فیلتر های جستجو: فیلتری انتخاب نشده است.
نمایش ۲٬۷۴۱ تا ۲٬۷۶۰ مورد از کل ۲٬۷۹۴ مورد.
۲۷۴۱.

Sustainable Decision-Making Model: Loyalty Points Through Email Communication With Real Option Valuation(مقاله علمی وزارت علوم)

کلید واژه ها: Sustainable Investment Net Present Value Real Option Valuation

حوزه های تخصصی:
تعداد بازدید : ۷۵ تعداد دانلود : ۷۲
Nowadays, many companies cannot see the digital investment that plays a main role in the IR 4.0. Therefore, this study is investigating the study of investment as plays a critical role in an analytical activity to assess the benefits and costs of an investment and can be used as an investment justification. Traditional investment appraisal uses a financial approach where the benefits and costs are quantified in a certain amount of value for money and then compared in value. Moreover, this study is revealed the fruitful outcomes because revealed the investment valuation method with NPV (Net Present Value) and ROV (Real Option Valuation). ROV is an alternative to financial valuation. Seeding from the same philosophy as Financial Option, ROV has advantages in handling the flexibility, risk, and volatility that may occur from an investment. Thus, ROV is considered more able to appreciate an investment that has these characteristics. Investment appraisal with ROV is better able to appreciate investment than traditional financial methods, as shown by ROV's NPV results in the case of marketing with Loyalty points through email communication as a digital investment that are greater than ordinary NPV. This is because ROV can appreciate flexibility in investments that have choices of investment plans in the future
۲۷۴۲.

بررسی تاثیر رفتارهای پنهان کننده دانش بر سکوت کارکنان و رفتارهای منحرف سازمانی با نقش میانجی نقض قرارداد روانشناختی (نمونه پژوهش: اداره کل امور مالیاتی مودیان بزرگ)(مقاله علمی وزارت علوم)

کلید واژه ها: رفتارهای پنهان کننده دانش سکوت کارکنان رفتارهای منحرف سازمانی

حوزه های تخصصی:
تعداد بازدید : ۷۳ تعداد دانلود : ۸۷
هدف از پژوهش حاضر، بررسی تاثیر رفتارهای پنهان کننده دانش بر سکوت کارکنان و رفتارهای منحرف سازمانی با نقش میانجی نقض قرارداد روانشناختی می باشد. این پژوهش از نظر نوع هدف، کاربردی و از نظر نوع ماهیت، توصیفی- پیمایشی است. جامعه آماری پژوهش حاضر، شامل کارکنان اداره امور مالیاتی مودیان بزرگ که مشتمل بر 400 نفر می باشند که تعداد 227 نفر به روش تصادفی ساده و به روش تحلیل توان به عنوان نمونه آماری انتخاب گردیدند. جهت گردآوری اطلاعات از پرسشنامه استاندارد استفاده شده است و داده ها بوسیله تحلیل چندمتغیره مبتنی بر مدل سازی معادلات ساختاری با رویکرد کواریانس محور در بستر نرم افزار Amos ورژن 24 مورد تجزیه و تحلیل قرار گرفت. نتایج تحقیق حاکی از تایید تاثیر پنهان کاری منطقی بر سکوت تدافعی، پنهان کاری گریزان بر سکوت رابطه ای، پنهان کاری منطقی بر سکوت رابطه ای، پنهان کاری گریزان بر سکوت بی اثر، پنهان کاری منطقی بر سکوت بی اثر و سکوت تدافعی بر رفتار منحرف سازمانی، سکوت رابطه ای بر رفتار منحرف سازمانی و سکوت بی اثر بر رفتار منحرف سازمانی می باشد و همچنین نتایج حاصل از تحلیل میانجی نشان می دهد که سازه "نقض قرارداد روانشناختی" برای تمامی روابط میان ابعاد پنهان کاری و ابعاد سکوت دارای نقش میانجی است، به طوری که فرآیند میانجی گری مذکور برای روابط علی میان "پنهان کاری خاموش" و "سکوت تدافعی/ سکوت بی اثر" به صورت کامل و برای مابقی روابط به صورت جزئی است. در نهایت، از میان بیست و یک فرضیه مطروحه، هفده فرضیه مورد تائید قرار گرفت که از این بین تاثیر سکوت رابطه ای بر رفتار منحرف سازمانی از بالاترین ضریب مسیر (0.33) برخوردار است.
۲۷۴۳.

