فیلتر های جستجو:
فیلتری انتخاب نشده است.
نمایش ۱۴۱ تا ۱۶۰ مورد از کل ۲٬۸۴۳ مورد.
منبع:
مدیریت دانش سازمانی سال پنجم تابستان ۱۴۰۱ شماره ۱۷
49 - 76
حوزه های تخصصی:
در سال های اخیر، رشد و گسترش تولید داده در حوزه های مختلف، ضمن ایجاد چالش هایی در مورد مدیریت آن ها، فرصت هایی را برای دست یافتن شرکت ها به پیش بینی های دقیق تر در مورد تغییرات محیطی فراهم کرده است. بنابراین، نیاز به یک ابزار تشخیصی متخصص برای موقعیت یابی شایستگی های مدیریت دانش و هوشمندی کسب و کار برای بهینه سازی جامع تحلیل استراتژیک و پشتیبانی تصمیم گیری هوشمند مدیریت عملکرد استراتژیک سازمانی وجود دارد. در حقیقت ابزارهایی مانند هوشمندی کسب و کار با شناسایی روندهای محیطی، زمینه تصمیم گیری و اقدام به موقع را برای سازمان فراهم می کند. از سوی دیگر یکی از شاخص های توسعه یافتگی اقتصاد کشورها، میزان توسعه صنعت بیمه در آن کشورها است. استفاده از فناوری در صنعت بیمه به منظور دسترسی بیشتر افراد به خدمات مالی، بیش از پیش مورد توجه قرار گرفته، به گونه ای که کسب وکارهای نوپای بیمه با خلق ارزش پیشنهادی یکتا و بهبود مدل کسب وکار وارد عرصه رقابت با شرکت های سنتی بیمه ای شده اند. در این پژوهش، یک الگو برای کسب و کار هوشمند در صنعت بیمه طراحی شد. در این پژوهش برای نظریه پردازی از نظریه داده بنیاد و یافته های کیفی با نرم افزار مکس کیودا (MAXQDA) تحلیل و نهایتا برای طراحی مدل از چارچوب مدل پارادایم نظریه داده بنیاد اشتراوس و کوربین استفاده شده است. مشارکت کنندگان در این پژوهش، خبرگان و مدیران صنعت بیمه هستند که تعداد آن ها 16 نفر بوده و بصورت قضاوتی هدفمند انتخاب شدند. با تحلیل داده ها تعداد 5 مورد مقوله استخراج گردید که نهایتا با تعیین شرایط علی (کیفیت در دسترس پذیری، پذیرش الکترونیک و ریسک ادارک شده)، شرایط زمینه ای (محدویت های اینترنت، زیرساخت های ICT و سیاست های بیمه ای)، شرایط مداخله گر (سطح دانش کاربران، نگرش مدیران و امنیت ادراک شده «محرمانه بودن»)، مقوله محوری (هوشمندسازی صنعت بیمه)، راهبردها (تقویت فرهنگ استفاده از اینترنت، توسعه امنیت دیجیتال و توسعه سطح دانش) و پیامدها (دستیابی به فرصت های رشد، مزیت رقابتی و سودآوری) مدل هوشمندی کسب و کار صنعت بیمه ارائه گردید.
نقش اصطلاح نامه در کشف معنایی مفهوم ذنب رسول الله (صل الله علیه و آله و سلم) و استغفار رسول الله(صل الله علیه و آله و سلم)در قرآن (با تکیه بر آیه 2 سوره فتح) با تطبیق دیدگاه علامه طباطبایی و طبری
منبع:
مدیریت دانش اسلامی سال چهارم بهار و تابستان ۱۴۰۱ شماره ۱
161 - 190
حوزه های تخصصی:
گستره عصمت پیامبر اکرم| از مباحث اختلافی مفسران شیعه و سنی است که ذیل برخی آیات نافی عصمت، مانند آیه 2 سوره فتح، مطرح می شود. این آیه به صراحت، از وجود گناه بنده و بخشش آن از طرف خداوند برای رسول اکرم| حکایت دارد. این مقاله به روش توصیفی- تحلیلی، به تطبیق دیدگاه علامه طباطبایی(ره) و طبری، دو تن از مفسران برجسته فریقین، در کشف معنای واژه در آیه، و آیات همنوا پرداخته است. درنتیجه با وجود تفاوت هایی در مبانی اعتقادی ، هر دو مفسر، قائل به معنایی متفاوت از «ذنب» و «استغفار» مطرح در آیه، نسبت به دیگر آیات همنوا هستند. طبری براساس قرائن خارجی، از روایت عایشه و دستور استغفار به پیامبر| در آیه 3 سوره نصر، بدون ارتباط مستقیم با معنای لغوی، آن را به مرتبه ای از شکر تعبیر می کند که تعبیری جدید در واژه بنابر اصطلاح عرفانی است. طباطبایی براساس سیاق آیات، گناه مطرح در آیه را به تصور گناه مشرکان نسبت به رسول اکرم| برمی گرداند و بخشش از آن را به معنای پاک کردن آثار حاصل از دشمنی و پیامدهای کینه مشرکان به پیامبر| می داند که مطابق معنای ریشه واژه در ادبیات است.
