List of articles (by subject) IT Strategy


    • Open Access Article

      1 - A New Approach to Overcome the Count to Infinity Problem in DVR Protocol Based on HMM Modelling
      Mehdi Golestanian Reza Ghazizadeh
      Due to low complexity, power and bandwidth saving Distance Vector Routing has been introduced as one of the most popular dynamic routing protocol. However, this protocol has a serious drawback in practice called Count To Infinity problem or slow convergence. There are m More
      Due to low complexity, power and bandwidth saving Distance Vector Routing has been introduced as one of the most popular dynamic routing protocol. However, this protocol has a serious drawback in practice called Count To Infinity problem or slow convergence. There are many proposed solutions in the literature to solve the problem, but all of these methods depend on the network topology, and impose much computational complexity to the network. In this paper, we introduce a new approach to solve the Count To Infinity using hidden markov model (HMM), which is one of the most important machine learning tools. As the modelling results show, the proposed method is completely independent from the network topology and simple with low computational complexity. Manuscript profile
    • Open Access Article

      2 - An Approach to Compose Viewpoints of Different Stakeholders in the Specification of Probabilistic Systems
      Mahboubeh Samadi haghighi haghighi
      Developing large and complex systems often involves many stakeholders each of which has her own expectations from the system; hence, it is difficult to write a single formal specification of the system considering all of stakeholders’ requirements at once; instead, each More
      Developing large and complex systems often involves many stakeholders each of which has her own expectations from the system; hence, it is difficult to write a single formal specification of the system considering all of stakeholders’ requirements at once; instead, each stakeholder can specify the system from her own viewpoint first. Then, the resulting specifications can be composed to prepare the final specification. Much work has been done so far for the specification of non-probabilistic systems regarding viewpoints (or expectations) of different stakeholders; however, because of big trend to apply formal methods on probabilistic systems, in this paper, we present an approach to compose viewpoints of different stakeholders in the specification of probabilistic systems. According to this approach, different viewpoints are separately specified using the Z notation. Then, the resulting specifications are composed using some new operators proposed in this paper. We show the applicability of the presented approach by performing it on a known case study. Manuscript profile
    • Open Access Article

      3 - Defense against SYN Flooding Attacks: A Scheduling Approach
      Shahram Jamali Gholam Shaker
      The TCP connection management protocol sets a position for a classic Denial of Service (DoS) attack, called the SYN flooding attack. In this attack attacker sends a large number of TCP SYN segments, without completing the third handshaking step to quickly exhaust connec More
      The TCP connection management protocol sets a position for a classic Denial of Service (DoS) attack, called the SYN flooding attack. In this attack attacker sends a large number of TCP SYN segments, without completing the third handshaking step to quickly exhaust connection resources of the victim server. Therefore it keeps TCP from handling legitimate requests. This paper proposes that SYN flooding attack can be viewed metaphorically as result of an unfair scheduling that gives more opportunity to attack requests but prevents legal connections from getting services. In this paper, we present a scheduling algorithm that ejects the half connection with the longest duration, when number of half open connections reaches to the upper bound. The simulation results show that the proposed defense mechanism improves performance of the under attack system in terms of loss probability of requests and share of regular connections from system resources. Manuscript profile
    • Open Access Article

      4 - Internet Banking, Cloud Computing: Opportunities, Threats
      Monireh Hosseini Elias Fathi Kiadehi
      With the extension of Internet and its applications, internet banking is introduced as an efficient and cost effective way to provide services to customers. Towards the end of previous decade, cloud computing has been offered as a revolution in Internet application as a More
      With the extension of Internet and its applications, internet banking is introduced as an efficient and cost effective way to provide services to customers. Towards the end of previous decade, cloud computing has been offered as a revolution in Internet application as a service which effect on the way that service is provided. Regarding the service improvement based on customer’s needs, cloud computing is a quick move in informational services. This study tried to consider each aspect of internet banking and cloud computing strengths, weaknesses, opportunities and threats and provide SWOT analysis for Internet banking using cloud computing. In the following, the study tried to provide a practical solution for financial agencies and banks to provide better Internet banking services using cloud computing technology. Finally a SWOT analysis of internet banking using cloud computing technology is discussed and approved with expert opinions using fuzzy Delphi method. Manuscript profile
    • Open Access Article