Social Media Value Creation Practices and Interactivity of Electronic Word of Mouth Systems(مقاله علمی وزارت علوم)

کلید واژه ها: social media Value Creation Social media marketing Consumer engagement Online shopping

حوزه های تخصصی:
تعداد بازدید : ۷۱ تعداد دانلود : ۵۸
The main drivers of value creation in a ‘brand community’ are social networking, community engagement, impression management, and brand use. Marketers are therefore interested in determining which factors affect the value creation practices. This study examines the impact of the Interactivity of Electronic Word of Mouth (EWOM) systems on value creation practices in a brand community, which in turn influences the loyalty of the customers. In this regard, a conceptual model was developed and tested by the researchers of the current study. The results indicate that perceptions of the users regarding the interactivity of EWOM systems, highly impact only three of the four value creation practices including community engagement practices, impression management practices, and brand use practices. Furthermore, the researchers found that collective value creation practices could significantly and directly enhance brand loyalty. Several theoretical contributions and managerial implications were also discussed
۲۷۴۴.

Information Systems in Fiscal Administration and Modeling of Excise Tax(مقاله علمی وزارت علوم)

کلید واژه ها: information systems Fiscal Efficiency Tax Administration Excise Tax Functions of the Excise Tax Modeling Methods Brewing Industry

حوزه های تخصصی:
تعداد بازدید : ۷۰ تعداد دانلود : ۳۶
The purpose of the article is to substantiate the fiscal role of the excise tax by studying its information and functional potential and to model the dynamics of its payment by the brewing industry. Excise tax occupies a special place in a tax system of each state because, in addition to significant fiscal importance, it has a considerable regulatory impact on the production and consumption of certain categories of goods. Based on information systems in the article analyses and monitors the indicators of the excise tax payments on goods produced in Ukraine on the example of a particular enterprise in the brewing industry. By means of the initial data analysis of autocorrelation functions of volumes’ indicators of the accrued excise taxes on beer the expediency of modelling realization of such indicator dynamics on the basis of ARIMA model is proved. The analytical and statistical approaches to the formation of models for the implementation of forecast for the calculation of excise tax on beer of brewing industry enterprises are improved. The proposed approach is based on the values of autocorrelation of balances and partial autocorrelation, as well as methods of analysis of time series with gaps, which allows to use it in the economic activity of enterprises to make forecasts for the calculation and payment of the excise tax. This will produce financial effects for the brewing industry in terms of cost optimization and minimization of the excise tax risks.
۲۷۴۵.

Towards Supporting Exploratory Search over the Arabic Web Content: The Case of ArabXplore(مقاله علمی وزارت علوم)

نویسنده:

کلید واژه ها: Exploratory Search Arabic Wikipedia PageRank Entity Ranking

حوزه های تخصصی:
تعداد بازدید : ۶۷ تعداد دانلود : ۴۷
Due to the huge amount of data published on the Web, the Web search process has become more difficult, and it is sometimes hard to get the expected results, especially when the users are less certain about their information needs. Several efforts have been proposed to support exploratory search on the web by using query expansion, faceted search, or supplementary information extracted from external knowledge resources. However, these solutions are not well explored for the general web search in an open-domain setting. In addition, they mostly focus on supporting search in content expressed in English and Latin based languages. In this research, we propose a fully automated approach that aims to support exploratory search over the Arabic web content. It exploits the Arabic version of Wikipedia to extract complementary information that supports visual representation and deeper exploration of the search engine's results. Key Wikipedia entities are extracted from the text snippets produced by the search engine in response to the user's query. Entities are then filtered and ranked by using a novel ranking algorithm that extends the conventional PageRank algorithm. Finally, a graph is built and presented to the user to visually represent highly ranked topics and their relationships. The proposed approach was realized by developing ArabXplore, a system that integrates with the web browser to support the web search process by executing our approach in query time. It was assessed over a dataset of 100 Arabic search queries covering different domains, and results were assessed and rated by human subjects. The underlying ranking algorithm was also compared with the conventional PageRank.
۲۷۴۶.