مدلی برای بازاریابی دیجیتال مبتنی بر ارزش آفرینی در صنعت بیمه ایران(مقاله علمی وزارت علوم)
حوزه های تخصصی:
پژوهش حاضر با هدف مدلی برای بازاریابی دیجیتال مبتنی بر ارزش آفرینی برای صنعت بیمه ایران انجام شده است. روش استفاده شده در پژوهش، کیفی و مبتنی بر راهبرد نظریه داده بنیاد است. برای جمع آوری داده ها از ابزار مصاحبه عمیق استفاده شده است. جامعه هدف مدیران و کارشناسان ارشد صنعت بیمه که در فرایند و تصمیمات بازاریابی دیجیتال مشارکت داشتند، بوده اند با استفاده از نمونه گیری هدفمند پس از 15 مصاحبه عمیق، اشباع نظری حاصل شد.در رویکرد داده بنیاد طی سه مرحله کدگذاری باز، محوری و انتخابی بیانگر 32 مقوله کلی در قالب پارادیمی شامل شرایط علی، زمینه ای، مداخله گر، مقوله های محوری، راهبردها و پیامدها مبتنی بر ارزش آفرینی بوده است. .نتایج نشان داد که بازاریابی دیجیتال مبتنی بر ارزش آفرینی در صنعت بیمه ایران توسط شرایط علی (هویت بخشی بازاریابی دیجیتال در صنعت بیمه، ایجاد کمپین بازاریابی دیجیتال، ارتقا نفوذ فرهنگ بیمه، محیط دیجیتال و توسعه زیرساخت مورد نیاز)، زمینه ای (استراتژی تمرکز، برندسازی دیجیتال، پیاده سازی بازاریابی دیجیتال، پاسخگویی به نیازها و علائق در فضای دیجیتال و بهینه سازی فعالیت های دیجیتالی)، مداخله گر (بینش مشتریان، عوامل محیطی، قابلیت های دیجیتالی، انقلاب دیجیتالی، شفافیت قیمت و چالش های سازمانی)، مقوله های محوری (برندسازی مبتنی بر رفتار، رویکرد تعاملی، انتظارات مشتری از خدمات بیمه و تجربه مشتری)، راهبردها (ارتقای جایگاه یابی، ارتقای کانال های ارتباطی، ارزش آفرینی از طریق تولید محتوا، تعامل و مشارکت مشتری مبتنی بر تبلیغات دهان به دهان الکترونیکی، توسعه فناوری های دیجیتال و نوآوری دیجیتالی) و پیامدهای (افزایش سهم بازار، اثربخشی سازمانی، ارتقا و جایگاه برند (شرکت)، ارتقای ارزش ویژه برند الکترونیکی و توسعه کسب وکار دیجیتال) تحقق می یابد.
