List of subject articles IT Strategy


    • Open Access Article

      1 - Multiple Antenna Relay Beamforming for Wireless Peer to Peer Communications
      Mohammad Hossein Golbon Haghighi Behrad Mahboobi مهرداد اردبیلی پور
      This paper deals with optimal beamforming in wireless multiple-input-multiple-output (MIMO) relay networks that involves multiple concurrent source-destination pairs with imperfect channel state information (CSI) at the relays. Our aim is the optimization of the MIMO re Full Text
      This paper deals with optimal beamforming in wireless multiple-input-multiple-output (MIMO) relay networks that involves multiple concurrent source-destination pairs with imperfect channel state information (CSI) at the relays. Our aim is the optimization of the MIMO relay weights that minimize the total relay transmit power subject to signal-to-interference-plus-noise ratio (SINR) of all destinations to be kept above a certain threshold. Since power minimization is a non-convex quadratically constrained quadratic programming (QCQP), we use semi-definite programming (SDP) relaxation of above mentioned problem by using a randomization technique. Numerical Monte Carlo simulations verify the performance gain of our proposed multiple antenna relay system in terms of transmit power and symbol error probability. Manuscript Document
    • Open Access Article

      2 - Camera Identification Algorithm Based on Sensor Pattern Noise Using Wavelet Transform, SVD / PCA and SVM Classifier
      Kimia Bolouri Mehdi Javanmard Mohammad Firouzmand
      Identifying the source camera of an image is one of the most important issues of digital court and is useful in many applications, such as images that are presented in court as evidence. In many methods, the image noise characteristics, extraction of Sensor Pattern Nois Full Text
      Identifying the source camera of an image is one of the most important issues of digital court and is useful in many applications, such as images that are presented in court as evidence. In many methods, the image noise characteristics, extraction of Sensor Pattern Noise and its correlation with non-uniformity of the light response (PNU) are used. In this paper we have presented a method based on photo response non uniformity (PRNU) that provides some features for classification by support vector machine (SVM). Because the noise model is affected by the complexity of the image, we used the wavelet transform to de-noise and reduce edge effects in PRNU noise pattern and also raise the detection accuracy. We also used the Precision processing theory to reduce the image size, then we simplified and summarized the data using the Single Value Decomposition (SVD) Or principal component analysis (PCA). The results show that using two-level wavelet transform and summarized data is more suitable using PCA. Manuscript Document
    • Open Access Article

      3 - EBG Structures Properties and their Application to Improve Radiation of a Low Profile Antenna
      Masoumeh Rezaei Abkenar Pejman Rezaei
      In this paper we have studied the characteristics of mushroom-like Electromagnetic Band Gap (EBG) structure and performance of a low profile antenna over it. Afterward, a novel EBG surface is presented by some modifications in mushroom-like EBG structure. This structure Full Text
      In this paper we have studied the characteristics of mushroom-like Electromagnetic Band Gap (EBG) structure and performance of a low profile antenna over it. Afterward, a novel EBG surface is presented by some modifications in mushroom-like EBG structure. This structure, which has more compact electrical dimensions, is analyzed and its electromagnetic properties are derived. Results show that resonant frequency of this novel structure is about 15.3% lower than the basic structure with the same size. Moreover, the novel EBG structure has been used as the ground plane of antenna. Its application has improved radiation of a low profile dipole antenna. The antenna performance over the new EBG ground plane is compared with the conventional mushroom-like EBG structure. Simulation results show that using this slot loaded EBG surface, results in 13.68dB improvement in antenna return loss, in comparison with conventional mushroom-like EBG, and 33.87dB improvement in comparison with metal ground plane. Besides, results show that, EBG ground planes have increased the input match frequency bandwidth of antenna. Manuscript Document
    • Open Access Article

      4 - A New Approach to Overcome the Count to Infinity Problem in DVR Protocol Based on HMM Modelling
      Mehdi Golestanian Reza Ghazizadeh
      Due to low complexity, power and bandwidth saving Distance Vector Routing has been introduced as one of the most popular dynamic routing protocol. However, this protocol has a serious drawback in practice called Count To Infinity problem or slow convergence. There are m Full Text
      Due to low complexity, power and bandwidth saving Distance Vector Routing has been introduced as one of the most popular dynamic routing protocol. However, this protocol has a serious drawback in practice called Count To Infinity problem or slow convergence. There are many proposed solutions in the literature to solve the problem, but all of these methods depend on the network topology, and impose much computational complexity to the network. In this paper, we introduce a new approach to solve the Count To Infinity using hidden markov model (HMM), which is one of the most important machine learning tools. As the modelling results show, the proposed method is completely independent from the network topology and simple with low computational complexity. Manuscript Document
    • Open Access Article

