• XML

    isc pubmed crossref medra doaj doaj
  • List of Articles


      • Open Access Article

        1 - Optimum modeling of patient satisfaction with the doctor based on machine learning methods
        - شادمهر Zainabolhoda Heshmati Fatemeh saghafi Hadi Veisi
        The patient-centered approach in the field of health has recently been proposed in the field of the medical system of our country, but until now there is no published scientific research on the factors of patient satisfaction with doctors. The present article aims to co More
        The patient-centered approach in the field of health has recently been proposed in the field of the medical system of our country, but until now there is no published scientific research on the factors of patient satisfaction with doctors. The present article aims to cover the stated gap with a scientific evaluation based on the real information obtained from the field study. A questionnaire was designed for the health sector and was approved by the opinion of experts. In order to get the opinions of patients, a questionnaire was distributed among 500 people who underwent rhinoplasty in Tehran, and 395 questionnaires were collected. Three methods of decision tree, support vector machine and neural networks were used for data analysis. The analysis of the results according to the accuracy criteria showed that the most efficient method, in priority, the importance of the factors affecting the patient's satisfaction; Neural network method. The results of the analysis with this method indicate that the most effective feature in the patient's satisfaction with the doctor is the information that the patient expects the doctor to provide. The results of ranking factors in comparison with other studies that only used statistical methods for analysis showed that the results were relatively similar and confirmed each other. But the strengths of the neural network method in modeling is the strength of this method compared to the mentioned studies. Manuscript profile
      • Open Access Article

        2 - Presenting a method based on computational intelligence to improve energy consumption in smart wireless sensor networks
        faezeh talebian حسن  ختن¬لو منصور  اسماعیل¬پور
        Recent advances in the field of electronics and wireless communication have given the ability to design and manufacture sensors with low power consumption, small size, reasonable price and various uses. The limited energy capacity of sensors is a major challenge that af More
        Recent advances in the field of electronics and wireless communication have given the ability to design and manufacture sensors with low power consumption, small size, reasonable price and various uses. The limited energy capacity of sensors is a major challenge that affects these networks. Clustering is used as one of the well-known methods to manage this challenge. To find the suitable location of the cluster heads, the colonial competition algorithm, which is one of the branches of computational intelligence, has been used. Cluster heads are connected by a three-level model, so that cluster heads with low energy capacity and far from the station are known as the third level and exchange information indirectly with the base station. This increases the lifespan of wireless sensor networks Manuscript profile
      • Open Access Article

        3 - Iran's companion government ecosystem model, analysis and recognition of the main players
        ali hakimjavadi محمدمهدی  سپهری
        The government ecosystem is one of the developing ecosystems in Iran. The purpose of this article is to recognize and analyze the structure and also to identify the role of each of the main actors of this ecosystem. In order to achieve this goal, first, by using researc More
        The government ecosystem is one of the developing ecosystems in Iran. The purpose of this article is to recognize and analyze the structure and also to identify the role of each of the main actors of this ecosystem. In order to achieve this goal, first, by using research sources and examining the models presented in these sources, a conceptual model for the mobile government ecosystem is presented, in which four new actors: new approaches in providing services beyond expectations, Innovation and innovators, advertising and advertisers and intermediaries have been introduced. Then, by designing a questionnaire to verify the factors identified in the model and examine their impact on the mobile government ecosystem, and distributing it using a random sample of 400, the attitudes and opinions of 363 experts in the field of telephone Companion and companion government have been collected and analyzed based on the structural equation model. The results show that except for the advertising factor and advertisers, three other new factors have significant coefficients in the model. Manuscript profile
      • Open Access Article

        4 - Providing a model for evaluating information technology services based on an approach based on information technology governance models
        seyyed ahmad tabatabaei سید کمال  چهارسوق
        oday, one of the biggest problems of information technology organizations in less developed countries is the excessive attention of these organizations to the field of infrastructure and technology. This attention has been up to the point that many managers and organiza More
        oday, one of the biggest problems of information technology organizations in less developed countries is the excessive attention of these organizations to the field of infrastructure and technology. This attention has been up to the point that many managers and organizations consider the existence of up-to-date infrastructure and technologies as a sign of the maturity of the organization's information technology. Although the existence of appropriate technical and infrastructural facilities such as network, hardware, software, etc. is necessary to provide proper services and optimal performance, but these features cannot create a competitive advantage and increase the maturity of the organization. The missing link in these organizations, which has unfortunately received less attention, is how to use these facilities to achieve organizational goals. In different fields, there are many standards and methods for defining and optimizing processes. One of the most important sets of models that should be considered in information technology units are the models and frameworks related to information technology governance. IT governance focuses on implementing and managing the quality of IT services to meet business needs. IT governance is achieved by service providers through the right combination of people, process and IT. The purpose of this article is to examine the different models and frameworks of information technology governance in order to derive a model for the evaluation of information technology services by modeling these frameworks. Manuscript profile
      • Open Access Article

        5 - Providing an optimal method for dispatching an ambulance based on complex networks and artificial intelligence
        مهدی زرکش زاده Zainabolhoda Heshmati Hadi Zare Mehdi Teimouri
        The goal of emergency medical services is to reduce deaths and complications caused by diseases and injuries. Rapid dispatch of emergency services and reduced response time lead to increased survival rates. Response time is one of the important criteria for measuring th More
        The goal of emergency medical services is to reduce deaths and complications caused by diseases and injuries. Rapid dispatch of emergency services and reduced response time lead to increased survival rates. Response time is one of the important criteria for measuring the efficiency of emergency medical services. The usual method of sending ambulances is to send the nearest available unit, which pays attention to efficiency in the short term. One of the methods that has been recently mentioned in the field of ambulance dispatch is based on the analysis of complex networks. The purpose of this method is to send an ambulance to a call that is more central than other calls, which leads to better efficiency in the long run. Other methods in dispatching an ambulance are based on finding the best suitable route for service cars, and the time complexity of these methods is very high. In this article, using a hybrid approach and applying centrality criteria from complex network analysis and search methods based on artificial intelligence, an optimal and innovative method is presented to reduce the response time of emergency services. In addition, in the proposed method, the emergency priority of calls is also considered, which is an important variable in decisions. The proposed method has less limitations than the previous methods and the extensive simulation results confirm the significant improvement of this method compared to the previous methods such as the centrality method and the nearest neighbor method. Manuscript profile
      • Open Access Article

        6 - Key management in digital rights management systems in offline mode
        nafiseh shafiee مهدی  شجری
        Considering the expansion of the use of digital rights management systems, the use of methods such as encryption and encryption, although they have advantages, but they do not meet the requirements of the aforementioned systems responsible for the safe distribution of d More
        Considering the expansion of the use of digital rights management systems, the use of methods such as encryption and encryption, although they have advantages, but they do not meet the requirements of the aforementioned systems responsible for the safe distribution of digital content. In this regard, the need for an alternative or hybrid method to protect digital content from the production stage to the transfer and storage of data in digital rights management systems is undeniable. In this paper, we have proposed a model to improve the performance of digital rights management systems, which is based on multi-part cryptography and not only monitors and controls the publication and distribution of documents, but also by using distinct and unique data in key generation. It also effectively prevents copying. The main difference between the proposed approach and other methods used in this field is the use of obfuscation technique in order to protect the key generation algorithm against reverse engineering attacks. The proposed system covers more security criteria compared to the existing systems in the field of digital rights management. Manuscript profile