained from the mechanism analysis based on game theory. We validate of this mechanism using game theory and the results of implementation. Designing this mechanism will increase the accuracy of respondents in answering and as a result, increase the accuracy of the human intelligence detection system in identifying new attacks and reducing their erroneous alert rates. Also, by allocating the lowest financial resources required to employees based on the analysis obtained from the game theory and managing human computing system of Intrusion Detection, encourages participants to participate in the system and, as a result, prevent the failure of the human computing system of intrusion detection. Paper Details