      5 - An Approach to Compose Viewpoints of Different Stakeholders in the Specification of Probabilistic Systems
      Mahboubeh Samadi haghighi haghighi
      Developing large and complex systems often involves many stakeholders each of which has her own expectations from the system; hence, it is difficult to write a single formal specification of the system considering all of stakeholders’ requirements at once; instead, each Full Text
      Developing large and complex systems often involves many stakeholders each of which has her own expectations from the system; hence, it is difficult to write a single formal specification of the system considering all of stakeholders’ requirements at once; instead, each stakeholder can specify the system from her own viewpoint first. Then, the resulting specifications can be composed to prepare the final specification. Much work has been done so far for the specification of non-probabilistic systems regarding viewpoints (or expectations) of different stakeholders; however, because of big trend to apply formal methods on probabilistic systems, in this paper, we present an approach to compose viewpoints of different stakeholders in the specification of probabilistic systems. According to this approach, different viewpoints are separately specified using the Z notation. Then, the resulting specifications are composed using some new operators proposed in this paper. We show the applicability of the presented approach by performing it on a known case study. Manuscript Document
    • Open Access Article

      6 - PSO-Algorithm-Assisted Multiuser Detection for Multiuser and Inter-symbol Interference Suppression in CDMA Communications
      Atefeh Haji Jamali Arani paeez azmi
      Applying particle swarm optimization (PSO) algorithm has become a widespread heuristic technique in many fields of engineering. In this paper, we apply PSO algorithm in additive white Gaussian noise (AWGN) and multipath fading channels. In the proposed method, PSO algor Full Text
      Applying particle swarm optimization (PSO) algorithm has become a widespread heuristic technique in many fields of engineering. In this paper, we apply PSO algorithm in additive white Gaussian noise (AWGN) and multipath fading channels. In the proposed method, PSO algorithm was applied to solve joint multiuser and inter-symbol interference (ISI) suppression problems in the code-division multiple-access (CDMA) systems over multipath Rayleigh fading channel and consequently, to reduce the computational complexity. At the first stage, to initialize the POS algorithm, conventional detector (CD) was employed. Then, time-varying acceleration coefficients (TVAC) were used in the PSO algorithm. The simulation results indicated that the performance of PSO-based multiuser detection (MUD) with TVAC is promising and it is outperforming the CD. Manuscript Document
    • Open Access Article

      7 - Defense against SYN Flooding Attacks: A Scheduling Approach
      Shahram Jamali Gholam Shaker
      The TCP connection management protocol sets a position for a classic Denial of Service (DoS) attack, called the SYN flooding attack. In this attack attacker sends a large number of TCP SYN segments, without completing the third handshaking step to quickly exhaust connec Full Text
      The TCP connection management protocol sets a position for a classic Denial of Service (DoS) attack, called the SYN flooding attack. In this attack attacker sends a large number of TCP SYN segments, without completing the third handshaking step to quickly exhaust connection resources of the victim server. Therefore it keeps TCP from handling legitimate requests. This paper proposes that SYN flooding attack can be viewed metaphorically as result of an unfair scheduling that gives more opportunity to attack requests but prevents legal connections from getting services. In this paper, we present a scheduling algorithm that ejects the half connection with the longest duration, when number of half open connections reaches to the upper bound. The simulation results show that the proposed defense mechanism improves performance of the under attack system in terms of loss probability of requests and share of regular connections from system resources. Manuscript Document
    • Open Access Article

