List of articles (by subject) General


    • Open Access Article

      1 - Cyber Threats Foresight Against Iran Based on Attack Vector
      mahdi omrani masoud shafiee siavash khorsandi
      Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of More
      Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber threats Foresight. This research can prepare the country for countering cyber threats based on existing and potential attack Vectors. First of all, 18 major cyber threats drivers base on attack Vectors through reviewing resources and interviewing with seven experts were identified. We use cross-impact analysis Future studies method to indicate main drivers of future cyber threats such as social engineering, Denial of service, ransomwares, spoofing and fraud and non-state actors. Mic Mac software will be used for this step. Finally, future scenarios for cyber threats were identified by using scenario-based approach. Scenario Wizard software will be used. The results of the research include two strong scenarios and 18 possible scenarios, based on the strongest scenario, ransomware, spoofing, fraud, social engineering and Denial of service are the most likely cyber threats by non-state actors through in a limited level Manuscript profile
    • Open Access Article

      2 - The Participation of Three Brain Tissues in Alzheimer’s disease Diagnosis from Structural MRI
      Shima Tajeddini Habibollah  Danyali Mohammad Sadegh  Helfroush Yaghoub  Fatemi
      Alzheimer’s disease (AD) is a progressive and irreversible disease which gradually makes patients unable to do their daily routines. Although the present treatments can not cure the disease completely, its early detection can reduce symptoms and enhance the patients’ li More
      Alzheimer’s disease (AD) is a progressive and irreversible disease which gradually makes patients unable to do their daily routines. Although the present treatments can not cure the disease completely, its early detection can reduce symptoms and enhance the patients’ life quality. In the current literature, using the grey matter (GM) tissue which is known as an appropriate biomarker is highly common in AD diagnosis. However, two other brain tissues known as cerebrospinal fluid (CSF) and white matter (WM) seem to reveal beneficial information about the patients’ brain changes. The aim of the present study is to develop an automatic system for the early diagnosis of Alzheimer’s disease from structural MRI by simultaneously considering suitable features of all GM, CSF and WM tissues. A SVM-RBF classifier is trained and evaluated on the OASIS database to separate AD from healthy control (HC) subjects. The obtained results represent higher accuracy and sensitivity of the proposed algorithm in comparison with similar method. Manuscript profile
    • Open Access Article

      3 - Parametric analysis of a broadband Archimedean spiral antenna with cavity
      Hamed  noroozy Shahrokh  jam
      In this article an Archimedean spiral antenna is designed and analyzed that has good operation in broadband application. By analyzing this design, the effects that different parameters have on antenna operation will be studied and ways of optimization will be found.  In More
      In this article an Archimedean spiral antenna is designed and analyzed that has good operation in broadband application. By analyzing this design, the effects that different parameters have on antenna operation will be studied and ways of optimization will be found.  Influences of cavity height and number of turns to obtain good matching and gain in a frequency interval of 4 to 18 GHz will be discussed. In addition, using cavity wall around the antenna, side lobes are decreased or deleted. By tapering the arms at feeding center, better matching will be attained. For making S11 bandwidth better, increasing the cavity height or reducing the number of turns can be used. Changing number of turns does not have a significant effect on the gain. To improve the antenna gain, the cavity height needs to be adjusted such that the reflected wave from cavity and radiated wave from spiral arms are constructing. Manuscript profile
    • Open Access Article

      4 - Performance Analysis of Device to Device Communications Overlaying/Underlaying Cellular Network
      Hossein  Ghavami Shahriar  Shirvani Moghaddam
      Minimizing the outage probability and maximizing throughput are two important aspects in device to device (D2D) communications, which are greatly related to each other. In this paper, first, the exact formulas of the outage probability for D2D communications underlaying More
      Minimizing the outage probability and maximizing throughput are two important aspects in device to device (D2D) communications, which are greatly related to each other. In this paper, first, the exact formulas of the outage probability for D2D communications underlaying or overlaying cellular network are derived which jointly experience Additive White Gaussian Noise (AWGN) and Rayleigh multipath fading. Then, simulation results of the exact formulas and previously respected approximate formulas are compared in MATLAB for both underlay and overlay scenarios. It is shown that the approximate formula in underlay scenario is a good estimate for exact one while approximate formula for overlaying scenario is a good approximation when the average distance between the transmit/receive nodes of D2D pair is less than half of the maximum distance between these nodes or variance of multipath fading is greater than 1.5. In addition, the probability density functions of Signal to Interference plus Noise Ratio (SINR) for underlay and overlay scenarios are found. Moreover, a new scenario is proposed which jointly considers overlay and underlay scenarios. Furthermore, exact and approximate formulas for outage probability and throughput of D2D users in the proposed scenario are derived. Finally, these formulas are compared to underlay and overlay scenarios in three special cases, low, moderate and high traffic loads Manuscript profile
    • Open Access Article

      5 - Modified orthogonal chaotic colonial competition algorithm and its application in improving pattern recognition in multilayer perceptron neural network
      Payman Moallem mehrdad sadeghi hariri MAHDI hashemi
      Despite the success of the Colonial Competition Algorithm (ICA) in solving optimization problems, this algorithm still suffers from repeated entrapment in the local minimum and low convergence speed. In this paper, a new version of this algorithm, called Modified Orthog More
      Despite the success of the Colonial Competition Algorithm (ICA) in solving optimization problems, this algorithm still suffers from repeated entrapment in the local minimum and low convergence speed. In this paper, a new version of this algorithm, called Modified Orthogonal Chaotic Colonial Competition (COICA), is proposed. In the policy of absorbing the proposed version, each colony seeks the space to move towards the colonizer through the definition of a new orthogonal vector. Also, the possibility of selecting powerful empires is defined through the boltzmann distribution function, and the selection operation is performed through the roulette wheel method. The proposed multilevel perceptron neural network (MLP) algorithm is used to classify standard datasets, including ionosphere and sonar. To evaluate the performance of this algorithm and to evaluate the generalizability of the trained neural network with the proposed version, the K-Fold cross-validation method has been used. The results obtained from the simulations confirm the reduction of network training error as well as the improved generalizability of the proposed algorithm. Manuscript profile
    • Open Access Article

      6 - Adaptive rotation models and traffic patterns to reduce light loss in networks on optical chip
      bahareh asadi midia reshadi Ahmad khademzade mostafa karbasi
      Large number of processing cores integrated into a single chip have high growth rates. Networks on an optical chip are one of the simplest ways to solve the addressing problem between bulk interconnected networks. That's why high-performance, high-bandwidth multi-proces More
      Large number of processing cores integrated into a single chip have high growth rates. Networks on an optical chip are one of the simplest ways to solve the addressing problem between bulk interconnected networks. That's why high-performance, high-bandwidth multi-processor chips will be needed in the future. Optical chip networks were introduced as a new generation of on-chip networks that overcome all the limitations of this type of network and have many advantages such as high communication bandwidth, low transmission delay. And power consumption is low. On the other hand, networks on optical chips have challenges, one of the most important of which is the routing of optical data in the optical layer, because how the path is selected affects the optical loss factor. In this paper, routing algorithms free from the impasse of adaptive rotational models, circuit switching and various traffic patterns to reduce light loss in the optical layer by considering a 5-port unobstructed router and two-dimensional grid or Mesh will be provided. Finally, we compare the simulation results with similar methods such as the XY-based algorithm and examine the improvements obtained. Manuscript profile
    • Open Access Article

      7 - Provide a framework for enhancing the security of IoT-based smart homes using the IoT-A reference architecture
      Sattar Hashemi shahrouz sotoudeh
      Today, the smart home is one of the main and growing applications of the Internet of Things, which brings comfort, security, reduced energy consumption and cost of living. In addition to the benefits and advantages that this technology has brought, the issue of security More
      Today, the smart home is one of the main and growing applications of the Internet of Things, which brings comfort, security, reduced energy consumption and cost of living. In addition to the benefits and advantages that this technology has brought, the issue of security and privacy has become one of the major concerns that needs serious attention. The IoT-A reference architecture is based on examining existing protocols and resources, ensuring the compatibility of objects and communication protocols, and providing a comprehensive solution for various IoT applications. This paper seeks to provide a general framework for improving security at all levels of design, implementation, and use of equipment and protocols, using the IoT-A reference architecture to address the security challenge of the Internet of Things and smart homes. In this article, the term security framework is used to identify the set of technologies, mechanisms, software and components needed to provide a set of security needs. After examining and mapping vulnerabilities and threats in the architectural application model, this paper presents an improved security framework compared to the standard reference architecture framework. Based on the theoretical evaluation, the new framework, which was formed by adding two components of threat and vulnerability management and field management and making some changes in the licensing component, meets the security requirements of the smart home to an acceptable level and provides an appropriate degree of security and protection. Enhances IoT-A-based smart home privacy. Manuscript profile
    • Open Access Article

      8 - Persian digit recognition system in aerial writing based on depth image
      reza maleki Shahram Mohammadi
      Recognizing handwriting on paper, screen or in the air are some of the challenges in machine vision. Recognizing aerial text has many challenges due to its three-dimensional nature. In this research work, Persian digit recognition is considered in aerial text in which t More
      Recognizing handwriting on paper, screen or in the air are some of the challenges in machine vision. Recognizing aerial text has many challenges due to its three-dimensional nature. In this research work, Persian digit recognition is considered in aerial text in which the user writes the digits zero to nine in front of the Kinect sensor in the air and the system is able to detect the above digits using the sensor depth information. In the proposed system, the k-means automatic clustering method is used to separate the hand and fingertip from the background, the proposed linear slope change method is used to extract the feature, and the hidden Markov model (HMM) category is used to identify the feature and figure. The detection accuracy of the proposed system for Persian cultivars with local database and 10-fold cross-validation is 98%. The proposed system was compared with the results of several similar works, these comparisons show that the proposed system works relatively better than the systems under comparison. Manuscript profile
    • Open Access Article

      9 - Identification and Prioritization of Parameters Affecting Information Security Management System (Case Study: Social Security Branches of Guilan Province)
      Asadollah Shahbahrami ramin rafizadeh kasani hossein pour yousefi dargah
      Information and its protection is one of the most important pillars of survival of today's organizations. Defines and considers many ISMS implementation failures to be rooted in organizational issues and disregard for the organization's readiness prior to implementation More
      Information and its protection is one of the most important pillars of survival of today's organizations. Defines and considers many ISMS implementation failures to be rooted in organizational issues and disregard for the organization's readiness prior to implementation. Therefore, assessing the situation and prioritizing information security risks and creating an overview and hierarchy of it, is important in the successful establishment of the information security system. However, in terms of dimensions, effects and various causes of security risks and considering the multiplicity of indicators and effective parameters of ISMS implementation, it is necessary to use multi-criteria decision-making models in their evaluation and ranking. . In this study, an attempt has been made to classify the factors affecting the information security management system into two groups of soft and hard factors and in order to accurately rank and focus more, especially in conditions of uncertainty that is inherent in human decision making, Fuzzy hierarchical analysis (FAHP) was performed. Based on this and with the help of a questionnaire to quantify the results, the opinions of technical experts including academic experts, managers and employees of the information technology department of social security branches in Guilan province have been used as a case study of this research. The results show that soft factors including managerial and cultural / social factors are more important than hard factors including financial and technical / technological factors in information security management system and management factors are more important than other soft factors as well as technical / technological factors. They are more important than other difficult factors. Manuscript profile
    • Open Access Article

      10 - Discover product defect reports from the text of users' online comments
      narges nematifard Muharram Mansoorizadeh mahdi sakhaei nia
      With the development of Web 2 and social networks, customers and users can share their opinions about different products They leave. These ideas can be used as a valuable resource to determine the position of the product and its success in marketing. Extracting the rep More
      With the development of Web 2 and social networks, customers and users can share their opinions about different products They leave. These ideas can be used as a valuable resource to determine the position of the product and its success in marketing. Extracting the reported shortcomings from the large volume of comments generated by users is one of the major problems in this field of research. By comparing the products of different manufacturers, customers and consumers express the strengths and weaknesses of the products in the form of positive and negative comments. Classification of comments based on positive and negative sensory words in the text does not lead to accurate results without reference to documents containing a defect report. Because defects are not reported solely in negative comments. It is possible for a customer to feel positive about a product and still report a defect in their opinion. Therefore, another challenge of this research field is the correct and accurate classification of opinions. To solve these problems and challenges, this article provides an effective and efficient way to extract comments containing product defect reports from users' online comments. For this purpose, stochastic forest classifiers were used to identify the defect report and the unattended thematic modeling technique used the Dirichlet hidden allocation to provide a summary of the defect report. Data from the Amazon website has been used to analyze and evaluate the proposed method. The results showed that random forest has an acceptable performance for defect reporting even with a small number of educational data. Results and outputs extracted from documents containing the defect report, including a summary of the defect report to facilitate manufacturers' decision making, finding patterns of the defect report in the text automatically, and discovering the aspects of the product that reported the most defects Related to themDemonstrates the ability of Dirichlet's latent allocation method. Manuscript profile
    • Open Access Article