      5 - Representing a Model to Measure Absorbency Of Information Technology in Small And Medium Sized Enterprises
      Mohammad Taghi Sadeghi Farzad  Movahedi Sobhani Ali Rajabzade Ghatari
      With rapid development of information technology (IT) and further deepening of informationization construction, more and more enterprises have realized the strategic value of IT and made great investments in it. However, during the IT implementation process, decision-ma More
      With rapid development of information technology (IT) and further deepening of informationization construction, more and more enterprises have realized the strategic value of IT and made great investments in it. However, during the IT implementation process, decision-making, adaptation degree, and IT performance are often inferior to the anticipation. The assimilation of technology can be defined by the extent to which the use of Information technology spreads across organizational processes and becomes routinized in activities. Capabilities of information technology play crucial role in an ever-changing environment and are considered as one of the most important sources for enterprises while enterprises should acquire some effective capabilities so that they can effectively deploy and utilize information technology. The purpose of this investigation is to represent a model to measure absorbency of information technology in small and medium-sized enterprises. To do so, dimensions of the "absorbency of information technology" was determined through exploratory factor analysis in a survey research and confirmatory factor analysis was used to confirm model validity. Findings show that three dimensions are related to absorbency of information technology including the capability for innovative technology, Inside-Out IT capability and IT management capability, among which the capability for innovative technology has the highest correlation with the concept of absorbency of information technology. Manuscript profile
    • Open Access Article

      6 - Assessing the Company's E-Readiness for Implementing Mobile-CRM System
      Alireza Kamanghad Gholamreza Hashemzade Mohammadali Afshar kazemi Nosratollah Shadnoosh
      In today’s world, most of companies are trying to survive in a competitive environment which has been increased in recent years. This competition has raised the customer power to select desired products and services among different suppliers and providers. So the import More
      In today’s world, most of companies are trying to survive in a competitive environment which has been increased in recent years. This competition has raised the customer power to select desired products and services among different suppliers and providers. So the importance of customer satisfaction and loyalty has been increased dramatically for companies and businesses. This is more important for distributor companies who deal with a lot of customers in a B2B market. Mobile-CRM has emerged new opportunities on customer satisfaction and can play as an efficient tool that will make great adjustments, savings and benefits for companies to provide better services for customers and have more retain customers. But implementing a Mobile-CRM system is a complicated large project that affects all aspects of an organization and needs a huge investment which increases the risk of failure. To avoid this risk, the assessing of company’s E-Readiness before starting main project is necessary. In this research we have used VERDICT model as a suitable model for assessing E-Readiness of a company willing to implement a Mobile-CRM system. A large distributor company is the case study of this research. The research is conducted based on a descriptive-survey method using questionnaire tools for extracting the experts' opinion and determining the company’s E-Readiness level. Manuscript profile
    • Open Access Article

      7 - The Innovation Roadmap and Value Creation for Information Goods Pricing as an Economic Commodity
      Hekmat Adelnia Najafabadi Ahmadreza Shekarchizadeh Akbar Nabiollahi Naser Khani Hamid Rastegari
      Nowadays, most books and information resources or even movies and application programs are produced and reproduced as information goods. Regarding characteristics of information goods, its cost structure and market, the usual and traditional pricing methods for such com More
      Nowadays, most books and information resources or even movies and application programs are produced and reproduced as information goods. Regarding characteristics of information goods, its cost structure and market, the usual and traditional pricing methods for such commodity are not useful and the information goods pricing has undergone innovative approaches. The purpose of product pricing is to find an optimal spot for maximizing manufacturers' profits and consumers' desirability. Undoubtedly, in order to achieve this goal, it is necessary to adopt appropriate strategies and implement innovative strategies. Innovative strategies and tactics reflect the analysis of market share, customer behavior change, pattern of cost, customer preferences, quick response to customer needs, market forecast, appropriate response to market changes, customer retention, discovery of their specific requirements, cost reduction and customer satisfaction increase. In this research, 32 papers have been selected among 540 prestigious articles to create a canvas containing more than 20 possible avenues for innovations in the field of information goods pricing, which can be used in the companies producing information goods, regardless of their size, nationality, and type of information goods they produce. Introduction of some key ideas on how to increase both profits and customer satisfaction and also three open issues for future research in the field of information goods pricing is one of the achievements of this research. Manuscript profile
    • Open Access Article