      8 - Internet Banking, Cloud Computing: Opportunities, Threats
      Monireh Hosseini Elias Fathi Kiadehi
      With the extension of Internet and its applications, internet banking is introduced as an efficient and cost effective way to provide services to customers. Towards the end of previous decade, cloud computing has been offered as a revolution in Internet application as a Full Text
      With the extension of Internet and its applications, internet banking is introduced as an efficient and cost effective way to provide services to customers. Towards the end of previous decade, cloud computing has been offered as a revolution in Internet application as a service which effect on the way that service is provided. Regarding the service improvement based on customer’s needs, cloud computing is a quick move in informational services. This study tried to consider each aspect of internet banking and cloud computing strengths, weaknesses, opportunities and threats and provide SWOT analysis for Internet banking using cloud computing. In the following, the study tried to provide a practical solution for financial agencies and banks to provide better Internet banking services using cloud computing technology. Finally a SWOT analysis of internet banking using cloud computing technology is discussed and approved with expert opinions using fuzzy Delphi method. Manuscript Document
    • Open Access Article

      9 - A RFMV Model and Customer Segmentation Based on Variety of Products
      سامان قدکی مقدم Neda Abdolvand سعیده رجائی هرندی
      Today, increased competition between organizations has led them to seek a better understanding of customer behavior through innovative ways of storing and analyzing their information. Moreover, the emergence of new computing technologies has brought about major change Full Text
      Today, increased competition between organizations has led them to seek a better understanding of customer behavior through innovative ways of storing and analyzing their information. Moreover, the emergence of new computing technologies has brought about major changes in the ability of organizations to collect, store and analyze macro-data. Therefore, over thousands of data can be stored for each customer. Hence, customer satisfaction is one of the most important organizational goals. Since all customers do not represent the same profitability to an organization, understanding and identifying the valuable customers has become the most important organizational challenge. Thus, understanding customers’ behavioral variables and categorizing customers based on these characteristics could provide better insight that will help business owners and industries to adopt appropriate marketing strategies such as up-selling and cross-selling. The use of these strategies is based on a fundamental variable, variety of products. Diversity in individual consumption may lead to increased demand for variety of products; therefore, variety of products can be used, along with other behavioral variables, to better understand and categorize customers’ behavior. Given the importance of the variety of products as one of the main parameters of assessing customer behavior, studying this factor in the field of business-to-business (B2B) communication represents a vital new approach. Hence, this study aims to cluster customers based on a developed RFM model, namely RFMV, by adding a variable of variety of products (V). Therefore, CRISP-DM and K-means algorithm was used for clustering. The results of the study indicated that the variable V, variety of products, is effective in calculating customers’ value. Moreover, the results indicated the better customers clustering and valuation by using the RFMV model. As a whole, the results of modeling indicate that the variety of products along with other behavioral variables provide more accurate clustering than RFM model. Manuscript Document
    • Open Access Article

      10 - Analysis of Business Customers’ Value Network Using Data Mining Techniques
      فروغ فرازمنش Monireh Hosseini
      In today's competitive environment, customers are the most important asset to any company. Therefore companies should understand what the retention and value drivers are for each customer. An approach that can help consider customers‘ different value dimensions is the Full Text
      In today's competitive environment, customers are the most important asset to any company. Therefore companies should understand what the retention and value drivers are for each customer. An approach that can help consider customers‘ different value dimensions is the value network. This paper aims to introduce a new approach using data mining techniques for mapping and analyzing customers‘ value network. Besides, this approach is applied in a real case study. This research contributes to develop and implement a methodology to identify and define network entities of a value network in the context of B2B relationships. To conduct this work, we use a combination of methods and techniques designed to analyze customer data-sets (e.g. RFM and customer migration) and to analyze value network. As a result, this paper develops a new strategic network view of customers and discusses how a company can add value to its customers. The proposed approach provides an opportunity for marketing managers to gain a deep understanding of their business customers, the characteristics and structure of their customers‘ value network. This paper is the first contribution of its kind to focus exclusively on large data-set analytics to analyze value network. This new approach indicates that future research of value network can further gain the data mining tools. In this case study, we identify the value entities of the network and its value flows in the telecommunication organization using the available data in order to show that it can improve the value in the network by continuous monitoring. Manuscript Document
    • Open Access Article