      11 - Determining the factors affecting the collective financing of knowledge-based IT companies
      Ali Haji Gholam Saryazdi ali rajabzadeh ghotri alinaghi mashayekhi alireza hassanzade
      The method of crowdfunding in the world has expanded rapidly due to the need for financing in the early stages of start-up businesses as well as advances in information technology. In Iran, several financing platforms have been established so far, some of which have bee More
      The method of crowdfunding in the world has expanded rapidly due to the need for financing in the early stages of start-up businesses as well as advances in information technology. In Iran, several financing platforms have been established so far, some of which have been successful and some of which have been unsuccessful. Therefore, it is necessary to help the development of this method by examining the factors affecting it. Since mass financing is a new and new phenomenon, it is necessary to increase its awareness in the society in an appropriate way while determining the factors affecting this method. The collective modeling method is based on social networks and the Web 2 with the aim of recognizing new phenomena. Therefore, in this article, using collective modeling, the factors affecting crowdfunding in Iran in order to support start-up companies in the field of IT are discussed. Manuscript profile
    • Open Access Article

      12 - Provide methodology for selecting IT project management strategy
      mona jamipour Seyed Mohammadbagher Jafari marziye nasrollahi
      The strategic approach to project management is a new approach that has received more and more attention from business thinkers in the last decade. Having a strategic approach in the field of information technology projects requires managers to choose the right strategy More
      The strategic approach to project management is a new approach that has received more and more attention from business thinkers in the last decade. Having a strategic approach in the field of information technology projects requires managers to choose the right strategy in the first step of project management, taking into account several factors influencing the choice of strategy. Logical and adaptive approaches are the two dominant strategies in project management, each of which requires different tools, resources, and procedures. Despite the increase in investment in IT projects and the dependence of organizations on such technologies, still No study has been conducted to assist IT managers in choosing the appropriate strategy for such projects. Therefore, the main purpose of this study is to identify the approach of selecting the appropriate strategy in the management of information technology projects. In order to achieve this goal, in the first stage, in order to identify the factors influencing the choice of IT project management strategy, after a comprehensive review of the literature in the relevant field, the opinions of experts in the focus group have been used. In the second stage, in order to validate the extracted factors, and in the third stage, in order to weight each of the factors in selecting the two dominant logical and comparative approaches, experts are surveyed using the survey method. In the developed methodology, the factors that influence the choice of strategy are: process factors, human factors, system related factors and contextual factors. The final strategy of IT project management is obtained as a range of logical strategy and adaptive strategy Manuscript profile
    • Open Access Article

      13 - Design of FPGA-based processor for SHA-2 series cryptographic algorithms Design ترجمه‌های design اسمفراوانی طرح plan, design, layout, project, scheme, plot نقشه map, plan, plot, scheme, plat, chart زمینه background, context, ground, setting, base, terrain تدبیر measure, plan, contraption, gimmick, contrivance, scheme قصد intention, intent, purpose, attempt, will, determination طراح ریزی design خیال imagination, phantom, illusion, thought, fiction, mind فعل طرح کردن design, plan, draft, draw, lay, bring forth قصد کردن attempt, decide, design, meditate تخصیص دادن allot, allocate, apportion, consecrate, give, design تدبیر کردن devise, contrive, meditate, compass, machinate, design تعریف‌های design اسم ۱ a plan or drawing produced to show the look and function or workings of a building, garment, or other object before it is built or made. he has just unveiled his design for the new museum مترادف‌ها: planblueprintdrawingscale drawingsketchoutlinemapplotdiagramdelineationdraftdepictionrepresentationartist's impressionschememodelprototypeproposal ۲ an arrangement of lines or shapes created to form a pattern or decoration. pottery with a lovely blue and white design مترادف‌ها: patternmotifdevicestylearrangementcompositionmakeuplayoutconstitutionconfigurationorganizationconstructionshapeformformationfigure purpose, planning, or intention that exists or is thought to exist behind an action, fact, or material object. the appearance of design in the universe مترادف‌ها: intentionaimpurposeplanintentobjectiveobjectgoalendtargetpointhopedesirewishdreamaspirationambitionidea فعل ۱ decide upon the look and functioning of (a building, garment, or other object), by making a detailed drawing of it. a number of architectural students were designing a factory مترادف‌ها: plandraw plans ofdrawsketchoutlinemap outplotblock outdelineatedraftdepictinventoriginatecreatethink upcome up withdeviseformformulateconceivemakeproducedevelopfashionfabricateforgehatchcoindream up مترادف design اسم planpatternintention فعل planinventdream upintend ۹۱ مترادف دیگر
      neda sedghahrabi Mohammad Ali Jabraeil Jamali
      Secure decryption algorithms are a type of cryptographic algorithms whose importance in today's society has been highlighted by applications such as the use of personal digital tools to maintain confidentiality. On the other hand, with the advancement of technology, the More
      Secure decryption algorithms are a type of cryptographic algorithms whose importance in today's society has been highlighted by applications such as the use of personal digital tools to maintain confidentiality. On the other hand, with the advancement of technology, the need to implement these algorithms on flexible platforms can be challenging. Reducing the area and speeding up the execution of operations are the main challenges for designing and implementing these algorithms. This paper proposes a new architecture for the FPGA-based processor for SHA-2 series cryptographic algorithms. In the proposed processor, the use of memory units and multi-port data path, followed by parallel processor performance, has reduced the use of resources and increased the speed of data processing. Processor architecture for SHA-2 cryptographic algorithms is modeled in VHDL and implemented on the FPGA platform in the Virtex series by ISE software. Implementation results show that the proposed compact processor compared to previous tasks with similar objectives, was able to increase the operating frequency for the SHA-256 cryptographic algorithm by 25% and occupy 55% less space for the SHA-512 cryptographic algorithm to the desired level of operational power and efficiency. Also maintain. The proposed processor is suitable for applications such as trusted mobile platforms (TMP), digital currency (Bitcoin) and secure on-chip network routing (NoC). Manuscript profile
    • Open Access Article

      14 - Learning to Rank for the Persian Web Using the Layered Genetic Programming
      Amir Hosein Keyhanipour
      Learning to rank (L2R) has emerged as a promising approach in handling the existing challenges of Web search engines. However, there are major drawbacks with the present learning to rank techniques. Current L2R algorithms do not take into account to the search behavio More
      Learning to rank (L2R) has emerged as a promising approach in handling the existing challenges of Web search engines. However, there are major drawbacks with the present learning to rank techniques. Current L2R algorithms do not take into account to the search behavior of the users embedded in their search sessions’ logs. On the other hand, machine-learning as a data-intensive process requires a large volume of data about users’ queries as well as Web documents. This situation has made the usage of L2R techniques questionable in the real-world applications. Recently, by the use of the click-through data model and based on the generation of click-through features, a novel approach is proposed, named as MGP-Rank. Using the layered genetic-programming model, MGP-Rank has achieved noticeable performance on the ranking of the English Web content. In this study, with respect to the specific characteristics of the Persian language, some suitable scenarios are presented for the generation of the click-through features. In this way, a customized version of the MGP-Rank is proposed of the Persian Web retrieval. The evaluation results of this algorithm on the dotIR dataset, indicate its considerable improvement in comparison with major ranking methods. The improvement of the performance is particularly more noticeable in the top part of the search results lists, which are most frequently visited by the Web users. Manuscript profile
    • Open Access Article

      15 - Scheduling tasks in cloud environments using mapping framework - reduction and genetic algorithm
      nima khezr nima jafari novimipour
      Task scheduling is a vital component of any distributed system such as grids, clouds, and peer-to-peer networks that refer tasks to appropriate resources for execution. Common scheduling methods have disadvantages such as high time complexity, inconsistent execution of More
      Task scheduling is a vital component of any distributed system such as grids, clouds, and peer-to-peer networks that refer tasks to appropriate resources for execution. Common scheduling methods have disadvantages such as high time complexity, inconsistent execution of input tasks, and increased program execution time. Exploration-based scheduling algorithms to prioritize tasks from Manuscript profile
    • Open Access Article

      16 - A greedy new method based on the cascade model to calculate maximizing penetration in social networks
      Asgarali Bouyer Hamid Ahmadi
      In the case of penetration maximization, the goal is to find the minimum number of nodes that have the most propagation and penetration in the network. Studies on maximizing penetration and dissemination are becoming more widespread. In recent years, many algorithms hav More
      In the case of penetration maximization, the goal is to find the minimum number of nodes that have the most propagation and penetration in the network. Studies on maximizing penetration and dissemination are becoming more widespread. In recent years, many algorithms have been proposed to maximize the penetration of social networks. These studies include viral marketing, spreading rumors, innovating and spreading epidemics, and so on. Each of the previous studies has shortcomings in finding suitable nodes or high time complexity. In this article, we present a new method called ICIM-GREEDY to solve the problem of maximizing penetration. In the ICIM-GREEDY algorithm, we consider two important criteria that have not been considered in the previous work, one is penetration power and the other is penetration sensitivity. These two criteria are always present in human social life. The proposed method is evaluated on standard datasets. The obtained results show that this method has a better quality in finding penetrating nodes in 30 seed nodes than other compared algorithms. This method also performs better in terms of time compared to the comparative algorithms in terms of relatively fast convergence. Manuscript profile
    • Open Access Article

      17 - Content and structural analysis of online forums in order to extract users' social relationships and use them in grouping mechanisms.
      Fatemeh  Orojie fataneh taghiyareh
      Today, thanks to the growth and development of communication and information technologies, online learning systems have been able to provide group learning facilities and space for interaction and exchange of ideas between learners. This requires the formation of effect More
      Today, thanks to the growth and development of communication and information technologies, online learning systems have been able to provide group learning facilities and space for interaction and exchange of ideas between learners. This requires the formation of effective learning groups and the provision of learner participation tools in online learning environments, which is rarely seen in existing systems that use virtual learning centers. In this article, the content and structure of the discussion forums have been examined. Content analysis has been done in order to match the content of the discussions with the objectives of the forum and to extract the areas of interest of the participants. While expressing the achievements of the social network analysis of an academic learning environment, the researchers have presented a solution for extracting the social relationships of people through the structural analysis of discussion forums in an online learning environment. Also, they have presented a method to use the extracted relationships in the mechanisms of grouping learners and evaluated its efficiency. Different parts of this research have been conducted in different courses in consecutive semesters and its achievements can be used to improve collaborative learning activities in online and blended learning environments. Manuscript profile
    • Open Access Article

      18 - Teaching in a multimedia style and its effect on learning and memorizing the grammatical structure of the English language
      saied asadi elham GHobadi
      Educational multimedia has changed the traditional methods of education. But their impact requires careful design based on the objectives of the lesson and the abilities of their users. In the current research, the effect of educational multimedia on learning and memori More
      Educational multimedia has changed the traditional methods of education. But their impact requires careful design based on the objectives of the lesson and the abilities of their users. In the current research, the effect of educational multimedia on learning and memorizing the grammatical structure (grammar) of the English language has been studied. For this purpose, a researcher-made software was designed for teaching grammar and it was studied in the experimental group and its results were compared with regular classes. The statistical population was first grade female middle school students in Tehran city, which was randomly selected by multi-stage cluster sampling method, first in district 8, and then in a sample school, two groups of first grade middle school students, one group as The experimental group and one group were selected as the control group, each consisting of 55 students. This research is a quasi-experimental method and descriptive and inferential statistics have been used to analyze the data. The control group underwent traditional language training in the classroom, and at the same time, the experimental group experienced three grammar training sessions on the school's computer site using the software developed by the researcher. The results of the research showed an increase in learning and memorization of grammatical structure at the level of 0.05 in the group using educational multimedia in comparison with the control group, which finally confirms the effect of multimedia on learning and memorizing English grammar. Manuscript profile
    • Open Access Article

      19 - Evaluation of e-learning with optimal mining approach 1 case study: Iran's higher education
      abbas anarinejad aliakbar safavi farshad moradi
      The general purpose of this article is to evaluate e-learning in Iran's higher education using the optimal mining approach. The statistical population studied included the students of four universities that provide electronic education in Iran (A, B, C and D) and 702 of More
      The general purpose of this article is to evaluate e-learning in Iran's higher education using the optimal mining approach. The statistical population studied included the students of four universities that provide electronic education in Iran (A, B, C and D) and 702 of them were selected by cluster sampling. The research tool included a researcher-made questionnaire consisting of the dimensions of e-learning (including organization and management, technology, educational aspects, presentation environment design, support services, evaluation, and ethical and legal considerations), which after calculating its validity and reliability among students Sample distribution and using the statistical methods of analysis of variance and Sheffe's post hoc test, the obtained data were analyzed. The results showed that "D" University, having the highest average in all dimensions, had the best situation compared to other universities, and among the other three universities; University "B" was superior in five dimensions and University "C" in two dimensions of the seven dimensions of e-learning. In addition, optimal mining can be used more by examining and testing processes and models in other universities and adapting their techniques and approaches. Manuscript profile
    • Open Access Article