The Role of E-Word of Mouth in the Relationship between Online Destination Image, E-satisfaction, E-Trust & E-Service Quality for International Tourists Perception(مقاله علمی وزارت علوم)

کلید واژه ها: E-Word of Mouth E-Trust and E-Service Quality Online Destination Image

حوزه های تخصصی:
تعداد بازدید : ۶۷ تعداد دانلود : ۵۳
Destination Image as a development which comprises of interrelated assessments converged with general impressions and convictions dependent on data preparing from an assortment of sources after some time; little research has concentrated on picture arrangement corresponding to this kind of goal, this article explores the mediating role of Online Image on the connection between E-WOM and  E-service quality, E-satisfaction, E- trust The result of Structural equation Modelling  (AMOS) path analysis affirmed that estimation model fulfilled the necessity and evidence the solidness of things, builds and correlation. All the four conditions for estimation model was met: things stacking above 0.7; unwavering composite quality (CR) above 0.7; Average Variance Extraction (AVE) above 0.5. The scholastics and industry will profit by the usage of this examination. Likewise, the tourist industry division can draw from these outcomes as references and proposals inside the impediments of the study. Future research headings were proposed to deal with the restrictions.
۲۷۴۷.

Computer Modeling of the Economy Dynamics of Ukraine, Taking into Account the Socio-Economic Clustering of Society(مقاله علمی وزارت علوم)

کلید واژه ها: model Dynamics Equation Savings price Information technology Model Experimental Research

حوزه های تخصصی:
تعداد بازدید : ۶۷ تعداد دانلود : ۴۹
The object of the research is the economic dynamic of a depressed low-productive economy, as exemplified by the modern Ukrainian economy. With the purpose to analyze the main causes and consequences of such an economy, the characteristic tendencies of its functioning, activation of the processes of reformation and growth, there was developed the dynamic economic model with significant share of consumer import and export of raw materials, with the use of IT technology. The model also takes into account the socio-economic clustering of a society. It is formalized in the space of economic variables, which describes respectively the savings (liquid capital) of the main social groups involved in the economy, the prices of consumer products in the domestic and foreign markets, the price of exported raw materials for the exchange rate.The model is intended for qualitative analysis of the processes occurring in the economy described by it, and for conducting computational experiments on the basis of information technologies in simulation mode with its parameters, which allows to identify the most characteristic features of the object of the research. The results of experimental researches with the model allowed to establish the main periods of economic dynamics represented by the dynamic variables model, its specificity and social consequences for the society, which is characterized by a bimodal distribution of savings. There was investigation the dependence of the mode solution from it parameters which means in practice the dependence of economic dynamics from the change of individual conditions and factors of economic development.The obtained results are important for informational and analytical support of decision making processes in order to bring the being studied economy out of a low-productive state.
۲۷۴۸.

In-Depth Analysis of Various Artificial Intelligence Techniques in Software Engineering: Experimental Study(مقاله علمی وزارت علوم)

کلید واژه ها: Software Engineering Defects Prediction Artificial Intelligence ML ANN DNN CNN

حوزه های تخصصی:
تعداد بازدید : ۶۶ تعداد دانلود : ۴۰
In this paper, we have extended our literature survey with experimental implementation. Analyzing numerous Artificial Intelligence (AI) techniques in software engineering (SE) can help understand the field better; the outcomes will be more effective when used with it. Our manuscript shows various AI-based algorithms that include Machine learning techniques (ML), Artificial Neural Networks (ANN), Deep Neural Networks (DNN) and Convolutional Neural Networks (CNN), Natural Language Processing (NLP), Genetic Algorithms (GA) applications. Software testing using Ant Colony Optimization (ACO) approach, predicting software maintainability with Group Method of Data Handling (GMDH), Probabilistic Neural Network (PNN), and Software production with time series analysis technique. Furthermore, data is the fuel for AI-based model testing and validation techniques. We have also used NASA dataset promise repository in our script. There are various applications of AI in SE, and we have experimentally demonstrated one among them, i.e., software defect prediction using AI-based techniques. Moreover, the expected future trends have also been mentioned; these are some significant contributions to the research
۲۷۴۹.