      8 - A way to improve Adaptive Maintenance in Enterprise Architecture
      feridon Shams safura oviesi
      Lately, one of the biggest challenges in enterprise is the strategic alignment of information technology with business. Enterprises use various methods to achieve this strategic alignment. Enterprise architecture is an effective approach that allows optimal management o More
      Lately, one of the biggest challenges in enterprise is the strategic alignment of information technology with business. Enterprises use various methods to achieve this strategic alignment. Enterprise architecture is an effective approach that allows optimal management of Enterprise’s information technology and strategic alignment of IT functionalities and business requirements. These days, considering dynamic environments, there is the possibility of any kind of change in enterprise’s conditions, especially after implementation of Enterprise architecture. This change of conditions demonstrates itself in a variety of forms. In these cases, decision making should be done as an appropriate response to these changes which should be predictable. Otherwise it would lead to lack of proper response and consequently, readjustment of Enterprise architecture document, which imposes many human and financial costs on the enterprise. In addition, the enterprise’s progress toward competitive advantages will be stopped. The appropriate response and adaptability to these changes is a concept represented under the title of adaptive maintenance of Enterprise architecture. In the following article with the help of a software maintenance method and examining the possibility of extending into the Enterprise architecture maintenance, through a case study on Power Distribution Company of Golestan province, it is shown how the improvement of adaptive maintenance of Enterprise architecture can be assisted and the possibility of implementation of various types of changes in business and information technology without disturbing the Enterprise is provided. Manuscript profile
    • Open Access Article

      9 - Localization of Blockchain and E-Currency Model for E-Government Services
      Maryam Niknezhad Sajjad Shokouhyar Mehrzad Minouei
      Blockchain can reduce bureaucracy and increase the efficiency and performance of administrative processes through a platform possessing features and attributes such as storing and exchanging electronic messages in a decentralized environment and executing high level of More
      Blockchain can reduce bureaucracy and increase the efficiency and performance of administrative processes through a platform possessing features and attributes such as storing and exchanging electronic messages in a decentralized environment and executing high level of security transactions and transparency, if used in government public service delivery. Many scholars believe that this distributed technology can bring new utilizations to a variety of industries and fields, including finance and banking, economics, supply chain, and authentication and increase economic productivity and efficiency dramatically by transforming many industries in the context of today's economy. The present study, presents the characteristics of the localized blockchain and e-currency conceptual model for the evolution of e-government services. It also examines the impact of the blockchain and e-currency model on the economy and electronic financial transactions as a viable, practical and constructive solution (rather than blocking and filtering of e-currency and blockchain). Ultimately designing a localized block chain and e-currency model, has played an effective role in exploit its high potential to speed up the administrative processes and reduce costs related to electronic transactions and payments in e-government and increase e-government revenues and ultimately it can speed up the customer service delivery and increase their satisfaction with the government. Manuscript profile
    • Open Access Article

      10 - Model of Technological, Managerial and Marketing Infrastructure for Intelligent Technology Efficiency in Telecommunication Industry - Case Study: Telecommunication Infrastructure Company of Ilam Province1
      Heshmat morad haseli Jalal Haghighatmonfared
      Today’s, intelligent agent system (IAS) are considered as an important part of people's lives. Therefore, many of organizations try to implement IAS in their mechanism. One of these organizations in Iran is telecommunication Infrastructure Company. Because any implement More
      Today’s, intelligent agent system (IAS) are considered as an important part of people's lives. Therefore, many of organizations try to implement IAS in their mechanism. One of these organizations in Iran is telecommunication Infrastructure Company. Because any implementation need a model which clarify the structural and contextual components, therefore, the current research is conducted to provide a model for developing the necessary infrastructure for implementation of intelligent technologies in the communication and telecommunication mechanisms of Ilam Province. To achieve the goal, a qualitative approach and thematic analysis method were used. The research population consisted of all experts in the field of ICT in Ilam province Infrastructure Communications Company that using purposeful sampling method and relying on theoretical data saturation, 10 of them were selected as sample. Semi-structured interviews were used to collect the data. The data were analyzed through theme analysis. Based on the method, 4 themes, 10 main categories and 153 open codes were extracted. The findings of the study showed that to transform communication mechanisms into intelligent technologies, there must be technological, management, marketing and cultural infrastructure. Technological infrastructure consisted of intelligent software and hardware; management infrastructure consisted of knowledge and belief; marketing infrastructure included attracting intelligent technology to audiences, encouraging ideas, physical and virtual channels; and finally, cultural infrastructure, it was staff training and public awareness. Manuscript profile
    • Open Access Article