      20 - Improving the entrepreneurial skills of Hastan-nagar capital by using the entrepreneurship training portal
      Maryam Tayfeh-Mahmoudi Mahtab Payvast Mahdi Mohsenie Mahmod Kharate sima babadi
      Today, organizational portals play a key role in the diffusion and execution of organizational information in different dimensions and layers. Meanwhile, educational portals are of special importance in terms of improving the knowledge and skills of organizational users More
      Today, organizational portals play a key role in the diffusion and execution of organizational information in different dimensions and layers. Meanwhile, educational portals are of special importance in terms of improving the knowledge and skills of organizational users (and employees) in realizing entrepreneurial business. Considering the national expansion, the variety of jobs in the field of entrepreneurship and also the parameters that somehow affect the design process of these portals, creating a mechanism that can provide a portal with a significant ability to improve entrepreneurship skills has a special priority. . This importance requires that the necessary features for the effective design of such portals be considered. In this article, an approach is presented according to which the expected features in the design of an educational portal are represented in the form of an ontology, and subsequently it is explained how these features can help to realize entrepreneurial business on the one hand, and entrepreneurial education on the other hand. lead to In the end, the possibility of the proposed approach in the form of two practical scenarios of starting a business in the field of agriculture and a guide for writing a business plan in the context of entrepreneurship education will be analyzed and investigated. Manuscript profile
    • Open Access Article

      21 - Presenting a model for extracting information from text documents, based on text-mining in the field of e-learning
      AhmadAgha kardan Mina Kaihani nejad
      ۱٬۵۸۱ / ۵٬۰۰۰ When computer networks became the mainstay of science and economics, a large amount of documentation became available. For this purpose, text mining methods are used to extract useful information. Text mining is an important research field in discovering More
      ۱٬۵۸۱ / ۵٬۰۰۰ When computer networks became the mainstay of science and economics, a large amount of documentation became available. For this purpose, text mining methods are used to extract useful information. Text mining is an important research field in discovering unknown information, hypotheses, and new facts by extracting information from various documents. Also, text mining is revealing hidden information using a method that shows the ability to deal with a large number of words and structures in natural language on the one hand, and allows the management of ambiguity and doubt on the other hand. In addition, text mining is defined as data mining of text, which is equivalent to text analysis and deals with the process of extracting information from text and extracting high quality information from patterns and processes. It is also known as text data mining or knowledge discovery from text databases and is defined as the process of extracting patterns or knowledge from text documents. The research method in this work is as follows: firstly, the research conducted in the field of text mining was investigated with an emphasis on its methods and applications in electronic education. During these studies, related researches were classified in the field of e-learning. After classifying the researches, issues and solutions related to the issues raised in those works were extracted. In this regard, in this article, the definition of text mining will be discussed first. Then the process of text mining and the fields of application of text mining in e-learning are examined. In the following, text mining methods are introduced and each of these methods is discussed in the field of electronic education. At the end, while deducing the important points of the conducted studies, a model for extracting information for the use of text mining methods in e-learning is proposed. Manuscript profile
    • Open Access Article

      22 - Modification of medium transfer detector for target tracking with variable radiation pattern
      Payman Moallem عليرضا  معمارمقدم جواد  عباس پور masoud kavoshtehrani
      One of the conventional methods in the field of image tracking of non-rigid targets is to use a repetitive procedure called average transfer in determining the central mode position of the target. The display of the target in the average transfer tracker is based on the More
      One of the conventional methods in the field of image tracking of non-rigid targets is to use a repetitive procedure called average transfer in determining the central mode position of the target. The display of the target in the average transfer tracker is based on the histogram of spatial interpolation feature with a direction-independent kernel. The most critical challenge in the medium transfer detector is the kernel scaling. So far, no efficient and perfect method to adjust or adapt the kernel dimensions when the target dimensions change has been presented. Another problem of the average transmission detector occurs when facing a target with a variable radiation pattern. In this article, with the approach of solving these problems, the average transmission tracking algorithm with strong adaptive scaling is presented, while it solves the problem of the average transmission algorithm in the face of changes in the radiation pattern of the target by adapting the target model in each frame. In the proposed method, the dimensions of the window in the next frame are set first by using the power calculation method resulting from the time-space derivatives of the intensity of the image pixels. Then, the results of the window scaling in the next frame are applied to the average transfer detector. The results show that the use of the proposed algorithm, while reducing the target positioning error in comparison with the standard average transfer algorithm, also shows a significant efficiency against the changes of contrast 2 and target radiation pattern. Manuscript profile
    • Open Access Article

      23 - Determining optimal support vector machines in classification of hyperspectral images based on genetic algorithm
      farhad samadzadegan Hadis Hasani
      ۱٬۳۸۵ / ۵٬۰۰۰ Today, hyperspectral images are considered a powerful and efficient tool in remote sensing due to the wealth of spectral information and provide the possibility of distinguishing between similar complications. Considering the stability of support vector m More
      ۱٬۳۸۵ / ۵٬۰۰۰ Today, hyperspectral images are considered a powerful and efficient tool in remote sensing due to the wealth of spectral information and provide the possibility of distinguishing between similar complications. Considering the stability of support vector machines in spaces with high dimensions, they are considered a suitable option in the classification of hyperspectral images. Nevertheless, the performance of these classifiers is influenced by their input parameters and feature space. In order to use support vector machines with the highest efficiency, the optimal values ​​of the parameters and also the optimal subset of the input features should be determined. In this research, the ability of the genetic algorithm as a meta-heuristic optimization technique has been used in determining the optimal values ​​of support vector machine parameters and also selecting the subset of optimal features in the classification of hyperspectral images. The practical results of applying the above method on the hyperspectral data of AVIRIS sensor show that the input features and parameters each have a great effect on the performance of support vector machines, but the best performance of the classifier is obtained by solving them simultaneously. In the simultaneous solution of parameter determination and feature selection, for Gaussian kernel and polynomial, 5% and 15% increase in accuracy was achieved by removing more than half of the image bands. Also, the gradual cooling simulation optimization algorithm was implemented in order to compare with the genetic algorithm, and the results indicate the superiority of the genetic algorithm, especially with the large and complicated search space in the simultaneous solution approach of parameter determination and feature selection. Manuscript profile
    • Open Access Article

      24 - Segmentation of exterior color images for the purpose of object recognition using histogram with double accuracy
      javad rasti amirhasan Monjimie abbas vafaei
      One of the important issues in the automatic processing of external images is how to divide these images for the purpose of recognizing something in them. The special characteristics of these images, including color diversity, different light effects, the presence of co More
      One of the important issues in the automatic processing of external images is how to divide these images for the purpose of recognizing something in them. The special characteristics of these images, including color diversity, different light effects, the presence of colored shadows, many texture details, and the existence of small and heterogeneous objects, make the problem of segmentation of external images, especially color segmentation, face serious challenges. In previous researches, a method based on the k-means clustering algorithm was proposed in a multi-accuracy bed for color clustering of external images for the purpose of primary segmentation. This method uses deliberate blurring of image textural details and removal of specific classes in blurred images and then added The classification of classes in images with higher accuracy showed a suitable performance for the initial segmentation of these images in comparison with the normal k-means method. In this article, an image-adaptive method using the ring histogram of the dark color to identify specific classes in blurred images in the bed is presented. It has been proposed with double precision. The efficiency of this algorithm has been investigated with the help of a supervised evaluation method on two databases of external images, which shows a 20% reduction in pixel error in segmentation, as well as a 30% higher accuracy and speed in the convergence of the clustering algorithm, indicating a higher quality. The proposed method is better than the normal method. Manuscript profile
    • Open Access Article

      25 - Reinforcement of the central axis of tubular structures and its application in extracting the central axis of the portal vein
      amirhossein forouza reza aghaeizade یوشی¬نبو  ساتو ماساتوشی  هوری
      In this article, by presenting a new description of the characteristic of the central axis points of tubular structures, a method to strengthen these structures is proposed. In this method, in a multi-scale framework and using special vectors of the Hessian matrix of th More
      In this article, by presenting a new description of the characteristic of the central axis points of tubular structures, a method to strengthen these structures is proposed. In this method, in a multi-scale framework and using special vectors of the Hessian matrix of the image points, we obtain the distance of each point from the edges of the image. For the points located on the central axis, this distance from the bisector of any arbitrary direction is symmetrical. In this step, by sampling the distance of each point from the edges of the image in different directions, we assign a greater value to the points that have more symmetry. In the next step, we use a filter based on the Pock method to strengthen the central axis of the tubes. The evaluation of the proposed method has been done using two-dimensional and three-dimensional phantom images and medical data qualitatively and quantitatively with the criteria of maximum error in determining the central axis and detection rate, which shows the advantage of this method over the existing methods. Manuscript profile
    • Open Access Article

      26 - پردازش تصاویر ورق های فولادی به منظور آشکارسازی عیوب به کمک موجک گابور
      Mostafa Sadeghie masoud shafiee
      In different stages of steel production, many defects appear on the surface of the sheet. Regardless of the causes of failures, accurate detection of their types helps to correctly classify the steel sheet and thus occupies a high percentage of the quality control proce More
      In different stages of steel production, many defects appear on the surface of the sheet. Regardless of the causes of failures, accurate detection of their types helps to correctly classify the steel sheet and thus occupies a high percentage of the quality control process. Quality control of steel sheets is of great importance in order to improve product quality and maintain a competitive market. In this article, while reviewing the used image processing techniques, by using image processing with the help of two-dimensional Gabor wavelet, a fast and high-accuracy solution is presented for revealing textural defects of steel sheets. At first, using Gabor wavelet, it extracts significant textural features from the images, which includes both different directions and different frequencies. Then, using the statistical method, the images that contain the defects are selected more clearly and the location of the defect is determined. By presenting test samples, the accuracy and speed of the method used have been shown. Manuscript profile
    • Open Access Article

      27 - Routing of Multipartite Computer Networks Using Ant Genetic Algorithm
      Mohammad Pourmahmood Aghababa amin bahadorani baghbaderani
      With the growth and development of computer networks, the importance of routing has become a thing of the past. The importance of using multi-sectoral networks cannot be ignored today. Many multimedia applications require sending a packet from one source to multiple des More
      With the growth and development of computer networks, the importance of routing has become a thing of the past. The importance of using multi-sectoral networks cannot be ignored today. Many multimedia applications require sending a packet from one source to multiple destinations over a communication network. To support such programs, you need to create an optimal multipart tree , Which indicates the optimal routes to reach from one sender source to several desired destinations. Manuscript profile
    • Open Access Article

      28 - Classify and implement hardware trojans and provide a new way to detect them
      sadegh hajmohseni mohammadali doustari mohammadbagher ghaznavi
      In recent years, a type of hardware attack called hardware trojan has been introduced, which the hostile person prepares to achieve his goal by malicious changes on the chip. The purpose of these attacks is to disable the chip, change specifications, and obtain sensitiv More
      In recent years, a type of hardware attack called hardware trojan has been introduced, which the hostile person prepares to achieve his goal by malicious changes on the chip. The purpose of these attacks is to disable the chip, change specifications, and obtain sensitive information. Manuscript profile
    • Open Access Article

      29 - A model for improving banking services using customer knowledge management and mobile banking and examining its impact on customer loyalty in Bank Mellat
      narges rezaei Mohammad rezaei
      With the development of new communication technologies, the use of information technology has been proposed as a success factor in developing organizations. One of the most important industries that must adapt to technological changes is the banking industry. The practi More
      With the development of new communication technologies, the use of information technology has been proposed as a success factor in developing organizations. One of the most important industries that must adapt to technological changes is the banking industry. The practical capabilities of some private banks in attracting and retaining customers have made them a top priority for investment. The purpose of this study is to investigate the effect of customer knowledge management and mobile banking on improving banking services and customer loyalty. Bank Mellat was selected as a statistical population with 180 service management experts and 130 simple questionnaires were distributed among the sample using simple random sampling. 120 acceptable questionnaires were referred. Structural equation model was selected for data analysis. The results indicate the positive and direct impact of knowledge management and mobile banking on improving the services provided and customer loyalty. Manuscript profile
    • Open Access Article

      30 - Improving recommender systems with the help of Semantic Web
      rahele beheshti mohammad ebrahim samie ali hamze
      In order to provide for the necessities of life, human beings always use the advice and suggestions of others, which are provided orally or in writing, and take them into account in their decisions. Today, with the advancement of technology and the expansion of e-busine More
      In order to provide for the necessities of life, human beings always use the advice and suggestions of others, which are provided orally or in writing, and take them into account in their decisions. Today, with the advancement of technology and the expansion of e-business in the context of Internet websites, a new chapter of digital life has begun with the help of advisory systems. The most important goal in these systems is to attract customers and gain their trust by offering the best and most appropriate offer to buy products, according to their interests and tastes in the midst of a multitude of choices. In this research, an attempt has been made to extract information related to the field of film with the help of connections in DBpedia's ontology. Then the structure of the recommender system is designed and implemented and with the help of the information available in the MovieLens database, the performance of the recommender system is evaluated. According to the evaluations, the proposed model is more efficient among other methods that somehow use the semantic web. Manuscript profile
    • Open Access Article