      11 - Representing a Model to Measure Absorbency Of Information Technology in Small And Medium Sized Enterprises
      Mohammad Taghi Sadeghi Farzad  Movahedi Sobhani Ali Rajabzade Ghatari
      With rapid development of information technology (IT) and further deepening of informationization construction, more and more enterprises have realized the strategic value of IT and made great investments in it. However, during the IT implementation process, decision-ma Full Text
      With rapid development of information technology (IT) and further deepening of informationization construction, more and more enterprises have realized the strategic value of IT and made great investments in it. However, during the IT implementation process, decision-making, adaptation degree, and IT performance are often inferior to the anticipation. The assimilation of technology can be defined by the extent to which the use of Information technology spreads across organizational processes and becomes routinized in activities. Capabilities of information technology play crucial role in an ever-changing environment and are considered as one of the most important sources for enterprises while enterprises should acquire some effective capabilities so that they can effectively deploy and utilize information technology. The purpose of this investigation is to represent a model to measure absorbency of information technology in small and medium-sized enterprises. To do so, dimensions of the "absorbency of information technology" was determined through exploratory factor analysis in a survey research and confirmatory factor analysis was used to confirm model validity. Findings show that three dimensions are related to absorbency of information technology including the capability for innovative technology, Inside-Out IT capability and IT management capability, among which the capability for innovative technology has the highest correlation with the concept of absorbency of information technology. Manuscript Document
    • Open Access Article

      12 - Assessing the Company's E-Readiness for Implementing Mobile-CRM System
      Alireza Kamanghad Gholamreza Hashemzade Mohammadali Afshar kazemi Nosratollah Shadnoosh
      In today’s world, most of companies are trying to survive in a competitive environment which has been increased in recent years. This competition has raised the customer power to select desired products and services among different suppliers and providers. So the import Full Text
      In today’s world, most of companies are trying to survive in a competitive environment which has been increased in recent years. This competition has raised the customer power to select desired products and services among different suppliers and providers. So the importance of customer satisfaction and loyalty has been increased dramatically for companies and businesses. This is more important for distributor companies who deal with a lot of customers in a B2B market. Mobile-CRM has emerged new opportunities on customer satisfaction and can play as an efficient tool that will make great adjustments, savings and benefits for companies to provide better services for customers and have more retain customers. But implementing a Mobile-CRM system is a complicated large project that affects all aspects of an organization and needs a huge investment which increases the risk of failure. To avoid this risk, the assessing of company’s E-Readiness before starting main project is necessary. In this research we have used VERDICT model as a suitable model for assessing E-Readiness of a company willing to implement a Mobile-CRM system. A large distributor company is the case study of this research. The research is conducted based on a descriptive-survey method using questionnaire tools for extracting the experts' opinion and determining the company’s E-Readiness level. Manuscript Document
    • Open Access Article

      13 - The Innovation Roadmap and Value Creation for Information Goods Pricing as an Economic Commodity
      Hekmat Adelnia Najafabadi Ahmadreza Shekarchizadeh Akbar Nabiollahi Naser Khani Hamid Rastegari
      Nowadays, most books and information resources or even movies and application programs are produced and reproduced as information goods. Regarding characteristics of information goods, its cost structure and market, the usual and traditional pricing methods for such com Full Text
      Nowadays, most books and information resources or even movies and application programs are produced and reproduced as information goods. Regarding characteristics of information goods, its cost structure and market, the usual and traditional pricing methods for such commodity are not useful and the information goods pricing has undergone innovative approaches. The purpose of product pricing is to find an optimal spot for maximizing manufacturers' profits and consumers' desirability. Undoubtedly, in order to achieve this goal, it is necessary to adopt appropriate strategies and implement innovative strategies. Innovative strategies and tactics reflect the analysis of market share, customer behavior change, pattern of cost, customer preferences, quick response to customer needs, market forecast, appropriate response to market changes, customer retention, discovery of their specific requirements, cost reduction and customer satisfaction increase. In this research, 32 papers have been selected among 540 prestigious articles to create a canvas containing more than 20 possible avenues for innovations in the field of information goods pricing, which can be used in the companies producing information goods, regardless of their size, nationality, and type of information goods they produce. Introduction of some key ideas on how to increase both profits and customer satisfaction and also three open issues for future research in the field of information goods pricing is one of the achievements of this research. Manuscript Document
    • Open Access Article