Digitalization of Biocluster Management on Basis of Balanced Scorecard(مقاله علمی وزارت علوم)

کلید واژه ها: Bioeconomy digitalization Biocluster Strategic Management balanced scorecard Forecasting

حوزه های تخصصی:
تعداد بازدید : ۶۴ تعداد دانلود : ۴۰
The article is devoted to the digitalization of biocluster management on the basis of a balanced scorecard. It is proved that a biocluster, as a local model of business concentration that integrates environmentally oriented enterprises, through a combination of traditional and new technologies, resource saving and diversification of the range of environmental products, is able to satisfy various customer requests in one place and time, to ensure competitive advantages and integration into the world economic space. The concept of applying a balanced scorecard in the strategic biocluster management was formed. The technology of formation and mechanism of implementation of the balanced scorecard and digital data processing technologies into the management information system of strategic biocluster management was proposed. The digital outline of the strategic program for transferring the mission and strategy of the biocluster to the mode of effective use, capacity building and development was formed. The scorecard for strategic management of the biocluster was developed, the study of the dynamics of which allows to determine the strengths and weaknesses of the biocluster, to identify tolerance and resilience to changes in the business environment, to identify ways to achieve the set development goals.
۲۷۵۰.

Impact of Review, Reviewer and Hotel Characteristics on Ewom Helpfulness: An Empirical Study(مقاله علمی وزارت علوم)

کلید واژه ها: eWOM helpfulness review parameters reviewer parameters hotel parameters Econometric Modelling

حوزه های تخصصی:
تعداد بازدید : ۶۲ تعداد دانلود : ۷۵
Electronic word of mouth (eWOM) has been gaining popularity pertaining to its numerous benefits and ability to be applied in various fields. It helps consumers in making informed decisions and aids service providers in delivering an enhanced service or product. Despite all these benefits, dealing with the huge amounts of eWOM is a consistent problem. eWOM helpfulness comes handy in order to address this issue. In this study, we utilize 16699 hotels related eWOM written by 1099 reviewers which are collected from TripAdvisor.com. Our main objective is to analyze which factors impact eWOM helpfulness and how. For this purpose, eight unique variables belonging to three different categories are selected (eWOM length, eWOM subjectivity, eWOM polarity, eWOM readability, eWOM recency, hotel rating, reviewer badge and reviewer helpfulness) and are analyzed using econometric modelling. Our findings show that hotel rating as well as reviewer badge and helpfulness enjoy a positive significant relationship with eWOM helpfulness. It also suggests that eWOM length, readability and subjectivity positively influences eWOM helpfulness though eWOM polarity and recency are found to have an inverse relationship with the helpfulness of eWOM. Thus, our study reports that review, hotel and reviewer characteristics impact eWOM helpfulness in different ways. This study is summarized with the discussion of theoretical and practical implications.
۲۷۵۱.

Application of Grouped MCDM Technique for Ranking and Selection of Laptops in the Current Scenario of COVID-19(مقاله علمی وزارت علوم)

نویسنده:

کلید واژه ها: MCDM AHP BWM TOPSIS Laptop Selection

حوزه های تخصصی:
تعداد بازدید : ۶۲ تعداد دانلود : ۶۰
  In the modern technological age, laptops are widely used for doing various day-to-day activities and getting updates all around us. The COVID-19 situation is playing a vital role in a dynamic shift in buyer behavior with multiple personal computing devices at home. Prioritizing and selecting appropriate laptop devices is difficult because there are several options of laptops that are available in the market, and these are equipped with the latest features to do gaming, designing, attending online classes, and performing office and other everyday tasks. There are multiple selection criteria that are complex in nature. MCDM (Multiple Criteria Decision Making) approaches can handle and analyze these complicated criteria. By using MCDM techniques, decision-making can be done to select the top-ranked alternative from among the available alternatives. This paper exhibits a group of two MCDM techniques; Best Worst Method (BWM) and Analytical Hierarchy Process (AHP), which have been used to evaluate relative weights of considered conflicting criteria such as brand, price, storage capacity, RAM, processor, weight, touch screen, Bluetooth, and screen size, and these weights are used in the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) for ranking and selecting the best product of laptops.
۲۷۵۲.