      31 - Provide a basic method for estimating software projects based on logical transactions
      mehrdad shahsavari ali mahjour
      In this study, in order to determine the level of visual attention of users to the right menu and to the left menu of web pages, the number of dazzles on the right and left menu was measured using an eye tracker to determine which menu is preferable to users in terms of More
      In this study, in order to determine the level of visual attention of users to the right menu and to the left menu of web pages, the number of dazzles on the right and left menu was measured using an eye tracker to determine which menu is preferable to users in terms of visual attention. contract. Method: 116 pages containing two right and left menus were displayed in the form of 3 sets of Persian-English and English-Persian for 30 subjects and the subjects were required to find a word in the menus. Data related to the number of users' dazzle on each menu, which was an indication of their visual attention to that menu, was recorded and collected using the gaze tracker. Results: The total number of user idiots on the menus of the English collection did not differ according to the order of the menus (right or left). But the total number of user wonders on the menus of the Persian collection, the Persian-English collection and in general in all the pages of the three collections was different due to the jump in the arrangement of the menus (right or left) and on the right menu more than the left menu. Conclusion: Considering the higher number of dumbbells on the right menu in this study and the proven advantages of the right menu, as well as the fact that the advantage of having a left-hand menu in China has been in cultures whose mother tongue is read from left to right. Although the results of previous studies on the high speed of homework and interaction with the left-hand menu are inconsistent, web designers can be advised to use the right-hand menu when designing native websites. Manuscript profile
    • Open Access Article

      32 - Provide a new architecture for the decision support system to manage stock trading based on a combination of financial indicators
      Masoud Mansoury bijan mansouri S. Alireza hashemi G.
      Financial indicators are often used to analyze the market and predict the future of stocks. But because of the complexity of the stock market, what index to use and how reliable the output of the index used is has always been an issue. In this paper, a hybrid approach i More
      Financial indicators are often used to analyze the market and predict the future of stocks. But because of the complexity of the stock market, what index to use and how reliable the output of the index used is has always been an issue. In this paper, a hybrid approach in the form of a decision support system is used to offer the best stocks to buy or sell. The best stocks are selected from a set of stocks using a set of financial indicators. Each of these indicators acts as a model and shows its status in the future, given the stock situation in the past. Therefore, using a combination of indicators allows us to make decisions with more certainty. The efficiency of this system has been evaluated on the Iranian stock market data collection collected from 2001 to 2011. The results show that the indicators used and the combined use of them have led to the decision support system to produce proposals with high accuracy Manuscript profile
    • Open Access Article

      33 - Investigating the Effect of Hardware Parameters Adjustments on Energy Consumption in Thin Matrix Multiplication Algorithm on GPUs
      mina ashouri Farshad Khunjush
      Multiplication of thin algorithmic matrices is a simple but very important part of linear and scientific algebra programs in mathematics and physics, and due to its parallel nature, GPUs are one of the most suitable and important options. To select its executive platfor More
      Multiplication of thin algorithmic matrices is a simple but very important part of linear and scientific algebra programs in mathematics and physics, and due to its parallel nature, GPUs are one of the most suitable and important options. To select its executive platform. In recent years, due to the emphasis of researchers to consider energy consumption as one of the main design goals along with efficiency, very little effort has been made to improve the energy consumption of this algorithm on the GPU. In this article, this issue is addressed from the perspective of energy efficiency in efficiency obtained. Utilizing the configuration capability introduced in modern GPUs, by statistically examining the behavior of this algorithm when using different thin matrix storage formats and different hardware settings for more than 200 matrices Slim example, the best configuration settings for the thin matrix multiplication algorithm with different storage formats on the GPU are obtained. This configuration for each storage format is selected to give the best configuration in all samples tested. Manuscript profile
    • Open Access Article

      34 - Provide a conceptual model to identify the quality of electronic services in the country's online stores
      marziye rahmani Mohammad Fathian saied yaghoubi
      This study explains the gap in scientific studies in the field of localization of factors affecting the quality of electronic services in the country's online stores, to present a conceptual model using structural equation modeling. This is a quantitative survey study i More
      This study explains the gap in scientific studies in the field of localization of factors affecting the quality of electronic services in the country's online stores, to present a conceptual model using structural equation modeling. This is a quantitative survey study in which a structured questionnaire is distributed among the buyers of three online stores. Cronbach's alpha is used to evaluate the reliability, heuristic factor analysis to classify sub-indicators and confirmatory factor analysis to examine the validity of the structure and the variables and resulting indices. Manuscript profile
    • Open Access Article

      35 - Door detection based on car vision in outdoor scenes
      abbas vafaei Mehdi Talebi monadjemi monadjemi
      Doors are an important sign for blind people and robots to enter and leave the building. Detection of doors in outdoor environments has become one of the most difficult issues in computer vision; Because usually in outdoor doors, the features of a simple door such as ha More
      Doors are an important sign for blind people and robots to enter and leave the building. Detection of doors in outdoor environments has become one of the most difficult issues in computer vision; Because usually in outdoor doors, the features of a simple door such as handles, corners and empty space between the door and the floor are not obvious. In this article, a method for detecting doors in outdoor environments is presented. After extracting the lines and removing the extra lines, the area between the vertical lines is formed and the characteristics of each area including height, width, location, color, texture and number of lines inside the area are extracted. Additional knowledge such as the presence of the door at the bottom of the image, the reasonable height and width of the door, and the difference in color and texture of the door with the surrounding area are then used to determine the presence of the door. This method has been tested on our eTRIMS image collection and our image collection, including doors of houses, apartments and shops, and the presented results show the superiority of the proposed method over the previous methods. Manuscript profile
    • Open Access Article

      36 - New changes of local binary pattern and classification and segmentation of texture images of the seabed
      Babak Goodarzi Javidan Javidan Mohammad Javad Dehghani
      Texture analysis plays an important role in image processing. Due to the highly textured appearance of sonar images, texture analysis methods are a suitable choice for analyzing sea acoustic images. The local binary pattern operator is a very effective multi-resolution More
      Texture analysis plays an important role in image processing. Due to the highly textured appearance of sonar images, texture analysis methods are a suitable choice for analyzing sea acoustic images. The local binary pattern operator is a very effective multi-resolution texture descriptor. This descriptor obtains appropriate information from changing brightness and image states. Although many extensions of local binary pattern have been proposed, existing local binary pattern operators are sensitive to noise. Also, sometimes they lead to the description of different structural patterns with homogeneous binary code, which inevitably reduce their discriminability. This research provides an overview of the local binary pattern method, which includes several of the newer variables. Then, to overcome the inefficiencies of various types of local binary patterns, a robust binary pattern framework called robust local binary pattern is presented, in which the value of each central pixel is replaced by the average gray intensity values ​​of houses from a three by three square. The proposed method is a fast tool with high accuracy in classifying seabed images, and comparing the simulation results with other well-known methods shows the efficiency of the proposed algorithm. Manuscript profile
    • Open Access Article

      37 - Providing a suitable method for categorizing promotional e-mails based on user profiles
      Mohammad fathiyan rahim hazratgholizadeh
      In general, the definition of spam is related to the consent or lack of consent of the recipient, not the content of the e-mail. According to this definition, problems arise in the classification of electronic mails in marketing and advertising. For example, it is possi More
      In general, the definition of spam is related to the consent or lack of consent of the recipient, not the content of the e-mail. According to this definition, problems arise in the classification of electronic mails in marketing and advertising. For example, it is possible that some promotional e-mails are spam for some users and not spam for others. To deal with this problem, personal anti-spams are designed according to the profile and behavior of users. Usually, machine learning methods are used with good accuracy to classify spam. But in any case, there is no single successful method based on the point of view of e-commerce. In this article, first, a new profile is prepared to better simulate the behavior of users. Then this profile is presented to students along with emails and their responses are collected. In the following, well-known methods are tested for different data sets to categorize electronic mails. Finally, by comparing data mining evaluation criteria, neural network is determined as the best method with high accuracy. Manuscript profile
    • Open Access Article

      38 - Extracting hospital information technology architecture with the approach of implementation capability in Iran
      hossein bobarshad Atefehsadat Haghighathoseini Hadi Zare
      Today, providing smart and fast services to patients and moving towards next generation hospitals is one of the necessities of the health field. Preparing information architecture for hospitals is a prelude to obtaining intelligent services and, as a result, providing s More
      Today, providing smart and fast services to patients and moving towards next generation hospitals is one of the necessities of the health field. Preparing information architecture for hospitals is a prelude to obtaining intelligent services and, as a result, providing services with much higher speed and quality than traditional systems. In this article, the aim was to provide a native information architecture based on important criteria and indicators in Iranian hospitals. In this article, TOGAF information technology architecture is used and then this architecture is localized according to the local conditions of Iran for Shariati Hospital. For this purpose, a 134-question questionnaire was used from the experts' point of view and it was analyzed based on appropriate statistical tests. In this article, information technology architecture was designed in the form of a conceptual model with four inputs and four infrastructure layers. The results showed that among the 134 components of TOGF information technology architecture, 104 components were approved by experts for use in the hospital. This customized framework was called Hospital Information Technology Architecture. The proposed architecture was drawn in eight layers and eleven components and can be used as a local reference architecture for the implementation of information architecture in Iranian hospitals. Manuscript profile
    • Open Access Article

      39 - Presenting a model for using mobile agents in distributed intrusion detection systems based on game theory
      امین نظارات مهدی رجا Gholamhossein Dastghaibyfard
      Network intrusion detection systems are tools used to protect network resources from attacks. Due to the spread of attacks in the Internet space and the change in the form and type of attacks from centralized to distributed, the architecture of such systems is also movi More
      Network intrusion detection systems are tools used to protect network resources from attacks. Due to the spread of attacks in the Internet space and the change in the form and type of attacks from centralized to distributed, the architecture of such systems is also moving towards distribution. In this article, a method based on mobile agents that act as sensors for detecting invalid movements is proposed. Mobile attack detection agents are scattered in the network moving from one node to another and at any time they build a security upper network and use a kind of cooperative game and communicate with each other, after reaching the Shipley value. They can detect and report the extent and origin of the attack. In this article, a method is proposed that WGA in a non-cooperative game with the attacking element tries to establish a revelation communication in order to calculate the value of Nash and reach the maximum utility, so that it can separate the attacks or real requests, the amount and intensity of the attack with Get help from other WGA Manuscript profile
    • Open Access Article

      40 - ۹۳ / ۵٬۰۰۰ Integration of data envelopment analysis model and decision tree in order to evaluate units based on information technology
      Amir Amini علی رضا علی نژاد سمیه  شفقی¬زاده
      Every organization needs an evaluation system to measure this usefulness in order to know the performance and usefulness of its units, and this issue is more important for financial institutions, including companies based on information technology. Data envelopment anal More
      Every organization needs an evaluation system to measure this usefulness in order to know the performance and usefulness of its units, and this issue is more important for financial institutions, including companies based on information technology. Data envelopment analysis is a non-parametric method for measuring the efficiency and productivity of decision making units (DMUs). On the other hand, data mining techniques allow DMUs to explore and discover meaningful information, which was previously hidden in large databases. This paper proposes a general framework combining data envelopment analysis with regression trees to evaluate the efficiency and productivity of DMUs. The result of the hybrid model is a set of rules that can be used by policy makers to discover the reasons for efficient and inefficient DMUs. As a case study using the proposed method to investigate the factors related to productivity, a sample including 18 branches of Iranian insurance in Tehran was selected and after modeling based on the advanced input-oriented LVM model with poor accessibility in data coverage analysis with Undesirable output was calculated and with the decision tree technique, rules are extracted to discover the reasons for productivity increase and productivity regression. Manuscript profile
    • Open Access Article