      11 - Digital Transformation Model, Based on Grounded Theory
      Abbas Khamseh Mohammad Ali Mirfallah Lialestani Reza Radfar
      Given the emergence of Digital Transformation from Industry 4.0 and the rapid dissemination of technological innovations as well as their impact as a strong driving force in new businesses, efforts should be made to identify the dimensions of this core factor as rapidly More
      Given the emergence of Digital Transformation from Industry 4.0 and the rapid dissemination of technological innovations as well as their impact as a strong driving force in new businesses, efforts should be made to identify the dimensions of this core factor as rapidly as possible. Providing a comprehensive overview of all aspects of the model. The purpose of this article is to provide insights into the state of the art of digital transformation in the last years and suggest ways for future research. This analysis is like a mapping of the subject literature into categories, so that with the help of a number of experts the evolutionary trends can be identified and further researched. In this way, with a deeper understanding of the subject, we have attempted to identify existing gaps. The findings suggest that organizations of all sizes must adapt their business strategy to the realities of digital transformation. This will largely lead to changing business processes as well as managing operations in a new and more intelligent tool-based way. Based on this research, organizations will evolve not just on their own, but on the whole value chain, and this will clearly change the way they produce and deliver value. Organizations can develop their digital ecosystem by creating and developing innovation centers and using open innovation strategy, and as a result, link their digital business to a value chain. Also in this article, we have identified the main categories and subcategories by examining the sources and using the grounded theory approach, as well as determining the relationship between them. Finally, we completed the work by identifying the digital transformation model as the central phenomenon of research. Manuscript profile
    • Open Access Article

      12 - IT Capability Evaluation through the IT Capability Map
      mina ranjbarfard Seyedeh Reyhaneh Mirsalari
      Organizations are increasingly in search of ways to derive more business values from IT investments and the need for IT capabilities (ITC) is surging. ITC is critical significant to build enterprise agility and promote organizational performance. However, IT capability More
      Organizations are increasingly in search of ways to derive more business values from IT investments and the need for IT capabilities (ITC) is surging. ITC is critical significant to build enterprise agility and promote organizational performance. However, IT capability is always treated as the causal factor already existing and there are few studies on how IT capability is created and evaluated. Appropriate evaluation is necessary for an organization to measure, manage and improve enterprise ITC. This research aims to identify and map the dimensions of an organization's ITC. Using a mixed research method, this paper comprises two sections. The qualitative section adopts a systematic literature review (SLR) approach to identify the dimensions of ITC. The quantitative section employs factor analysis to validate identified ITC dimensions and their indicators in an attempt to develop a more precise model for ITC evaluation. The proposed ITC model includes IT management, IT human resources, IT infrastructure, and implementation of IT solutions dimensions as well as the 25 related indicators. Drawing on the results of this paper, organizations can engage in evaluation and improve/create essential ITCs based on the evaluation results. Manuscript profile
    • Open Access Article

      13 - Using Decision Lattice Analysis to Model IOT-based Companies’ profit
      Nazanin Talebolfakhr Seyed Babak Ebrahimi Donya Rahmani
      Demand uncertainty and high initial investments for IOT-based projects lead to analyzing various types of options, especially real options in project execution to decrease these uncertainties. In this study, we investigate the firms’ expected profits that resulted from More
      Demand uncertainty and high initial investments for IOT-based projects lead to analyzing various types of options, especially real options in project execution to decrease these uncertainties. In this study, we investigate the firms’ expected profits that resulted from appropriate chosen static and dynamic pricing strategies namely low-pricing, high-pricing, and contingent pricing combined with binomial decision lattices. Besides, the reciprocal influence between pricing strategies and IOT investment could provide useful insights for the firms that confront demand uncertainties in selling the firms’ products. We propose a model which is the integration of binomial decision lattices, which have been calculated by Real Option Super Lattice Solver 2017 software, and pricing policies under uncertainty. The results provide insights into what pricing strategies to choose based on the project’s real option value and the level of the firm uncertainty about the purchasing of the high-value consumer. Among the mentioned static and dynamic pricing strategies, high-pricing and contingent pricing strategies under different situations can be selected and expected profits of each of the strategies will be calculated and compared with each other. On the contrary, as the low-pricing strategy resulted in the lowest option value, it will not be scrutinized in this study. Experimental results show that if the IOT investment level and high-value consumer purchasing likelihood are high, the firm will implement the high-pricing strategy, otherwise choosing the contingent pricing due to the demand uncertainty would be appropriate. Manuscript profile
    • Open Access Article