Investment Project Risk Simulation on the Use of Information Technologies as a Factor for Improving the Financial Safety of the Enterprise(مقاله علمی وزارت علوم)

نویسنده:

کلید واژه ها: Financial security risk Investment Investment project Simulation Modelling information technologies

حوزه های تخصصی:
تعداد بازدید : ۵۹ تعداد دانلود : ۴۸
The article justified the feasibility of an investment project by analysing the performance indicators while taking into account risk and uncertainty of the use of information technologies. The impact of the above calculations of the investment project results is due to the fact that the evaluation of the investment performance depends on the projected cash flows. The purpose of the article is to assess the impact of risks on making investment decisions using information technologies in order to increase the financial security of enterprises. Methodological and practical aspects of risk modelling of the investment project were further developed, using the Monte Carlo method, which allows to construct a model by minimizing data, as well as to maximize the value of data used in the model. This model involves the use of probability theory and random number tables. The results show the distribution of probabilities of the successful project variable and the coefficient of variation of the performance indicator, allowing the investor to take uncertainty into account when making a decision.
۲۷۵۳.

Prediction Financial Distress: The Pro-Technology Technique of Altman Z-Score Model(مقاله علمی وزارت علوم)

کلید واژه ها: Investment Pro-Technology Altman Z-Score Model Prediction Tool Sustainability

حوزه های تخصصی:
تعداد بازدید : ۵۸ تعداد دانلود : ۴۷
The Covid-19 outbreak has had a severe effect on the world economy. The company's business operations and profitability are damaged during the covid 19 outbreak. This deterioration is not only threatening the company’s survival position but also destroy the investor’s investment return. Therefore, it is vital to establish an effective early prediction technical method to foresee a corporate distress by a Pro-technical measurement to enhance the corporate sustainability. This study applies Altman Z-Score Model to as a Pro-Technology technique to the financial distress prediction of Malaysia’s Government Linked Plantation Companies (GLC-P) over a period of 10 years starting from 2012 to 2021. The significant contribution of the study is that the Z-Score Model provides an advanced indication tool regarding the financial stability of the respective GLC-P companies. The findings indicate that Financial Distress Prediction was dependent via in-time application of leverage, liquidity, activity, and profitability to the Altman Z-Score Model. Profitability and leverage were found to be superior prediction tool to financial distress.
۲۷۵۴.

A New S-Box Design by Applying Bat Algorithm Based Technique(مقاله علمی وزارت علوم)

کلید واژه ها: Cryptography Block Cipher S-box Nonlinearity Bat algorithm

حوزه های تخصصی:
تعداد بازدید : ۵۸ تعداد دانلود : ۴۴
Substitution-boxes (S-boxes) are very important nonlinear components used for achieving strong confusion for enhancing cryptographic security in most of the block ciphers. Designing cryptographically strong S-boxes has been a major research domain for the designers of symmetric crypto systems. In the proposed research work, Bat Algorithm based swarm technique is proposed to design strong S-boxes.  Cryptographic strong S-boxes are obtained by the developed swarm technique. Authors analyze cryptographic strength of the obtained S-box by evaluating properties like Bijectivity, Nonlinearity, Bit-Independence Criterion, Linear Probability and Differential Uniformity. The obtained performance parameters for the designed new S-box by the swarm technique are compared with some recently reported S-boxes in the literature. The designed S-box has good cryptographic strength. The designed S-box has good cryptographic strength like nonlinearity = 110.75 and average Strict Avalanche Criterion (SAC) value = 0.506. For the constructed S-box, most of the Differential uniformity components are 4 and shows uniform distribution approximately. The proposed new S-box is also free from the fixed points.
۲۷۵۵.

Android Malware Category and Family Identification Using Parallel Machine Learning(مقاله علمی وزارت علوم)

کلید واژه ها: Android Malware Malware Analysis Malware Category Classification Malware Family Classification Malware Dynamic Analysis