      41 - Understanding the initial trust of users in social networks
      Mohsen Akbari zahedfar zahedfar zahra eiagh
      ۲٬۱۰۸ / ۵٬۰۰۰ Social networks are one of the types of social media that have been so influential in the lives of internet users in recent years that the forms of social communication have also been influenced by these new media and in the future the role will be far gr More
      ۲٬۱۰۸ / ۵٬۰۰۰ Social networks are one of the types of social media that have been so influential in the lives of internet users in recent years that the forms of social communication have also been influenced by these new media and in the future the role will be far greater. They will play more important. On the other hand, trust is one of the main factors of creating satisfaction and repeating the use of online services by users. Therefore, this research has used the possible expansion model to identify the factors affecting users' initial trust in social networks (Facebook) and states that users change their attitude through two central and lateral paths. Central indicators include information quality and service quality, and peripheral indicators include system quality, structural security, and reputation. Self-efficacy moderates the effects of central cues and peripheral cues on initial trust. The statistical population of this research is Iranian Facebook users. The data needed for the research was collected through the connection with the personal pages of people and public pages (related to groups, cities, activities, universities, etc.) active in this social network. For this purpose, the link of the online questionnaire designed on the docs.google.com website was provided to them. In this questionnaire, a 5-point Likert scale from completely disagree (1) to completely agree (5) was used, and at the end, 406 questionnaires were collected, according to the Jersey and Morgan table, to conduct research in the infinite society. It is desirable. The validity of the questionnaire was obtained by asking experts and university professors and its reliability was determined by calculating Cronbach's alpha and it shows the optimal level of reliability. Data were analyzed with SmartPLS2 statistical software. According to the results obtained, among the independent variables of this research, self-efficacy, reputation, and structural security have the greatest effect on initial trust with path coefficients of 0.47, 0.23, and 0.20, respectively, and system quality has the least effect on initial trust with It has a value of 0.07. Also, the results show that self-efficacy only moderates the effect of system quality on initial trust. Therefore, since self-efficacy, aside from the role of attitude adjustment, directly has the greatest effect on primary trust; Social network designers should pay special attention to this factor; So that it is easy to learn and the process of using it is clear and understandable for users. Manuscript profile
    • Open Access Article

      42 - Optimum modeling of patient satisfaction with the doctor based on machine learning methods
      - شادمهر Zainabolhoda Heshmati Fatemeh saghafi Hadi Veisi
      The patient-centered approach in the field of health has recently been proposed in the field of the medical system of our country, but until now there is no published scientific research on the factors of patient satisfaction with doctors. The present article aims to co More
      The patient-centered approach in the field of health has recently been proposed in the field of the medical system of our country, but until now there is no published scientific research on the factors of patient satisfaction with doctors. The present article aims to cover the stated gap with a scientific evaluation based on the real information obtained from the field study. A questionnaire was designed for the health sector and was approved by the opinion of experts. In order to get the opinions of patients, a questionnaire was distributed among 500 people who underwent rhinoplasty in Tehran, and 395 questionnaires were collected. Three methods of decision tree, support vector machine and neural networks were used for data analysis. The analysis of the results according to the accuracy criteria showed that the most efficient method, in priority, the importance of the factors affecting the patient's satisfaction; Neural network method. The results of the analysis with this method indicate that the most effective feature in the patient's satisfaction with the doctor is the information that the patient expects the doctor to provide. The results of ranking factors in comparison with other studies that only used statistical methods for analysis showed that the results were relatively similar and confirmed each other. But the strengths of the neural network method in modeling is the strength of this method compared to the mentioned studies. Manuscript profile
    • Open Access Article

      43 - Providing a model for evaluating information technology services based on an approach based on information technology governance models
      seyyed ahmad tabatabaei سید کمال  چهارسوق
      oday, one of the biggest problems of information technology organizations in less developed countries is the excessive attention of these organizations to the field of infrastructure and technology. This attention has been up to the point that many managers and organiza More
      oday, one of the biggest problems of information technology organizations in less developed countries is the excessive attention of these organizations to the field of infrastructure and technology. This attention has been up to the point that many managers and organizations consider the existence of up-to-date infrastructure and technologies as a sign of the maturity of the organization's information technology. Although the existence of appropriate technical and infrastructural facilities such as network, hardware, software, etc. is necessary to provide proper services and optimal performance, but these features cannot create a competitive advantage and increase the maturity of the organization. The missing link in these organizations, which has unfortunately received less attention, is how to use these facilities to achieve organizational goals. In different fields, there are many standards and methods for defining and optimizing processes. One of the most important sets of models that should be considered in information technology units are the models and frameworks related to information technology governance. IT governance focuses on implementing and managing the quality of IT services to meet business needs. IT governance is achieved by service providers through the right combination of people, process and IT. The purpose of this article is to examine the different models and frameworks of information technology governance in order to derive a model for the evaluation of information technology services by modeling these frameworks. Manuscript profile
    • Open Access Article

      44 - Providing an optimal method for dispatching an ambulance based on complex networks and artificial intelligence
      مهدی زرکش زاده Zainabolhoda Heshmati Hadi Zare Mehdi Teimouri
      The goal of emergency medical services is to reduce deaths and complications caused by diseases and injuries. Rapid dispatch of emergency services and reduced response time lead to increased survival rates. Response time is one of the important criteria for measuring th More
      The goal of emergency medical services is to reduce deaths and complications caused by diseases and injuries. Rapid dispatch of emergency services and reduced response time lead to increased survival rates. Response time is one of the important criteria for measuring the efficiency of emergency medical services. The usual method of sending ambulances is to send the nearest available unit, which pays attention to efficiency in the short term. One of the methods that has been recently mentioned in the field of ambulance dispatch is based on the analysis of complex networks. The purpose of this method is to send an ambulance to a call that is more central than other calls, which leads to better efficiency in the long run. Other methods in dispatching an ambulance are based on finding the best suitable route for service cars, and the time complexity of these methods is very high. In this article, using a hybrid approach and applying centrality criteria from complex network analysis and search methods based on artificial intelligence, an optimal and innovative method is presented to reduce the response time of emergency services. In addition, in the proposed method, the emergency priority of calls is also considered, which is an important variable in decisions. The proposed method has less limitations than the previous methods and the extensive simulation results confirm the significant improvement of this method compared to the previous methods such as the centrality method and the nearest neighbor method. Manuscript profile
    • Open Access Article

      45 - Key management in digital rights management systems in offline mode
      nafiseh shafiee مهدی  شجری
      Considering the expansion of the use of digital rights management systems, the use of methods such as encryption and encryption, although they have advantages, but they do not meet the requirements of the aforementioned systems responsible for the safe distribution of d More
      Considering the expansion of the use of digital rights management systems, the use of methods such as encryption and encryption, although they have advantages, but they do not meet the requirements of the aforementioned systems responsible for the safe distribution of digital content. In this regard, the need for an alternative or hybrid method to protect digital content from the production stage to the transfer and storage of data in digital rights management systems is undeniable. In this paper, we have proposed a model to improve the performance of digital rights management systems, which is based on multi-part cryptography and not only monitors and controls the publication and distribution of documents, but also by using distinct and unique data in key generation. It also effectively prevents copying. The main difference between the proposed approach and other methods used in this field is the use of obfuscation technique in order to protect the key generation algorithm against reverse engineering attacks. The proposed system covers more security criteria compared to the existing systems in the field of digital rights management. Manuscript profile
    • Open Access Article

      46 - Improving the accuracy of the GMM model in the form of the GMM-VSM system in the application of speech language recognition
      Fahimeh GHasemian Mohamad mahdi Homaion por
      The GMM model is one of the most widely used and successful models in the field of automatic language recognition. In this article, a new model called Adapted Weight-GMM (AW-GMM) is presented. This model is similar to GMM, with the difference that the weight of its comp More
      The GMM model is one of the most widely used and successful models in the field of automatic language recognition. In this article, a new model called Adapted Weight-GMM (AW-GMM) is presented. This model is similar to GMM, with the difference that the weight of its components in the form of GMM-VSM system is determined based on the strength of the components in differentiating one language from other languages. Also, due to the computational complexity in the GMM-VSM system in the case where a 2-component sequence is considered, a technique for constructing a 2-component sequence has been presented, which can be used to construct higher-order sequences as well. used The evaluations carried out on 4 languages ​​English, Persian, French and German from OGI data show the effectiveness of the presented techniques. Manuscript profile
    • Open Access Article

      47 - A matching probability-based flood algorithm for mobile ad hoc networks
      fateme nourazar sabaei sabaei
      The flood algorithm is one of the most important primary operations and infrastructure for routing protocols in mobile ad hoc networks. However, since this algorithm generates many additional messages, it is very costly, it has caused a waste of network bandwidth, consu More
      The flood algorithm is one of the most important primary operations and infrastructure for routing protocols in mobile ad hoc networks. However, since this algorithm generates many additional messages, it is very costly, it has caused a waste of network bandwidth, consuming more energy than the nodes need, which may eventually cause an all-broadcast storm. Many methods have been proposed to improve the flood algorithm, which are mainly divided into two categories of deterministic and probabilistic methods, and the second category has received more attention. But these methods mainly cause delay and lack of complete coverage. In this paper, we have proposed a new method to improve the performance of SIL-ASA algorithm. The basis of this probabilistic replay method is based on local observations. In this new method, the probability of message replay by each node is a function of local observations. The results of the simulation have shown that the proposed method provides complete network coverage in comparison with similar methods while significantly reducing the packet delivery delay with an acceptable message overhead. Manuscript profile
    • Open Access Article

      48 - Training of MLP neural network in image compression using GSA method
      maryam dehbashian hamid zahiri
      One of the important research areas in image processing is image compression. Until now, various methods for image compression have been presented, among which neural networks have attracted many audiences. The most common training method of neural networks is the error More
      One of the important research areas in image processing is image compression. Until now, various methods for image compression have been presented, among which neural networks have attracted many audiences. The most common training method of neural networks is the error backpropagation method, which converges and stops at local optima are considered one of its most important weaknesses. The researchers' new approach is to use innovative algorithms in the process of training neural networks. In this article, a new educational method based on gravity search method (GSA) is introduced. The gravity search method is the latest and newest version of all types of collective intelligence search and optimization methods. In this method, the candidate answers in the search space are objects that are affected by the force of gravity and their positions change. Gradually, objects with better fit have more mass and have a greater effect on other objects. In this research, an MLP neural network is trained for image compression using the GSA algorithm. Manuscript profile
    • Open Access Article

      49 - Semi-blind labeling of images using SVD in the field of discrete wavelet transform
      morteza makhlooghi danyali danyali fardin akhlaghi
      With the rapid development of communication technology and the expansion of the Internet and the significant increase in forgery and unauthorized copying of data, the value of marking is increasing day by day. In this paper, a new semi-blind marking method using singula More
      With the rapid development of communication technology and the expansion of the Internet and the significant increase in forgery and unauthorized copying of data, the value of marking is increasing day by day. In this paper, a new semi-blind marking method using singular value decomposition (Singular Value Decomposition) in the domain of discrete wavelet transform is presented to protect property rights. In the proposed method, first the discrete wavelet transform step is applied to the original image K and its lowest frequency subband is selected as the reference image. Then, by applying a discrete wavelet transformation step to the reference image and the reference image, the unique values ​​of the frequency sub-bands of the converted signal image are embedded in the unique values ​​of the corresponding sub-bands of the reference transformed image. Since in this method, a reference image is needed to recover the sign, and the original image is not needed, therefore it is called a Semi-Blind method. The resistance of the proposed method against different attacks was investigated. The results show that the proposed method is much more resistant to various attacks than similar works, and at the same time, the marked image is more transparent. Manuscript profile
    • Open Access Article

      50 - Sliding mode control for congestion in TCP/IP networks
      roohollah barzamini masoud shafiee
      Congestion phenomenon is one of the important problems faced by computer network designers and in recent years it has reduced the efficiency of networks. So far, various methods have been proposed to prevent and control this phenomenon, which are based on control theory More
      Congestion phenomenon is one of the important problems faced by computer network designers and in recent years it has reduced the efficiency of networks. So far, various methods have been proposed to prevent and control this phenomenon, which are based on control theory. For this purpose, the closed loop structure of the data transfer process in computer networks can be considered in such a way that the controllers from the Dynamic Queue Management (AQM) family are designed to be implemented in the pathfinders of the network and the rest of the network from the point of view of the pathfinder. It is defined as the control target system or plant. In the field of AQM controller design, many researches have been done and many controllers have been designed. In this article, sliding mode control is introduced as AQM controller. Sliding mode control is resistant to modeling uncertainties and disturbances. In sliding mode control, mode paths must reach a predefined level (sliding level) in a limited period of time and remain at the same level over time. Movement on the sliding surface is independent of uncertainties; Therefore, this technique is one of the resistant control methods. After implementing the sliding mode control on the network model, with the help of Matlab software, how the network behaves in the presence of this The controller was examined and the results obtained were compared with the results of several other controllers. Manuscript profile
    • Open Access Article

      51 - Classification of two-level data with hyperrectangles parallel to the coordinate axes
      zahra moslehi palhang palhang
      One of the learning methods in machine learning and pattern recognition is supervised learning. In supervised learning and in two-category problems, the available educational data labels include positive and negative categories. The goal of the supervised learning algor More
      One of the learning methods in machine learning and pattern recognition is supervised learning. In supervised learning and in two-category problems, the available educational data labels include positive and negative categories. The goal of the supervised learning algorithm is to calculate a hypothesis that can separate positive and negative data with the least amount of error. In this article, among all supervised learning algorithms, we focus on the performance of decision trees. The geometric view of the decision tree brings us closer to the concept of separability in computational geometry. Among all the available resolution algorithms related to the decision tree, we raise the problem of calculating the rectangle with the maximum difference of two colors and implement the algorithm in one, two, three and m dimensions, where m represents the number of data features. The implementation result shows that this algorithm is competitive with the well-known C4.5 algorithm. Manuscript profile
    • Open Access Article