      14 - Using Static Information of Programs to Partition the Input Domain in Search-based Test Data Generation
      Atieh Monemi Bidgoli Hassan haghighi
      The quality of test data has an important effect on the fault-revealing ability of software testing. Search-based test data generation reformulates testing goals as fitness functions, thus, test data generation can be automated by meta-heuristic algorithms. Meta-heurist More
      The quality of test data has an important effect on the fault-revealing ability of software testing. Search-based test data generation reformulates testing goals as fitness functions, thus, test data generation can be automated by meta-heuristic algorithms. Meta-heuristic algorithms search the domain of input variables in order to find input data that cover the targets. The domain of input variables is very large, even for simple programs, while this size has a major influence on the efficiency and effectiveness of all search-based methods. Despite the large volume of works on search-based test data generation, the literature contains few approaches that concern the impact of search space reduction. In order to partition the input domain, this study defines a relationship between the structure of the program and the input domain. Based on this relationship, we propose a method for partitioning the input domain. Then, to search in the partitioned search space, we select ant colony optimization as one of the important and prosperous meta-heuristic algorithms. To evaluate the performance of the proposed approach in comparison with the previous work, we selected a number of different benchmark programs. The experimental results show that our approach has 14.40% better average coverage versus the competitive approach Manuscript profile
    • Open Access Article

      15 - Propose an E-CRM Model based on Mobile Computing Technology in Pharma Distribution Industry
      Alireza Kamanghad Gholamreza Hashemzade Mohammadali Afshar kazemi Nosratollah Shadnoosh
      In today’s world, the competition between all business areas and companies including pharma distributor companies has increased dramatically, so it is very important for active companies in the pharma distribution industry which deal with a large number of customers in More
      In today’s world, the competition between all business areas and companies including pharma distributor companies has increased dramatically, so it is very important for active companies in the pharma distribution industry which deal with a large number of customers in a B2B market to establish a deep and long-term relationship with their customers and manage that relationship effectively. Since the CRM which now is enriched by new emerging technologies in terms of e-CRM and m-CRM is under developing rapidly, it can play a critical role for empowering these companies to strengthen their relationship with their customers. In this research it has been tried to have a complete review of mobile computing technology concept and its effect on CRM. The research methodology is basically qualitative. After a literature review, using qualitative research methods and deep interviews with a group of 8 industry experts, the whole concept of the initial model was derived using Thematic Analysis method. The Grounded Theory approach was applied to extract the main factors and sub-factors of the final model. Additionally, some of \research techniques such as Dematel, ANP and Super Decision software were used to investigate the interdependency, importance and priority of factors and sub-factors. At the last stage a new model for e-CRM in pharma distribution industry based on mobile computing technology has been proposed. The four key components of the model are Quality of Content and Services, Organizational Readiness, Quality of System and Communication, Customer Mobile App. Manuscript profile
    • Open Access Article

      16 - ARASP: An ASIP Processor for Automated Reversible Logic Synthesis
      Zeinab Kalantari Marzieh Gerami Mohammad eshghi
      Reversible logic has been emerged as a promising computing paradigm to design low power circuits in recent years. The synthesis of reversible circuits is very different from that of non-reversible circuits. Many researchers are studying methods for synthesizing reversib More
      Reversible logic has been emerged as a promising computing paradigm to design low power circuits in recent years. The synthesis of reversible circuits is very different from that of non-reversible circuits. Many researchers are studying methods for synthesizing reversible combinational logic. Some automated reversible logic synthesis methods use optimization algorithms Optimization algorithms are used in some automated reversible logic synthesis techniques. In these methods, the process of finding a circuit for a given function is a very time-consuming task, so it’s better to design a processor which speeds up the process of synthesis. Application specific instruction set processors (ASIP) can benefit the advantages of both custom ASIC chips and general DSP chips. In this paper, a new architecture for automatic reversible logic synthesis based on an Application Specific Instruction set Processors is presented. The essential purpose of the design was to provide the programmability with the specific necessary instructions for automated synthesis reversible. Our proposed processor that we referred to as ARASP is a 16-bit processor with a total of 47 instructions, which some specific instruction has been set for automated synthesis reversible circuits. ARASP is specialized for automated synthesis of reversible circuits using Genetic optimization algorithms. All major components of the design are comprehensively discussed within the processor core. The set of instructions is provided in the Register Transform Language completely. Afterward, the VHDL code is used to test the proposed architecture. Manuscript profile
    • Open Access Article