حوزه های تخصصی:
تعداد بازدید : ۵۷ تعداد دانلود : ۵۲
Android malware is one of the most dangerous threats on the Internet.  It has been on the rise for several years.  As a result, it has impacted many applications such as healthcare, banking, transportation, government, e-commerce, etc.  One of the most growing attacks is on Android systems due to its use in many devices worldwide.  De-spite significant efforts in detecting and classifying Android malware, there is still a long way to improve the detection process and the classification performance.  There is a necessity to provide a basic understanding of the behavior displayed by the most common Android malware categories and families.  Hence, understand the distinct ob-jective of malware after identifying their family and category.  This paper proposes an effective systematic and functional parallel machine-learning model for the dynamic detection of Android malware categories and families.  Standard machine learning classifiers are implemented to analyze a massive malware dataset with 14 major mal-ware categories and 180 prominent malware families of the CCCS-CIC-AndMal2020 on dynamic layers to detect Android malware categories and families.  The paper ex-periments with many machine learning algorithms and compares the proposed model with the most recent related work.  The results indicate more than 96 % accuracy for Android Malware Category detection and more than 99% for Android Malware family detection overperforming the current related methods.  The proposed model offers a highly accurate method for dynamic analysis of Android malware that cuts down the time required to analyze smartphone malware.
۲۷۵۶.

Exploring the Perceived online Review Credibility and Management Response Influence on Purchase Intention(مقاله علمی وزارت علوم)

کلید واژه ها: Online Review Perceived Credibility Management Response purchase intention

حوزه های تخصصی:
تعداد بازدید : ۵۶ تعداد دانلود : ۵۹
Online reviews play a crucial role in the consumer decision-making process in the glamping industry. Some reviews are misleading; therefore, users need to identify credible reviews to form objective opinions. This study examined dimensions of perceived review credibility and its influence on purchase intention within the glamping business. Online surveys were conducted with respondents with relevant travel experiences to examine the key credibility factors. Findings identified that review length, amount of detail, writing style, and travelers’ images; as well as mixed, moderate, and two-sided reviews influence perceived review credibility. It was also found that perceived review credibility influences purchase intention; that management response impacts perceived company credibility and purchase intention; and that personalized management response is valuable for the perceived credibility and purchase intention. A revised conceptual framework was developed to demonstrate the sources of perceived credible online reviews and the role of management responses in the reviews. In addition to the theoretical contribution, this study can have practical marketing implications for businesses when creating online promotional material for their products and engaging with customers
۲۷۵۷.

Metaheuristic Algorithms for Optimization and Feature Selection in Cloud Data Classification Using Convolutional Neural Network(مقاله علمی وزارت علوم)

کلید واژه ها: feature selection Classification Cloud Computing Metaheuristic algorithm Convolution neural network

حوزه های تخصصی:
تعداد بازدید : ۵۶ تعداد دانلود : ۴۴
Cloud Computing has drastically simplified the management of IT resources by introducing the concept of resource pooling. It has led to a tremendous improvement in infrastructure planning. The major goals of cloud computing include maximization of computing resources with minimization of cost. But the truth is that everything has a price and cloud computing is no different. With Cloud computing there comes a number of security concerns which need to be addressed. Cloud forensics plays a vital role to address the security issues related to cloud computing by identifying, collecting and studying digital evidence in cloud environment. The aim of the research paper is to explore the concept of cloud forensic by applying optimization for feature selection before classification of data on cloud side. The data is classified as malicious and non-malicious using convolutional neural network. The proposed system makes a comparison of models with and without feature selection algorithms before applying the data to CNN. A comparison of different metaheuristics algorithms- Particle Swarm Optimization, Shuffled Frog Leap Optimization and Fire fly algorithm for feature optimization is done based on convergence rate and efficiency.
۲۷۵۸.

Range of Publications for E-Government Services: a Review and Bibliometric Analysis(مقاله علمی وزارت علوم)

کلید واژه ها: Government Public e-services bibliometric analysis Network analysis E-government Researchv