      52 - Correcting both camera lens misalignment and image de-centering error using modified Zernik model
      The reduction of image quality in an optical system can depend on different parameters. Some of these parameters are: lens aberration, digitization error and system assembly error. In the field of assembly error, two types of general errors are usually considered: 1) th More
      The reduction of image quality in an optical system can depend on different parameters. Some of these parameters are: lens aberration, digitization error and system assembly error. In the field of assembly error, two types of general errors are usually considered: 1) the non-orthogonality of the image curtain and the optical axis, which is often referred to as the prism error. 2) the error of the optical axis of the lens not passing through the center of the image, which is called It is called de-centering error. Among these, the current article aims to study lens aberration and correct and compensate for its aberration along with eccentricity error. For this purpose, the Seidel misdirections are rewritten in the form of modified Zernike moments based on the second type Chebyshev polynomials as separate functions on the Cartesian space. Then, the rewritten moments are modified in such a way that they also model the phase deviation function by considering the eccentricity error. Finally, the coefficients of the introduced model are classified into two classes, symmetric and asymmetric. Then these coefficients are estimated using multispectral analysis. Tri-coherence analysis was used to estimate the coefficients of symmetrical sentences, and bi-coherence analysis was used for the coefficients of asymmetric sentences. The laboratory results confirm the accuracy and efficiency of the proposed solution. Manuscript profile
    • Open Access Article

      53 - Using web analytics in forecasting the stock price of chemical products group in the stock exchange
      amir daee Omid Mahdi Ebadati E. keyvan borna
      Forecasting markets, including stocks, has been attractive to researchers and investors due to the high volume of transactions and liquidity. The ability to predict the price enables us to achieve higher returns by reducing risk and avoiding financial losses. News plays More
      Forecasting markets, including stocks, has been attractive to researchers and investors due to the high volume of transactions and liquidity. The ability to predict the price enables us to achieve higher returns by reducing risk and avoiding financial losses. News plays an important role in the process of assessing current stock prices. The development of data mining methods, computational intelligence and machine learning algorithms have led to the creation of new models in prediction. The purpose of this study is to store news agencies' news and use text mining methods and support vector machine algorithm to predict the next day's stock price. For this purpose, the news published in 17 news agencies has been stored and categorized using a thematic language in Phoenician. Then, using text mining methods, support vector machine algorithm and different kernels, the stock price forecast of the chemical products group in the stock exchange is predicted. In this study, 300,000 news items in political and economic categories and stock prices of 25 selected companies in the period from November to March 1997 in 122 trading days have been used. The results show that with the support vector machine model with linear kernel, prices can be predicted by an average of 83%. Using nonlinear kernels and the quadratic equation of the support vector machine, the prediction accuracy increases by an average of 85% and other kernels show poorer results. ارسال Manuscript profile
    • Open Access Article

      54 - Routing improvement to control congestion in software defined networks by using distributed controllers
      saied bakhtiyari Ardeshir Azarnejad
      Software defined networks (SDNs) are flexible for use in determining network traffic routing because they separate data plane and control plane. One of the major challenges facing SDNs is choosing the right locations to place and distribute controllers; in such a way th More
      Software defined networks (SDNs) are flexible for use in determining network traffic routing because they separate data plane and control plane. One of the major challenges facing SDNs is choosing the right locations to place and distribute controllers; in such a way that the delay between controllers and switches in wide area networks can be reduced. In this regard, most of the proposed methods have focused on reducing latency. But latency is just one factor in network efficiency and overall cost reduction between controllers and related switches. This article examines more factors to reduce the cost between controllers and switches, such as communication link traffic. In this regard, a cluster-based algorithm is provided for network segmentation. Using this algorithm, it can be ensured that each part of the network can reduce the maximum cost (including delays and traffic on links) between the controller and its related switches. In this paper, using Topology Zoo, extensive simulations have been performed under real network topologies. The results of the simulations show that when the probability of congestion in the network increases, the proposed algorithm has been able to control the congestion in the network by identifying the bottleneck links in the communication paths of each node with other nodes. Therefore, considering the two criteria of delay and the degree of busyness of the links, the process of placing and distributing the controllers in the clustering operation has been done with higher accuracy. By doing so, the maximum end-to-end cost between each controller and its related switches, in the topologies Chinanet of China, Uunet of the United States, DFN of Germany, and Rediris of Spain, is decreased 41.2694%, 29.2853%, 21.3805% and 46.2829% respectively. Manuscript profile
    • Open Access Article

      55 - Provide a model of human resource knowledge architecture in knowledge-based organizations using a mixed approach
      abdollah saedi reza sepahvand najmoddin mosavi Mohammad hakkak
      Knowledge architecture of human resources is more important than any other tool or element in the way of creating, organizing, storing, distributing and applying knowledge to achieve organizational goals. The present study was conducted to present the architectural mode More
      Knowledge architecture of human resources is more important than any other tool or element in the way of creating, organizing, storing, distributing and applying knowledge to achieve organizational goals. The present study was conducted to present the architectural model of human resource knowledge in knowledge-based organizations using a mixed approach. This research is based on mixed research and quantitatively and qualitatively, which is descriptive-survey in terms of purpose, application and nature and method. The statistical population of the present study consists of knowledge-based organizations in Lorestan province, 30 of whose experts have been selected based on the principle of theoretical adequacy and using purposive sampling. The data collection tool in the qualitative part of the research is a semi-structured interview and in the quantitative part is a questionnaire. In the qualitative section, data and information were identified using Atlas.ti software and analysis coding method and architectural indicators of human resource knowledge. In the quantitative part of the research, the final model of the research has been developed and presented using Matlab software and interpretive structural modeling method. The research results include the indicators and components of human resource knowledge architecture and the presentation of human resource knowledge architecture model in knowledge-based organizations. Thus, in addition to developing a human resource knowledge architecture architecture model, the findings indicate the identification of the main components of human resource knowledge architecture, knowledge management infrastructure, professional characteristics, situational characteristics and achievements of human resource knowledge architecture. Manuscript profile
    • Open Access Article

      56 - Investigating the effect of using various marketing strategies on social networks on gaining the trust of council customers Investigating ترجمه‌های investigate فعلفراوانی بررسی کردن investigate, check, peruse, survey, study رسیدگی کردن consider, attend, check, investigate, inspect, investigate استفسار کردن investigate وارسی کردن sift, investigate پژوهیدن investigate, inquire, research, search تحقیق کردن investigate, inquire, verify, assay, interrogate, question اطلاعات مقدماتی بدست اوردن investigate جستار کردن investigate تفتیش کردن inquire, inspect, investigate, revise باز جویی کردن examine, assay, inquire, interrogate, investigate, cross-examine تعریف‌های investigate فعل ۱ carry out a systematic or formal inquiry to discover and examine the facts of (an incident, allegation, etc.) so as to establish the truth. police are investigating the alleged beating مترادف‌ها: check outsuss outgive something the once-overscope outinquire intolook intogo intolook overprobeexplorescrutinizeconduct an investigation intoconduct an inquiry intomake inquiries abouttry to get to the bottom ofinspectanalyzestudyexamineconsiderresearchsearch/sift the evidence concerningpore overdelve intoauditevaluatefollow up مترادف investigate فعل check outsuss outgive something the once-overscope out inquire intolook intogo intolook overprobeexplorescrutinizeconduct an investigation intoconduct an inquiry intomake inquiries abouttry to get to the bottom ofinspectanalyzestudyexamineconsiderresearchsearch/sift the evidence concerningpore overdelve intoauditevaluatefollow up همچنین ببینید investigate
      farzaneh milani jafari zenouzi
      The aim of this study is to investigate the effect of using variety of marketing strategies in social networks to build customers’ trust. Marketing through social networks has made appropriate opportunities for companies to attract more customers. Building customers' tr More
      The aim of this study is to investigate the effect of using variety of marketing strategies in social networks to build customers’ trust. Marketing through social networks has made appropriate opportunities for companies to attract more customers. Building customers' trust and attracting the customers can be mentioned as marketing challenges on these networks. So, in order to create competitive advantages, companies need to use appropriate strategies of building trust. The population of this study consists of all Iranian users of social networking sites that affected by companies advertisements. Also the sample size by using snowball sampling method is 446. The research method is descriptive survey research and data collection tool is questionnaire. To test hypotheses the partial least squares (PLS) technique and SmartPLS 3 software has been used. The results show that all four variables include: transactional, relationship, database and knowledge-based marketing strategies in social networks have a significant impact to build customers’ trust. Indeed, transactional strategy has negative impact on trust so the relation between this variable and dependent variable is reverse. knowledge-based marketing strategy has the most positive impact on customers’ trust. Manuscript profile
    • Open Access Article

      57 - Criteria for evaluating the effectiveness of social media users - a framework based on social media exploration
      rojyar pirmohammadiani shahriyar mohammadi
      Nowadays, users' interactive behaviors on social media have become an important and influential resource on marketing activities in various businesses. Despite the importance of this issue, providing appropriate criteria for evaluating the influential behavior of user More
      Nowadays, users' interactive behaviors on social media have become an important and influential resource on marketing activities in various businesses. Despite the importance of this issue, providing appropriate criteria for evaluating the influential behavior of users in recent studies has received less attention. For this purpose, in the first step, an innovative theory framework including two main dimensions: potential of the influence and the level of the influence is presented. Then, in order to define criteria for measuring each dimension, by providing a comprehensive and combined classification including three domains, user-based analysis, relationship-based analysis and content-based analysis, exploration techniques Social media has been examined to analyze the effective behaviors of users. In the following, according to the literature review, the criteria of "number of active users", “ranked of users based on the structural indexes and activity", “quality and the subjectiveness of content” have been defined to measure each of the aforementioned dimensions. The criteria proposed in this article are effective for creating dashboards to assess the value of users' influence in various businesses. It also a comprehensive roadmap has been provided for businesses about the data they need to collect and the required techniques to determine each of these metrics through a cross-disciplinary and academic classification of social media exploration techniques. Manuscript profile
    • Open Access Article

      58 - New Method to Improve Illumination Variations in Adult Images Based on Fuzzy Deep Neural Network
      Sasan Karamizadeh abouzar arabsorkhi
      In the era of the Internet, recognition of adult images is important to children's physical and mental protection. It is a challenge to recognize adult images with changes in the illumination and skin color. In this paper, we proposed a new method for solving illumi More
      In the era of the Internet, recognition of adult images is important to children's physical and mental protection. It is a challenge to recognize adult images with changes in the illumination and skin color. In this paper, we proposed a new method for solving illumination normalization with skin color classification in the diagnosis of the adult image. In this paper, the deep fuzzy neural network method is utilized to improve the illumination normalization of adult images, which has improved the recognization of adult images is utilized. Using Xception to dividing the images and reduce the illumination variations in each part separately, which makes it possible to reduce the illumination variation in the whole image without losing details. In addition, the advanced color combination algorithm based on Gaussian-KNN algorithm is used for skin color classification, a non-parametric method is used for classifications and regressions. Finally, the SVM algorithm is utilized for image classification. In this paper, 33,000 different types of images are collected from the Internet. The results show that the proposed method of 1/3 has improved the accuracy of the recognization. Manuscript profile
    • Open Access Article

      59 - A model information technology adoption in academic research projects in the filed ICT based on Information Technology Adoption Integrated Modeling (ITAIM)
      Shahram Aliyari masoud movahedi sirous kazemian
      Today, the emergence and expansion of technologies that provide the widest possible connection have brought about significant changes in the private life and professional life of individuals. Correct implementation of information technology is the source of economic and More
      Today, the emergence and expansion of technologies that provide the widest possible connection have brought about significant changes in the private life and professional life of individuals. Correct implementation of information technology is the source of economic and cultural development and the promotion of quality of life through the exchange of information and the provision of public and private services. The purpose of this research is to present the model of information technology acceptance in Iranian ICT research centers. Employed experts worked on ICT projects in this research Statistical population. It was provided in one of the university searching centers. And so a convenience and purposeful Nonprobability sampling does (30 person). This paper examines the factors and parameters affecting the acceptance of information technology in ICT projects of the university research centers in the field of information technology. To collect the required data and information, a questionnaire was used & to analyze the data and information obtained from the questionnaires using the Spss 22 and Smart pls3 software. According to the calculations, the factors affecting the acceptance of information technology in university research centers can be divided into four categories: IT related factors, organizational factors, factors related to executive director and individual factors that are related to management (0.497), IT (0.460) and Individual factors (0.457) have an impact on the individual acceptance of information technology respectively and organizational factors (0.469) on the adoption of an IT organization Manuscript profile
    • Open Access Article