      17 - Detection of Attacks and Anomalies in the Internet of Things System using Neural Networks Based on Training with PSO Algorithms, Fuzzy PSO, Comparative PSO and Mutative PSO
      Mohammad  Nazarpour navid nezafati Sajjad  Shokouhyar
      Integration and diversity of IOT terminals and their applicable programs make them more vulnerable to many intrusive attacks. Thus, designing an intrusion detection model that ensures the security, integrity, and reliability of IOT is vital. Traditional intrusion detect More
      Integration and diversity of IOT terminals and their applicable programs make them more vulnerable to many intrusive attacks. Thus, designing an intrusion detection model that ensures the security, integrity, and reliability of IOT is vital. Traditional intrusion detection technology has the disadvantages of low detection rates and weak scalability that cannot adapt to the complicated and changing environment of the Internet of Things. Hence, one of the most widely used traditional methods is the use of neural networks and also the use of evolutionary optimization algorithms to train neural networks can be an efficient and interesting method. Therefore, in this paper, we use the PSO algorithm to train the neural network and detect attacks and abnormalities of the IOT system. Although the PSO algorithm has many benefits, in some cases it may reduce population diversity, resulting in early convergence. Therefore,in order to solve this problem, we use the modified PSO algorithm with a new mutation operator, fuzzy systems and comparative equations. The proposed method was tested with CUP-KDD data set. The simulation results of the proposed model of this article show better performance and 99% detection accuracy in detecting different malicious attacks, such as DOS, R2L, U2R, and PROB. Manuscript profile
    • Open Access Article

      18 - Recognition of Attention Deficit/Hyperactivity Disorder (ADHD) Based on Electroencephalographic Signals Using Convolutional Neural Networks (CNNs)
      Sara Motamed Elham Askari
      Impulsive / hyperactive disorder is a neuro-developmental disorder that usually occurs in childhood, and in most cases parents find that the child is more active than usual and have problems such as lack of attention and concentration control. Because this problem might More
      Impulsive / hyperactive disorder is a neuro-developmental disorder that usually occurs in childhood, and in most cases parents find that the child is more active than usual and have problems such as lack of attention and concentration control. Because this problem might interfere with your own learning, work, and communication with others, it could be controlled by early diagnosis and treatment. Because the automatic recognition and classification of electroencephalography (EEG) signals is challenging due to the large variation in time features and signal frequency, the present study attempts to provide an efficient method for diagnosing hyperactive patients. The proposed method is that first, the recorded brain signals of hyperactive subjects are read from the input and in order to the signals to be converted from time range to frequency range, Fast Fourier Transform (FFT) is used. Also, to select an effective feature to check hyperactive subjects from healthy ones, the peak frequency (PF) is applied. Then, to select the features, principal component analysis and without principal component analysis will be used. In the final step, convolutional neural networks (CNNs) will be utilized to calculate the recognition rate of individuals with hyperactivity. For model efficiency, this model is compared to the models of K- nearest neighbors (KNN), and multilayer perceptron (MLP). The results show that the best method is to use feature selection by principal component analysis and classification of CNNs and the recognition rate of individuals with ADHD from healthy ones is equal to 91%. Manuscript profile
    • Open Access Article