      14 - A way to improve Adaptive Maintenance in Enterprise Architecture
      feridon Shams safura oviesi
      Lately, one of the biggest challenges in enterprise is the strategic alignment of information technology with business. Enterprises use various methods to achieve this strategic alignment. Enterprise architecture is an effective approach that allows optimal management o Full Text
      Lately, one of the biggest challenges in enterprise is the strategic alignment of information technology with business. Enterprises use various methods to achieve this strategic alignment. Enterprise architecture is an effective approach that allows optimal management of Enterprise’s information technology and strategic alignment of IT functionalities and business requirements. These days, considering dynamic environments, there is the possibility of any kind of change in enterprise’s conditions, especially after implementation of Enterprise architecture. This change of conditions demonstrates itself in a variety of forms. In these cases, decision making should be done as an appropriate response to these changes which should be predictable. Otherwise it would lead to lack of proper response and consequently, readjustment of Enterprise architecture document, which imposes many human and financial costs on the enterprise. In addition, the enterprise’s progress toward competitive advantages will be stopped. The appropriate response and adaptability to these changes is a concept represented under the title of adaptive maintenance of Enterprise architecture. In the following article with the help of a software maintenance method and examining the possibility of extending into the Enterprise architecture maintenance, through a case study on Power Distribution Company of Golestan province, it is shown how the improvement of adaptive maintenance of Enterprise architecture can be assisted and the possibility of implementation of various types of changes in business and information technology without disturbing the Enterprise is provided. Manuscript Document
    • Open Access Article

      15 - Localization of Blockchain and E-Currency Model for E-Government Services
      Maryam Niknezhad Sajjad Shokouhyar Mehrzad Minouei
      Blockchain can reduce bureaucracy and increase the efficiency and performance of administrative processes through a platform possessing features and attributes such as storing and exchanging electronic messages in a decentralized environment and executing high level of Full Text
      Blockchain can reduce bureaucracy and increase the efficiency and performance of administrative processes through a platform possessing features and attributes such as storing and exchanging electronic messages in a decentralized environment and executing high level of security transactions and transparency, if used in government public service delivery. Many scholars believe that this distributed technology can bring new utilizations to a variety of industries and fields, including finance and banking, economics, supply chain, and authentication and increase economic productivity and efficiency dramatically by transforming many industries in the context of today's economy. The present study, presents the characteristics of the localized blockchain and e-currency conceptual model for the evolution of e-government services. It also examines the impact of the blockchain and e-currency model on the economy and electronic financial transactions as a viable, practical and constructive solution (rather than blocking and filtering of e-currency and blockchain). Ultimately designing a localized block chain and e-currency model, has played an effective role in exploit its high potential to speed up the administrative processes and reduce costs related to electronic transactions and payments in e-government and increase e-government revenues and ultimately it can speed up the customer service delivery and increase their satisfaction with the government. Manuscript Document
    • Open Access Article

      16 - Model of Technological, Managerial and Marketing Infrastructure for Intelligent Technology Efficiency in Telecommunication Industry - Case Study: Telecommunication Infrastructure Company of Ilam Province1
      Heshmat morad haseli Jalal Haghighatmonfared
      Today’s, intelligent agent system (IAS) are considered as an important part of people's lives. Therefore, many of organizations try to implement IAS in their mechanism. One of these organizations in Iran is telecommunication Infrastructure Company. Because any implement Full Text
      Today’s, intelligent agent system (IAS) are considered as an important part of people's lives. Therefore, many of organizations try to implement IAS in their mechanism. One of these organizations in Iran is telecommunication Infrastructure Company. Because any implementation need a model which clarify the structural and contextual components, therefore, the current research is conducted to provide a model for developing the necessary infrastructure for implementation of intelligent technologies in the communication and telecommunication mechanisms of Ilam Province. To achieve the goal, a qualitative approach and thematic analysis method were used. The research population consisted of all experts in the field of ICT in Ilam province Infrastructure Communications Company that using purposeful sampling method and relying on theoretical data saturation, 10 of them were selected as sample. Semi-structured interviews were used to collect the data. The data were analyzed through theme analysis. Based on the method, 4 themes, 10 main categories and 153 open codes were extracted. The findings of the study showed that to transform communication mechanisms into intelligent technologies, there must be technological, management, marketing and cultural infrastructure. Technological infrastructure consisted of intelligent software and hardware; management infrastructure consisted of knowledge and belief; marketing infrastructure included attracting intelligent technology to audiences, encouraging ideas, physical and virtual channels; and finally, cultural infrastructure, it was staff training and public awareness. Manuscript Document
    • Open Access Article

