• OpenAccess
    • List of Articles ontology

      • Open Access Article

        1 - Ontology-Based Up gradation of Entrepreneurship Skills Using Educational Portals
        Somayeh Ahari
        Nowadays, organizational portals hold a key role in disseminating organizational information at different layers. Within their scope, educational portals are particularly significant, due to their ability in upgrading users’ knowledge and skill in realizing entrepreneur More
        Nowadays, organizational portals hold a key role in disseminating organizational information at different layers. Within their scope, educational portals are particularly significant, due to their ability in upgrading users’ knowledge and skill in realizing entrepreneurship business. Considering the geographical distributed-ness as well as job variation in entrepreneurship and the parameters which are influential in the process of designing these portals, developing a mechanism that can offer a high capability to portals in upgrading entrepreneurship skill, is of high priority. This necessitates the very features which are essential to designing efficiently these sorts of portals. In this paper, an approach is suggested according to which the features expected for designing an educational portal are represented in terms of an ontology, and it is subsequently explained how and in what way these features can on the one hand help realize entrepreneurship business and on the other hand help entrepreneurship training/education come true in a reasonable way. At the end, the capability of the proposed approach will be discussed in terms of two practical scenarios being used frequently. Manuscript profile
      • Open Access Article

        2 - Improving recommender systems with the help of Semantic Web
        rahele beheshti mohammad ebrahim samie ali hamze
        In order to provide for the necessities of life, human beings always use the advice and suggestions of others, which are provided orally or in writing, and take them into account in their decisions. Today, with the advancement of technology and the expansion of e-busine More
        In order to provide for the necessities of life, human beings always use the advice and suggestions of others, which are provided orally or in writing, and take them into account in their decisions. Today, with the advancement of technology and the expansion of e-business in the context of Internet websites, a new chapter of digital life has begun with the help of advisory systems. The most important goal in these systems is to attract customers and gain their trust by offering the best and most appropriate offer to buy products, according to their interests and tastes in the midst of a multitude of choices. In this research, an attempt has been made to extract information related to the field of film with the help of connections in DBpedia's ontology. Then the structure of the recommender system is designed and implemented and with the help of the information available in the MovieLens database, the performance of the recommender system is evaluated. According to the evaluations, the proposed model is more efficient among other methods that somehow use the semantic web. Manuscript profile
      • Open Access Article

        3 - Architectural tactics identification in source code based on a semantic approach
        Ehsan Sharifi Ahmad عبداله زاده بارفروش
        Software systems are alive as long as they can be changed and used. Changing the source code without considering the consequences can lead to the architectural erosion of software systems. Architectural erosion gradually makes the system unchangeable and moves it toward More
        Software systems are alive as long as they can be changed and used. Changing the source code without considering the consequences can lead to the architectural erosion of software systems. Architectural erosion gradually makes the system unchangeable and moves it towards deterioration. Architectural decisions in the source code are usually made using architectural tactics. These tactics are fine-grained decisions that are made to achieve a certain quality attribute. Recognizing these tactics in the source code, allows developers to change the code while knowing the implementation location of these decisions. This slows the architectural erosion process and delays the system's movement towards deterioration. Thus, this paper introduces a method based on semantic web for recognizing the architectural tactics presented in the source code. Based on this approach, the new concept of microtactic is introduced that increases the possibility of recognizing architectural tactics using a semantic web and ontological approach. The evaluation results show that this method in comparison with other similar methods recognizes the tactics with higher precision and quality. Manuscript profile
      • Open Access Article

        4 - computer security models and proposing a new perspective: A review paper
        Hadi sadjadi Reza Kalantari
        In this article first the use of computer security models and its benefits are discussed in a novel way. Then, while briefly introducing the space of computer security encounters in the form of ontology, for the first time, three perspectives in the study of patterns in More
        In this article first the use of computer security models and its benefits are discussed in a novel way. Then, while briefly introducing the space of computer security encounters in the form of ontology, for the first time, three perspectives in the study of patterns in this field have been identified and distinguished from each other. These three perspectives include the view of secure models, the view of security models, and the view of the framework and system to security models. The first and third perspectives are briefly explained and the second perspective is studied in detail from the perspective of the organization of patterns, including the five types of organization. The five types mentioned include software-based lifecycle organization, logical-level organization-based organization, threat-based classification-based organization, attack-based classification-based organization, and application-based organization. In this type of introduction of patterns, the audience acquires a comprehensive view of the discourse of computer security patterns and acquires the necessary knowledge to make better use of these patterns. Finally, the analysis and idea of this research is presented in the form of introducing a new type of organization in order to facilitate the proper use and addressing of patterns. In this idea, it is stated that the existing categories are mostly static and forward-looking and do not have the necessary dynamism and backwardness, and the idea of covering all stakeholders and security ontology can have this feature and, in addition, include agile patterns as well. . Manuscript profile
      • Open Access Article

        5 - A Survey on Computer Security Patterns and Proposing a New Perspective
        Hadi sadjadi Reza Kalantari
        In this article, at the beginning, the use of computer security models and its benefits are discussed in a new way. Then, while briefly introducing the space of computer security encounters in the form of ontology, three perspectives in the study of patterns in this fie More
        In this article, at the beginning, the use of computer security models and its benefits are discussed in a new way. Then, while briefly introducing the space of computer security encounters in the form of ontology, three perspectives in the study of patterns in this field have been identified and distinguished from each other. These three perspectives are secure models, security models, and the framework and system to security models. The first and last perspectives are briefly explained and the second perspective is studied in detail from the perspective of the organization of patterns, including the five types of organization. The five types mentioned include software-based lifecycle organization, logical-level organization-based organization, threat-based classification-based organization, attack-based classification-based organization, and application-based organization. In this type of introduction of patterns, the audience acquires a comprehensive view of the discourse of computer security patterns and acquires the necessary knowledge to make better use of these patterns. Finally, the analysis and idea of this research are presented in the form of introducing a new type of organization in order to facilitate the proper use and addressing of patterns. It is stated that the existing categories are mostly static and forward-looking and do not have the necessary dynamism and backwardness, and the idea of covering all stakeholders and security ontology can have this feature and, include agile patterns as well. Based on this idea and related analyzes, the atmosphere of future research activities will be revealed to the audience. Manuscript profile