      60 - Comparing A Hybridization of Fuzzy Inference System and Particle Swarm Optimization Algorithm with Deep Learning to Predict Stock Prices
      Majid Abdolrazzagh-Nezhad mahdi kherad
      Predicting stock prices by data analysts have created a great business opportunity for a wide range of investors in the stock markets. But the fact is difficulte, because there are many affective economic factors in the stock markets that they are too dynamic and compl More
      Predicting stock prices by data analysts have created a great business opportunity for a wide range of investors in the stock markets. But the fact is difficulte, because there are many affective economic factors in the stock markets that they are too dynamic and complex. In this paper, two models are designed and implemented to identify the complex relationship between 10 economic factors on the stock prices of companies operating in the Tehran stock market. First, a Mamdani Fuzzy Inference System (MFIS) is designed that the fuzzy rules set of its inference engine is found by the Particle Swarm Optimization Algorithm (PSO). Then a Deep Learning model consisting of 26 neurons is designed wiht 5 hidden layers. The designed models are implemented to predict the stock prices of nine companies operating on the Tehran Stock Exchange. The experimental results show that the designed deep learning model can obtain better results than the hybridization of MFIS-PSO, the neural network and SVM, although the interperative ability of the obtained patterns, more consistent behavior with much less variance, as well as higher convergence speed than other models can be mentioned as significant competitive advantages of the MFIS-PSO model Manuscript profile
    • Open Access Article

      61 - Introducing a genetic algorithm based Method for Community person's stance Detection in social media and news
      mehdi salkhordeh haghighi Seyyed Mohammad  ebrahimi
      News reports in social media are presented with large volumes of different kinds of documents. The presented topics in these documents focus on different communities and person stances and opinions. Knowing the relationships among persons in the documents can help the r More
      News reports in social media are presented with large volumes of different kinds of documents. The presented topics in these documents focus on different communities and person stances and opinions. Knowing the relationships among persons in the documents can help the readers to obtain a basic knowledge about the subject and the purpose of various documents. In the present paper, we introduce a method for detecting communities that includes the persons with the same stances and ideas. To do this, the persons referenced in different documents are clustered into communities that have related positions and stances. In the presented method. Community-based personalities are identified based on a friendship network as a base method. Then by using a genetic algorithm, the way that these communities are identified is improved. The criterion in the tests is rand index of detection of these communities. The experiments are designed based on real databases that published in Google News on a particular topic. The results indicate the efficiency and desirability of the proposed method Manuscript profile
    • Open Access Article

      62 - context-aware travel recommender system exploiting from Geo-tagged photos
      rezvan mohamadrezaei larki Reza Ravanmehr milad  amrolahi
      Recommender systems are the systems that help users find and select their target items. Most of the available events for recommender systems are focused on recommending the most relevant items to the users and do not include any context information such as time, locatio More
      Recommender systems are the systems that help users find and select their target items. Most of the available events for recommender systems are focused on recommending the most relevant items to the users and do not include any context information such as time, location . This paper is presented by the use of geographically tagged photo information which is highly accurate. The distinction point between this thesis and other similar articles is that this paper includes more context (weather conditions, users’ mental status, traffic level, etc.) than similar articles which include only time and location as context. This has brought the users close to each other in a cluster and has led to an increase in the accuracy. The proposed method merges the Colonial Competitive Algorithm and fuzzy clustering for a better and stronger processing against using merely the classic clustering and this has increased the accuracy of the recommendations. Flickr dataset is used to evaluate the presented method. Results of the evaluation indicate that the proposed method can provide location recommendations proportionate to the users’ preferences and their current visiting location. Manuscript profile
    • Open Access Article

      63 - Polar Diagram of Points with Moving Pole
      Bahram Sadeghi Bigham fateme rabani
      Polar diagram is a generalization of Voronoi diagram in which the angle is used as the metric. This Problem has many applications in visibility, image Processing, telecommunication, antenna, and Path Planning Problems. In recent years two kinds of Polar diagram have bee More
      Polar diagram is a generalization of Voronoi diagram in which the angle is used as the metric. This Problem has many applications in visibility, image Processing, telecommunication, antenna, and Path Planning Problems. In recent years two kinds of Polar diagram have been proposed and appropriate algorithm have been Presented for some types of sites. Also, some algorithms has presented for kinetic data and dynamic states. In this Paper, it is assumed that the Pole is moving and an algorithm is presented that updates near Pole Polar diagram of sites with moving pole efficiently and in a sub linear time. In this approach, the Preprocessing time is 〖O(n^4 log〗_2⁡〖n)〗 and updating time for diagram with each successive movement is 〖 O(log〗_2⁡〖n +k)〗 that k is the number of sites in region T which its site’s regions may be changed Manuscript profile
    • Open Access Article

      64 - An Improved Method Based on Label Propagation and Greedy Approaches for Community Detection in Dynamic Social Networks
      Mohammad ستاری kamran zamanifar
      Community detection in temporal social networks is one of the most important topics of research which attract many researchers around the world. There are variety of approaches in detecting communities in dynamic social network among which label propagation approach is More
      Community detection in temporal social networks is one of the most important topics of research which attract many researchers around the world. There are variety of approaches in detecting communities in dynamic social network among which label propagation approach is simple and fast approach. This approach consists of many methods such as LabelRankT is one with high speed and less complexity. Similar to most methods for detecting communities in dynamic social networks, this one is not trouble free. That is, it is not considered the internal connection of communities, when it expands communities of the previous snapshots in the current snapshot. This drawback decreases the accuracy of community detection in dynamic social networks. For solving the drawback, a greedy approach based on local modularity optimization is added to LabelRankT method. Here, the newly proposed GreedyLabelRankT, LabelRankT and non-overlapping version of Dominant Label Propagation Algorithm Evolutionary (DLPAE-Non Overlapping) on real and synthetic datasets are implemented. Experimental results on both real and synthetic network show that the proposed method detect communities more accurately compared to the benchmark methods. Moreover, the finding here show that running time of the proposed method is close to LabelRankT. Therefore, the proposed method increase the accuracy of community detection in dynamic social networks with no noticeable change in the running time of that. Manuscript profile
    • Open Access Article

      65 - Assessing E-Government Readiness in Iranian Universities, Case Study: Tarbiat Modares University
      Saeed Haydari gholamali montazer
      Due to the recent advances in electronic government (e-government) and given the fact that universities are recognized as the Leading of innovation and progress in society, the expectation of electronic-government maturity levels in universities is higher than other gov More
      Due to the recent advances in electronic government (e-government) and given the fact that universities are recognized as the Leading of innovation and progress in society, the expectation of electronic-government maturity levels in universities is higher than other governmental agencies. Given the high human capital capacity, universities are able to adapt themselves to e-government faster than other governmental organizations. In order to meet these expectations, e-government in universities and higher education institutions must be continuously evaluated. In this paper, we developed a model for assessing e-government readiness at university level, which includes "university-affiliated" indicators and "university-independent" indicators; university affiliates indicators are: " Trust "," Executive Policy and Laws "," Human Resources "," Integrity "," Budget "," Technological Infrastructure "," Digital Culture" and "Supervision, Support and Coordination ", as well as the "National Infrastructure" indicator is an independent indicator of the university. In the field study, the model was used to evaluate e-government readiness at Tarbiat Modares University Manuscript profile
    • Open Access Article

      66 - Increasing the value of collected data and reducing energy consumption by using network coding and mobile sinks in wireless sensor networks
      ehsan kharati
      The wireless sensor network includes a number of fixed sensor nodes that move sink nodes to collect data between nodes. To reduce energy consumption and increase the value of collected data, it is necessary to determine the optimum route and residence location of mobile More
      The wireless sensor network includes a number of fixed sensor nodes that move sink nodes to collect data between nodes. To reduce energy consumption and increase the value of collected data, it is necessary to determine the optimum route and residence location of mobile sinks, which increases the life of wireless sensor networks. Using network coding, this paper presents a Mixed Integer Linear Programming Model to determine the optimal multicast routing of source sensor nodes to mobile sinks in wireless sensor networks, which determines the time and location of sinks to collect maximum coded data and reduces the delay in sink movement and energy consumption. Solving this problem in polynomial time is not possible due to the involvement of various parameters and the constrained resources of wireless sensor networks. Therefore, several exploratory and greedy and fully distributed algorithms are proposed to determine the movement of sinks and their residence location based on maximizing the value of coded data and the type of data dead time. By simulating, the optimal method and the use of coding and proposed algorithms, reduce the runtime and energy consumption and increase the value of collected data and network lifetime than non-coding methods. Manuscript profile
    • Open Access Article

      67 - An Improved Method for Detecting Phishing Websites Using Data Mining on Web Pages
      mahdiye baharloo Alireza Yari
      Phishing plays a negative role in reducing the trust among the users in the business network based on the E-commerce framework. therefore, in this research, we tried to detect phishing websites using data mining. The detection of the outstanding features of phishing is More
      Phishing plays a negative role in reducing the trust among the users in the business network based on the E-commerce framework. therefore, in this research, we tried to detect phishing websites using data mining. The detection of the outstanding features of phishing is regarded as one of the important prerequisites in designing an accurate detection system. Therefore, in order to detect phishing features, a list of 30 features suggested by phishing websites was first prepared. Then, a two-stage feature reduction method based on feature selection and extraction were proposed to enhance the efficiency of phishing detection systems, which was able to reduce the number of features significantly. Finally, the performance of decision tree J48, random forest, naïve Bayes methods were evaluated{cke_protected_1}{cke_protected_2}{cke_protected_3}{cke_protected_4} on the reduced features. The results indicated that accuracy of the model created to determine the phishing websites by using the two-stage feature reduction based Wrapper and Principal Component Analysis (PCA) algorithm in the random forest method of 96.58%, which is a desirable outcome compared to other methods. Manuscript profile
    • Open Access Article

      68 - Using a multi-objective optimization algorithm for tasks allocate in the cloud-based systems to reduce energy consumption
      sara tabaghchimilan nima jafari novimipour
      Nowadays, new technologies have increased the demand for business in the web environment.Increasing demand will increase the variety and number of services. As a result, the creation of large-scale computing data centers has high operating costs and consumes huge amount More
      Nowadays, new technologies have increased the demand for business in the web environment.Increasing demand will increase the variety and number of services. As a result, the creation of large-scale computing data centers has high operating costs and consumes huge amounts of electrical power. On the other hand, inadequate and inadequate cooling systems not only cause excessive heating of resources and shorten the life of the machines. It also produces carbon that plays an important role in the weather. Therefore, they should reduce the total energy consumption of these systems with proper methods. In this research, an efficient energy management approach is provided in virtual cloud data centers, which reduces energy consumption and operational costs, and brings about an increase in the quality of services. It aims to provide a resource allocation strategy for cloud systems with the goal of reducing energy, cost of implementation and examining its use in cloud computing. The results of the simulation show that the proposed method in comaprision to NPA, DVFS, ST and MM methods can reduce the average energy consumption up to 0.626 kWh, also the need to immigration and SLA violation declined up to 186 and 30.91% respectively. Manuscript profile
    • Open Access Article

      69 - Incentive reward mechanism for Participants to the human computing system of Intrusion Detection Based on Game Theory
      yahya lormohammad hasani esfandghe majid ghayori
      Despite the tremendous advances in the design of human computing systems, most of them suffer from low participation or poor quality participation and a high percentage of them fail. To a large extent, the success of these systems depends on people who really behave in More
      Despite the tremendous advances in the design of human computing systems, most of them suffer from low participation or poor quality participation and a high percentage of them fail. To a large extent, the success of these systems depends on people who really behave in the system. Because human computing systems include small units of work, and each job yields little benefit to the participants, humans display a good behavior in the system if they are well-stimulated for doing so. In this paper, this issue investigated in the Intrusion Detection Human Computation system. Our purpose of creating the stimulus for increasing of employee participation is to do their jobs carefully and effortlessly with the lowest possible cost. After selecting the appropriate stimuli for this system, we designed the mechanism of rewarding incentives. The idea behind this mechanism is to use the skill of the staff in determining their rewards. After designing this mechanism, we used the theory of games to analyze and determine the game's balance. Then, we determine the minimum possible reward for each category of work using the results obtained from the mechanism analysis based on game theory. We validate of this mechanism using game theory and the results of implementation. Designing this mechanism will increase the accuracy of respondents in answering and as a result, increase the accuracy of the human intelligence detection system in identifying new attacks and reducing their erroneous alert rates. Also, by allocating the lowest financial resources required to employees based on the analysis obtained from the game theory and managing human computing system of Intrusion Detection, encourages participants to participate in the system and, as a result, prevent the failure of the human computing system of intrusion detection. Manuscript profile
    • Open Access Article