      19 - An ICT Performance Evaluation Model based on Meta-Synthesis Approach
      Khatrehe Bamary Mohammad Reza Behboudi Tayebeh Abbasnjad
      Information and Communication Technology (ICT) is one of the key determinants for today’s organizational success. Therefore, companies spend a significant amount of money each year on ICT, while not being sure that they will get a good result. The purpose of this study More
      Information and Communication Technology (ICT) is one of the key determinants for today’s organizational success. Therefore, companies spend a significant amount of money each year on ICT, while not being sure that they will get a good result. The purpose of this study is to identify the dimensions and indicators of ICT performance evaluation and suggesting a model for assessing it in organizations. This research is mainly a qualitative study with a meta-synthesis approach which uses the seven-stage qualitative method of Sandelowski and Barroso to systematically review the literature to find sub-indices (codes), indices (themes) and dimensions (categories) of ICT performance evaluation. The search of scientific databases with appropriate keywords found 516 articles, among them, 89 articles were chosen finally and used for analysis. Moreover, a questionnaire has been designed and answered by ICT experts and managers to determine the importance of each of the indicators of the model. Based on data analysis, the proposed ICT performance evaluation model has three dimensions: strategic, quality, and sustainability. The strategic dimension includes indicators of organization strategy, IT strategy, and alignment. The quality dimension includes maturity, and performance indicators; and finally, the sustainability dimension includes environmental, economic, and social indicators. For each of these indicators detailed list of sub-indices (104), which are substantial for evaluation of ICT performance in organizations, were identified and explained. Manuscript profile
    • Open Access Article

      20 - Foreground-Back ground Segmentation using K-Means Clustering Algorithm and Support Vector Machine
      Masoumeh Rezaei mansoureh rezaei Masoud Rezaei
      Foreground-background image segmentation has been an important research problem. It is one of the main tasks in the field of computer vision whose purpose is detecting variations in image sequences. It provides candidate objects for further attentional selection, e.g., More
      Foreground-background image segmentation has been an important research problem. It is one of the main tasks in the field of computer vision whose purpose is detecting variations in image sequences. It provides candidate objects for further attentional selection, e.g., in video surveillance. In this paper, we introduce an automatic and efficient Foreground-background segmentation. The proposed method starts with the detection of visually salient image regions with a saliency map that uses Fourier transform and a Gaussian filter. Then, each point in the maps classifies as salient or non-salient using a binary threshold. Next, a hole filling operator is applied for filling holes in the achieved image, and the area-opening method is used for removing small objects from the image. For better separation of the foreground and background, dilation and erosion operators are also used. Erosion and dilation operators are applied for shrinking and expanding the achieved region. Afterward, the foreground and background samples are achieved. Because the number of these data is large, K-means clustering is used as a sampling technique to restrict computational efforts in the region of interest. K cluster centers for each region are set for training of Support Vector Machine (SVM). SVM, as a powerful binary classifier, is used to segment the interest area from the background. The proposed method is applied on a benchmark dataset consisting of 1000 images and experimental results demonstrate the supremacy of the proposed method to some other foreground-background segmentation methods in terms of ER, VI, GCE, and PRI. Manuscript profile
    • Open Access Article

      21 - Deep Learning-based Educational User Profile and User Rating Recommendation System for E-Learning
      Pradnya Vaibhav  Kulkarni Sunil Rai Rajneeshkaur Sachdeo Rohini Kale
      In the current era of online learning, the recommendation system for the eLearning process is quite important. Since the COVID-19 pandemic, eLearning has undergone a complete transformation. Existing eLearning Recommendation Systems worked on collaborative filtering or More
      In the current era of online learning, the recommendation system for the eLearning process is quite important. Since the COVID-19 pandemic, eLearning has undergone a complete transformation. Existing eLearning Recommendation Systems worked on collaborative filtering or content-based filtering based on historical data, students’ previous grade, results, or user profiles. The eLearning system selected courses based on these parameters in a generalized manner rather than on a personalized basis. Personalized recommendations, information relevancy, choosing the proper course, and recommendation accuracy are some of the issues in eLearning recommendation systems. In this paper, existing conventional eLearning and course recommendation systems are studied in detail and compared with the proposed approach. We have used, the dataset of User Profile and User Rating for a recommendation of the course. K Nearest Neighbor, Support Vector Machine, Decision Tree, Random Forest, Nave Bayes, Linear Regression, Linear Discriminant Analysis, and Neural Network were among the Machine Learning techniques explored and deployed. The accuracy achieved for all these algorithms ranges from 0.81 to 0.97. The proposed algorithm uses a hybrid approach by combining collaborative filtering and deep learning. We have improved accuracy to 0.98 which indicate that the proposed model can provide personalized and accurate eLearning recommendation for the individual user. Manuscript profile
    • Open Access Article