حوزه های تخصصی:
تعداد بازدید : ۵۵ تعداد دانلود : ۵۰
With the rapid advancement of information and communication technology (ICT), public administration has adopted the concept of e-government. The academic literature produced many studies in the field of E-government (E-GOV) services, however, there is limited research on such services from the perspective of bibliometric and Network analysis. Therefore, this study aims to present a bibliometric and network analysis of the E-government services literature review obtained from the Scopus database, published between 2011 to 2021. This study uses a five-step method including (1) defining keywords, (2) initializing search outcomes, (3) inclusion and exclusion of some elements of the initial result, (4) compiling initial data statistics, and (5) undertaking analysis of data. The analysis starts by identifying more than 4,880 published articles related to E-government services published between 2011 and 2021. The study findings revealed that the highest number of publications on the E-government Service was in 2019 (102 articles), the top contributing affiliation was Brunel University London, the leading influential country was the USA, and the top contributing Source was Electronic Government. Furthermore, Lu J. occupied the first rank in the list of the most influential authors in terms of citations, while Weerakkody V. occupied the list of the top authors with high publications 20 papers. Likewise, this study showed that there is a collaboration among some authors. This research identified four research clusters by which researchers could be encouraged to widen the research of E-government services in the future. The bibliometric and network analysis of E-government services helps to graphically display the publication's assessment over time and identify domains of current studies' interests and potential directions for further studies. Finally, this research draws a roadmap for future investigation into E-government services.
۲۷۵۹.

Energy-Efficient and Reliable Deployment of IoT Applications in a Fog Infrastructure Based on Enhanced Water Strider Algorithm(مقاله علمی وزارت علوم)

کلید واژه ها: Internet of Things Fog Computing energy-efficient applications deployment courtship learning-based water strider algorithm Metaheuristic

حوزه های تخصصی:
تعداد بازدید : ۵۳ تعداد دانلود : ۵۸
Fog computing is considered a promising solution to minimize processing and networking demands of the Internet of things (IoT) devices. In this work, a model based on the energy consumption evaluation criteria is provided to address the deployment issue in fog computing. Numerous factors, including processing loads, communication protocols, the distance between each connection of fog nodes, and the amount of traffic that is exchanged, all have an impact on the re-search system's overall energy consumption. The power consumption for implementing each com-ponent on the fog node as well as the power consumption for information exchange between the fog nodes are taken into account when calculating each fog node's energy use. Each fog node's energy consumption is closely correlated to how its resources are used, and as a result, to the average normalized resource utilization of a fog node. When the dependent components are spread across two distinct fog nodes, the transfer energy is taken into account in the computations. The sum of the energy used for transmission and the energy used for computational resources is the entire amount of energy consumed by a fog node. The goal is to reduce the energy consumption of the fog network while deploying components using a novel metaheuristic method.  Therefore, this work presents an enhanced water strider algorithm (EWSA) to address the problem of deploying application components with minimum energy consumption. Simulation experiments with two scenarios have been conducted based on the proposed EWSA algorithm. The results show that the EWSA algorithm achieved better performance with 0.01364 and 0.01004 optimal energy consumption rates.
۲۷۶۰.

Artificial Intelligence Driven Human Identification(مقاله علمی وزارت علوم)

کلید واژه ها: Gait Analysis Identification Background subtraction Vectorization Projec-tions Quarter-cycles Artificial Intelligence

حوزه های تخصصی:
تعداد بازدید : ۵۳ تعداد دانلود : ۴۲
Human Identification has been widely implemented to enhance the efficiency of surveillance systems, however, systems based on common CCTV (closed-circuit television) cameras are mostly incompatible with the advanced identification algorithms which aim to extract the facial features or speech of an individual for identification. Gait (i.e., an individual’s unique walking pattern/style) is a leading exponent when compared to first-generation biometric modalities as it is unobtrusive (i.e., it requires no contact with the individual), hence proving gait to be an optimal solution to human identification at a distance. This paper proposes an automatic identification system that analyzes gait to identify humans at a distance and predicts the strength of the match (i.e., probability of the match being positive) between two gait profiles. This is achieved by incorporating computer vision, digital image processing, vectorization, artificial intelligence, and multi-threading. The proposed model extracts gait profiles (from low-resolution camera feeds) by breaking down the complete gait cycle into four quarter-cycles using the variations in the width of the region-of-interest and then saves the gait profile in the form of four distinct projections (i.e., vectors) of length 20 units each, thus, summing up to 80 features for each individual’s gait profile. The focus of this study revolved around the speed-accuracy tradeoff of the proposed model where, with a limited dataset and training, the model runs at a speed of 30Hz and yields 85% accurate results on average. A Receiver Operating Characteristic Curve (ROC) is obtained for comparison of the proposed model with other machine learning models to better understand the efficiency of the system

پالایش نتایج جستجو

تعداد نتایج در یک صفحه:

درجه علمی

مجله

سال

زبان