      70 - Fast and accurate concept drift detection from event logs
      mahdi yaghoobi ali sebti Soheila Karbasi
      In organizations and large companies that are using business process management systems (BPMSs), process model can change due to upstream laws, market conditions. BPMSs have flexible to these changes. Effect of these change are saved in storage devises and event logs; t More
      In organizations and large companies that are using business process management systems (BPMSs), process model can change due to upstream laws, market conditions. BPMSs have flexible to these changes. Effect of these change are saved in storage devises and event logs; these changes are sometimes applied suddenly or gradually on the event logs. Changing the season or starting a new financial term can be a factor to make these changes. This change is called concept drift in business process model. On time detection and recognition of process concept drift can affect the decision making of managers and administrations of systems. An analysis of the event logs in BPMS allows the automatic detection of the concept drift. This paper presents an innovative method by introducing a modified distance function to identify the concept drift. Experimental results were performed on 72 datasets in the research history, which included 648 concept drifts in 12 different types. It shows that the proposed method detects 98.18% of the drifts, while the proposed method is much faster than other state of the art methods. Manuscript profile
    • Open Access Article

      71 - Textual analysis of central bank news in forecasting long-term trend of Tehran stock exchange index
      meisam hashemi Mehran Rezaei marjan kaedi
      Financial markets have always been under influence of media news; therefore, text analysis of news is considered as an effective method of stock exchange forecasting. Research in this context has been conducted with the help of information retrieval techniques, in which More
      Financial markets have always been under influence of media news; therefore, text analysis of news is considered as an effective method of stock exchange forecasting. Research in this context has been conducted with the help of information retrieval techniques, in which high frequency words in a document that appeared sporadically in the whole corpus received higher weight than others. In contrast, the words which appeared in many news of a corpus, during a certain time, indicate the importance of an event. In our research, to address this contradiction, a new technique of assigning weight to influential words of news is presented. Financial news of Iran Central Bank (CBI) and actual data of Tehran Stock Exchange Index (TSEI) in the duration of 2005 to 2020 AD were utilized to evaluate the proposed method. The empirical results show 64% and 41% accuracy of trend prediction when TSEI moves upward and downward respectively and about 10% decreasing in Mean Absolute Error (MAE) to compare with prevalent techniques. While, the changes of the ratio between the number of positive and negative words in news does not offer predictive or analytical evidences, our results show that, there still exists a meaningful relationship between CBI news and TSEI fluctuations. Manuscript profile
    • Open Access Article

      72 - Improving performance of probe-based rate control mechanisms using classification: evaluation on an experimental testbed for High Throughput WLANs
      ghalibaf ali Mohammad Nassiri mohammadhassan daei mahdi sakhaei
      MIMO technology offers a wide range of transmission rates for modern wireless LANs. In order to improve the performance of the rate control module, statistical information on the history of state and usage of each transmission rate is maintained at the MAC layer to help More
      MIMO technology offers a wide range of transmission rates for modern wireless LANs. In order to improve the performance of the rate control module, statistical information on the history of state and usage of each transmission rate is maintained at the MAC layer to help determine the rate at which future packets are sent. However, the great diversity of transmission rates in the 802.11n and 802.11ac standards imposes an overhead for updating this information. In this article, to reduce the state space of transmission rates while keeping statistics approximately up to date for each rate, a method for clustering rates is presented so that when sending a packet over a transmission rate, statistical information relating to all the rates belonging to the same cluster is updated. As a result, statistics for a greater number of rates can be updated even when sending a fewer number of packets. We implemented our proposed mechanism in the Linux kernel environment and evaluated its performance under different conditions on an experimental testbed deployed in our research laboratory. The results show that the proposed method outperforms the de-facto Minstrel-HT rate control mechanism in terms of throughput and number of successful transmissions. Manuscript profile
    • Open Access Article

      73 - The aware genetic algorithm of the best member, applied to graph coloring and metric-dimension of the graph problems
      mahmood amintoosi Hashem Ezzati
      Genetic algorithm is one of the most famous methods for solving Combinatorial Optimization Problems. It had various applications in different field of studies such as Electronics, Computer Science and Mathematics and still has. In this algorithm, the population members More
      Genetic algorithm is one of the most famous methods for solving Combinatorial Optimization Problems. It had various applications in different field of studies such as Electronics, Computer Science and Mathematics and still has. In this algorithm, the population members which contribute for producing the next generation are selected according to their fitness values. The combination of the members is through Crossover Operator; And in some versions a few of the best members migrate to the next generation directly. Normally, the weak members of population may participate to the next generation. In this study, the combination operators are aware of the best member of generation; Only those child which are as good as the best member, are allowed to form the next generation. The proposed method is applied on graph coloring and finding metric-dimension of graph problems. The results are compared with the common genetic algorithm. Experimental results shows the superior performance of the proposed method in comparison to common genetic algorithm. Manuscript profile
    • Open Access Article

      74 - Converting protein sequence to image for classification with convolutional neural network
      reza ahsan mansour ebrahimi dianat dianat
      Since methods for sequencing machine learning sequences were not successful in classifying healthy and cancerous proteins, it is imperative to find a way to represent these sequences to classify healthy and ill individuals with deep learning approaches. In this study di More
      Since methods for sequencing machine learning sequences were not successful in classifying healthy and cancerous proteins, it is imperative to find a way to represent these sequences to classify healthy and ill individuals with deep learning approaches. In this study different methods of protein sequence representation for classification of protein sequence of healthy individuals and leukemia have been studied. Results showed that conversion of amino acid letters to one-dimensional feature vectors in classification of 2 classes was not successful and only one disease class was detected. By changing the feature vector to colored numbers, the accuracy of the healthy class recognition was slightly improved. The binary protein sequence representation method was more efficient than the previous methods with the initiative of sequencing the sequences in both one-dimensional and two-dimensional (image by Gabor filtering). Protein sequence representation as binary image was classified by applying Gabor filter with 100% accuracy of the protein sequence of healthy individuals and 98.6% protein sequence of those with leukemia. The findings of this study showed that the representation of protein sequence as binary image by applying Gabor filter can be used as a new effective method for representation of protein sequences for classification Manuscript profile
    • Open Access Article

      75 - Modeling and simulation of the central generator of the pattern to produce curved-linear motions in the snake robot
      morteza vasegh yaghoub pourasad
      With the advancement of science and technology and the importance of using robots, the need to use automated systems seems essential. Since most applications of snake robots move in unfamiliar and sometimes complex environments, there is a need to develop different cont More
      With the advancement of science and technology and the importance of using robots, the need to use automated systems seems essential. Since most applications of snake robots move in unfamiliar and sometimes complex environments, there is a need to develop different control methods for them. The product of the integration of the two sciences of neuroscience and robotics, are motor neuron producers known as model central generators, which is the problem of producing motion in the robot. In this paper, we control the movement of a snake-like robot with a central pattern generator (CPG) that is able to produce coordinated patterns of output signals with different frequencies. For this purpose, it is necessary to model the snake robot first and then apply control Be. In this paper, the control of robot motion control in two modes of open loop and closed loop for CPG network is presented. At the same time, this study with simulations shows that the lower the level of stimulation and the lower its level, the lower the frequency of motion production and vice versa. Then, the effect of CPG models, which are used as neural networks, is simulated in motion control. In this paper, the remarkable point in comparison with other controllers is that in the central generating neural networks, the pattern of simple signals is sufficient to stimulate and induce the movement of robots, which is shown in the simulation Manuscript profile
    • Open Access Article

      76 - An access control model for online social networks using user-to-user relationships
      Mohamad Javad Piran mahmud deypir
      With the pervasiveness of social networks and the growing information shared on them, users of these networks are exposed to potential threats to data security and privacy. The privacy settings included in these networks do not give users complete control over the manag More
      With the pervasiveness of social networks and the growing information shared on them, users of these networks are exposed to potential threats to data security and privacy. The privacy settings included in these networks do not give users complete control over the management and privatization of access to their shared information by other users. In this article, using the concept of social graph, a new model of user access control was proposed to the user, which allows the expression of privacy policies and more accurate and professional access control in terms of pattern and depth of relationships between users in social networks. In this article, by using the regular index method, indirect relationships among users are examined and analyzed, and more precise policies than previous models are presented. The evaluation of the results showed that for 10 neighbors for each user, the probability accumulation of a qualified path for the first three counter loops is 1, 10.5 and 67.3%, respectively, and finally for the fourth counter it reaches 100%. As the defined counting characteristic increases, the average execution time of the proposed algorithm and previously proposed algorithms increases. However, for the higher limits of the counting characteristic, the proposed algorithm performs better than the previous ones. Manuscript profile
    • Open Access Article

      77 - The role of organizational factors on consumer buying behavior in social networks
      zohreh dehdashti shahrokh Mitra Daneshparvar vahid nasehifar vahid Khashei
      The clothing industry has seen great growth in social media in recent years. Many factors affect the purchase of clothing from social networks, and one of these important and influential factors is organizational factors. Therefore, the purpose of this study is to inves More
      The clothing industry has seen great growth in social media in recent years. Many factors affect the purchase of clothing from social networks, and one of these important and influential factors is organizational factors. Therefore, the purpose of this study is to investigate the organizational factors affecting the consumer in shopping through social networks. In this research, a combined method has been used. In the qualitative section, by reviewing the literature and interviewing vendors active in social networks, texts were prepared and coded. In the quantitative part, based on the initial model, a questionnaire was developed and distributed to 385 clothing buyers in networks. The structural equation method was used to analyze the data and the Sobel test was used to examine the mediating role. This study examines the independent and combined effect of organizational variables affecting people's trust in buying clothes through social networks. The results showed that information quality, transaction security, company reputation and company location have a significant effect on people's trust and consumer willingness to buy clothing through social networks.. Manuscript profile
    • Open Access Article

      78 - A Novel Method based on the Cocomo model to increase the accuracy of software projects effort estimates
      mahdieh salari vahid khatibi amid khatibi
      It is regarded as a crucial task in a software project to estimate the criteria, and effort estimation in the primary stages of software development is thus one of the most important challenges involved in management of software projects. Incorrect estimation can lead t More
      It is regarded as a crucial task in a software project to estimate the criteria, and effort estimation in the primary stages of software development is thus one of the most important challenges involved in management of software projects. Incorrect estimation can lead the project to failure. It is therefore a major task in efficient development of software projects to estimate software costs accurately. Therefore, two methods were presented in this research for effort estimation in software projects, where attempts were made to provide a way to increase accuracy through analysis of stimuli and application of metaheuristic algorithms in combination with neural networks. The first method examined the effect of the cuckoo search algorithm in optimization of the estimation coefficients in the COCOMO model, and the second method was presented as a combination of neural networks and the cuckoo search optimization algorithm to increase the accuracy of effort estimation in software development. The results obtained on two real-world datasets demonstrated the proper efficiency of the proposed methods as compared to that of similar methods. Manuscript profile
    • Open Access Article

      79 - A Combination Method of DEA, DEMATEL and ANP for Evaluation of ERP Systems
      amir amini alireza alinezhad
      In this study Data envelopment analysis is used for the assessment of enterprise resources planning systems of 18 manufacturing companies, to determine whether the defined goals for ERP systems have been able to affect the performance after the implementation of the sys More
      In this study Data envelopment analysis is used for the assessment of enterprise resources planning systems of 18 manufacturing companies, to determine whether the defined goals for ERP systems have been able to affect the performance after the implementation of the system. Considering the identification of effective factors in implementing ERP systems and using the previous researches, the performance evaluation criteria of this system were identified. Then, using experts’ views the most important input indicators were ranked by fuzzy DEMATEL and output indicators by ANP. In this ranking, time spent on implementation, the implementation infrastructure, training and user support were identified as top input indicators, and three indicators of productivity increase, proper resource management and user satisfaction were selected as top output indicators. Using selected indicators, the performance of ERP systems of selected companies was evaluated. The results of this research will be useful in identifying the strengths and weaknesses of companies compared to top ones and making their ERP system even better. Manuscript profile
    • Open Access Article

      80 - Increasing the lifetime of underwater acoustic sensor networks by optimal relay node placement
      zahra mihamadi mohadeseh soleimanpour daryush avasimoghaddam Siamak Talebi
      Underwater acoustic sensor networks (UASNs) have gained growing importance due to their desirable features and wide spread practical applications in many communication fields. Due to the high cost of underwater sensor nodes as well as implementation complexity, increasi More
      Underwater acoustic sensor networks (UASNs) have gained growing importance due to their desirable features and wide spread practical applications in many communication fields. Due to the high cost of underwater sensor nodes as well as implementation complexity, increasing the lifetime of UASNs is an important issue. Although relay nodes have an important role in reducing the transmission distance and energy consumption. But the efficient RNP (Relay Node Placement) to avoid the critical sensor nodes' elimination is the main problem, i.e., to preserve the connected network. For this aim this paper presents an innovative solution called an Efficient Relay node Setting (ERS) algorithm, which involves formulating the Relay Node Placement (RNP) as a non-convex optimization problem. Actually, due to the Difference Convex (DC) constraints the proposed RNP problem is a non-convex problem and finding an optimal solution is complicated. However, a novel transformation can be applied to DC constraints which converts the problem into its convex programming equivalent. Application of the convex programming offers the advantage of readily computing a global optimal solution. Simulation results confirm the superiority of the proposed scheme over the competing RA method in terms of network lifetime and efficiency. Manuscript profile