      22 - Trip Timing Algorithm for GTFS Data with Redis Model to Improve the Performance
      Mustafa Alzaidi Aniko Vagner
      Accessing public transport plays an essential role in the daily life productivity of people in urban regions. Therefore, it is necessary to represent the spatiotemporal diversity of transit services to evaluate public transit accessibility appropriately. That can be acc More
      Accessing public transport plays an essential role in the daily life productivity of people in urban regions. Therefore, it is necessary to represent the spatiotemporal diversity of transit services to evaluate public transit accessibility appropriately. That can be accomplished by determining the shortest path or shortest travel time trip plan. Many applications like ArcGIS provide tools to estimate the trip time using GTFS data. They can perform well in finding travel time. Still, they can be computationally inefficient and impractical with increasing the data dimensions like searching all day time or in case of huge data. Some research proposed recently provides more computationally efficient algorithms to solve the problem. This paper presents a new algorithm to find the timing information for a trip plan between two start and destination points. Also, we introduce RMH (Range Mapping Hash) as a new approach using Redis NoSQL to find and calculate the accessibility of a trip plan with fixed time complexity of O(2) regardless of the city size (GTFS size). We experimented with the performance of this approach and compared it with the traditional run-time algorithm using GTFS data of Debrecen and Budapest. This Redis model can be applied to similar problems where input can be divided into ranges with the same output. Manuscript profile
    • Open Access Article

      23 - Spectrum Sensing of OFDM Signals Utilizing Higher Order Statistics under Noise Uncertainty Environments in Cognitive Radio Systems
      MOUSUMI HAQUE Tetsuya Shimamura
      Cognitive radio (CR) is an important issue to solve the spectrum scarcity problem for modern and forthcoming wireless communication systems. Spectrum sensing is the ability of the CR systems to sense the primary user signal to detect an ideal portion of the radio spectr More
      Cognitive radio (CR) is an important issue to solve the spectrum scarcity problem for modern and forthcoming wireless communication systems. Spectrum sensing is the ability of the CR systems to sense the primary user signal to detect an ideal portion of the radio spectrum. Spectrum sensing is mandatory to solve the spectrum scarcity problem and the interference problem of the primary user. Noise uncertainty consideration for orthogonal frequency division multiplexing (OFDM) transmitted signals in severe noise environments is a challenging issue for measuring the performance of spectrum sensing. This paper proposed a method using higher order statistics (HOS) functions including skewness and kurtosis for improving the sensing performance of a cyclic prefix (CP) based OFDM transmitted signal for noise uncertainty. The detection performance of OFDM systems is measured for various CP sizes using a higher order digital modulation technique over a multipath Rayleigh fading channel for low signal-to-noise ratio (SNR) cases. In the proposed method, the CP-based OFDM transmitted signal sensing performance is measured and compared with the conventional methods under noise uncertainty environments. Through comprehensive evaluation of simulation, it is demonstrated that the sensing performance of this method significantly outperforms conventional schemes in the case of noise uncertainty in severe noise environments. Manuscript profile
    • Open Access Article

      24 - Software-Defined Networking Adoption Model: Dimensions and Determinants
      Elham Ziaeipour Ali Rajabzadeh Ghotri Alireza Taghizadeh
      The recent technical trend in the field of communication networks shows a paradigm change from hardware to software. Software Defined Networking (SDN) as one of the enablers of digital transformation could have prominent role in this paradigm shift and migration to Know More
      The recent technical trend in the field of communication networks shows a paradigm change from hardware to software. Software Defined Networking (SDN) as one of the enablers of digital transformation could have prominent role in this paradigm shift and migration to Knowledge-based network. In this regard, telecom operators are interested in deploying SDN to migrate their infrastructure from a static architecture to a dynamic and programmable platform. However, it seems that they do not consider SDN as one of their priorities and still depend on traditional methods to manage their network (especially in some developing countries such as Iran). Since the first step in applying new technologies is to accept them, we have proposed a comprehensive SDN adoption model with the mixed-method research methodology. At first, the theoretical foundations related to the research problem were examined. Then, based on Grounded theory, in-depth interviews were conducted with 12 experts (including university professors and managers of the major telecom operators). In result, more than a thousand initial codes were determined, which in the review stages and based on semantic commonalities, a total of 112 final codes, 14 categories and 6 themes have been extracted using open, axial and selective coding. Next, in order to confirm the indicators extracted from the qualitative part, the fuzzy Delphi method has been used. In the end, SPSS and SmartPLS 3 software were used to analyze the data collected from the questionnaire and to evaluate the fit of the model as well as confirm and reject the hypotheses. Manuscript profile