      17 - IT Capability Evaluation through the IT Capability Map
      mina ranjbarfard Seyedeh Reyhaneh Mirsalari
      Organizations are increasingly in search of ways to derive more business values from IT investments and the need for IT capabilities (ITC) is surging. ITC is critical significant to build enterprise agility and promote organizational performance. However, IT capability Full Text
      Organizations are increasingly in search of ways to derive more business values from IT investments and the need for IT capabilities (ITC) is surging. ITC is critical significant to build enterprise agility and promote organizational performance. However, IT capability is always treated as the causal factor already existing and there are few studies on how IT capability is created and evaluated. Appropriate evaluation is necessary for an organization to measure, manage and improve enterprise ITC. This research aims to identify and map the dimensions of an organization's ITC. Using a mixed research method, this paper comprises two sections. The qualitative section adopts a systematic literature review (SLR) approach to identify the dimensions of ITC. The quantitative section employs factor analysis to validate identified ITC dimensions and their indicators in an attempt to develop a more precise model for ITC evaluation. The proposed ITC model includes IT management, IT human resources, IT infrastructure, and implementation of IT solutions dimensions as well as the 25 related indicators. Drawing on the results of this paper, organizations can engage in evaluation and improve/create essential ITCs based on the evaluation results. Manuscript Document
    • Open Access Article

      18 - Using Decision Lattice Analysis to Model IOT-based Companies’ profit
      Nazanin Talebolfakhr Seyed Babak Ebrahimi Donya Rahmani
      Demand uncertainty and high initial investments for IOT-based projects lead to analyzing various types of options, especially real options in project execution to decrease these uncertainties. In this study, we investigate the firms’ expected profits that resulted from Full Text
      Demand uncertainty and high initial investments for IOT-based projects lead to analyzing various types of options, especially real options in project execution to decrease these uncertainties. In this study, we investigate the firms’ expected profits that resulted from appropriate chosen static and dynamic pricing strategies namely low-pricing, high-pricing, and contingent pricing combined with binomial decision lattices. Besides, the reciprocal influence between pricing strategies and IOT investment could provide useful insights for the firms that confront demand uncertainties in selling the firms’ products. We propose a model which is the integration of binomial decision lattices, which have been calculated by Real Option Super Lattice Solver 2017 software, and pricing policies under uncertainty. The results provide insights into what pricing strategies to choose based on the project’s real option value and the level of the firm uncertainty about the purchasing of the high-value consumer. Among the mentioned static and dynamic pricing strategies, high-pricing and contingent pricing strategies under different situations can be selected and expected profits of each of the strategies will be calculated and compared with each other. On the contrary, as the low-pricing strategy resulted in the lowest option value, it will not be scrutinized in this study. Experimental results show that if the IOT investment level and high-value consumer purchasing likelihood are high, the firm will implement the high-pricing strategy, otherwise choosing the contingent pricing due to the demand uncertainty would be appropriate. Manuscript Document
    • Open Access Article

      19 - Using Static Information of Programs to Partition the Input Domain in Search-based Test Data Generation
      Atieh Monemi Bidgoli haghighi haghighi
      The quality of test data has an important effect on the fault-revealing ability of software testing. Search-based test data generation reformulates testing goals as fitness functions, thus, test data generation can be automated by meta-heuristic algorithms. Meta-heurist Full Text
      The quality of test data has an important effect on the fault-revealing ability of software testing. Search-based test data generation reformulates testing goals as fitness functions, thus, test data generation can be automated by meta-heuristic algorithms. Meta-heuristic algorithms search the domain of input variables in order to find input data that cover the targets. The domain of input variables is very large, even for simple programs, while this size has a major influence on the efficiency and effectiveness of all search-based methods. Despite the large volume of works on search-based test data generation, the literature contains few approaches that concern the impact of search space reduction. In order to partition the input domain, this study defines a relationship between the structure of the program and the input domain. Based on this relationship, we propose a method for partitioning the input domain. Then, to search in the partitioned search space, we select ant colony optimization as one of the important and prosperous meta-heuristic algorithms. To evaluate the performance of the proposed approach in comparison with the previous work, we selected a number of different benchmark programs. The experimental results show that our approach has 14.40% better average coverage versus the competitive approach Manuscript Document