نگاشت نظام یافته پژوهش های هوشمندی کسب و کار در نشریات علمی-تخصصی منتخب: شناسایی خلاهای پژوهشی و پیشنهاد برای پژوهش های آتی(مقاله علمی وزارت علوم)
منبع:
مطالعات مدیریت کسب و کار هوشمند سال دهم بهار ۱۴۰۱ شماره ۳۹
127 - 162
حوزه های تخصصی:
با توجه به گسترش کاربرد سیستم های اطلاعاتی، حجم زیادی از داده ها در سازمان ها ذخیره شده است که تجزیه و تحلیل این داده ها منبع بسیار ارزشمندی برای کمک به تصمیم گیری بهتر می باشد. این موضوع که با مفهوم هوشمندی کسب وکار شناخته می شود یکی از مهمترین عوامل موفقیت سازمان ها در دنیای معاصر می باشد. با توجه به اهمیت این موضوع ضرورت دارد که پژوهش های انجام شده در کشور در حوزه هوشمندی کسب وکار بصورت نظام مند بررسی شود. هدف از این تحقیق شناسایی موضوعات بررسی شده در مجلات علمی- تخصصی، تحلیل وضعیت پراکندگی و فراوانی مطالعات، شناسایی روش های پژوهش، هدف مقالات، سطح تحلیل پژوهش های هوشمندی کسب وکار و سرانجام شناخت خلاهای پژوهشی در این حوزه و ارائه پیشنهادات آتی است. بدین منظور پژوهش با تحلیل داده های ثانویه و مرور نظامند دانش موجود هوشمندی کسب وکار در 6 پایگاه داده منتخب انجام شد. بدین منظور 2108 مقاله بررسی شده که در بررسی اولیه 1274 مقاله انتخاب و با مطالعه چکیده های مقالات، 91 مقاله مورد تایید قرار گرفت. در نهایت با مد نظر قرار دادن معیارهای حذف، 81 مقاله نهایی انتخاب و مورد تحلیل قرار گرفت. نتایج پژوهش نشان می دهد که بیشترین پوشش موضوعی هوشمندی کسب وکار در این مجلات با موضوع خاص مدیریت دانش و موضوع عام، ابزارهای هوشمندی کسب وکار با 44.45 درصد، بیشترین روش تحقیق مورد استفاده توصیفی پیمایشی با 34.57 درصد، بیشترین هدف کاربردی با 82.71 درصد و بیشترین سطح تحلیل مورد استفاده، سطح تحلیل جامعه با 66.66 درصد می باشد. در نهایت خلاهای پژوهشی در قالب پیشنهادات آتی ارائه شد.
Trust in Blockchain-Based Advertising: A System Dynamics Approach(مقاله علمی وزارت علوم)
حوزه های تخصصی:
As an emerging technology, blockchain can be used in all areas of e-commerce, one of which is advertising. The present study has been designed to identify a dynamic model of trust in blockchain-based advertising and acceptance of this type of advertising. In order to achieve the purpose of the research, the required information was collected by literature, background review and experts opinions. In the next step, the research information was analyzed using systems dynamics methodology (Sterman approach) and a dynamic research model was presented. After model validation and examining the causal relationships, simulations and scenario analysis were performed using Vensim software. The results show the positive effect of the audience, advertiser and advertising characteristics on trust in blockchain-based advertising and, consequently, the improvement of the audience loyalty coefficient. Also, the results of scenarios indicate an ascending growth (Pessimistic: about %60, Optimistic: about %80) in audience loyalty. Finally, practical suggestions were presented in accordance with the research results
Blockchain for Project and Construction Management; A Systematic and Scoping Literature Review(مقاله علمی وزارت علوم)
منبع:
Journal of Information Technology Management , Volume ۱۴, Special Issue: The business value of Blockchain, challenges, and perspectives, ۲۰۲۲
107 - 143
حوزه های تخصصی:
At this time in history that the world is becoming smaller every day due to globalization; it is important to achieve an acceptable degree of trust and confidence in any field; and blockchain can put the world on this path. Since there is no central authority governing blockchain, its decentralized nature can turn it into an appropriate platform for project management. Implementing blockchain eliminates project management bureaucracies and allows a single, unchangeable, controllable, and encrypted source to be accessible to everybody and extensible throughout the project life cycle. This approach is the key to achieve an integrated information system and is one of the important reasons for blockchain applicability as an ideal platform for project management and construction. This issue that using blockchain technology in project management will bring about capacities and capabilities has not yet been seriously addressed. Changing the management of construction projects by blockchain is just an idea for now. This study aims to identify the capacity and platforms for developing blockchain technology in project management and construction using systematic and scoping literature reviews. Moreover, it provides some suggestions about the development and improvement areas of this technology. The review results showed that in all areas of project management and construction, there are applications relevant to blockchain technology that confirm the gradual understanding of the significance and positive impact of this technology on enhancing project management and construction performance. According to the results, a major part of blockchain studies was focused on “program and project management”, and two fields of human resources and behavioural areas and research in project management and schools of thought with a share of less than 2% of existing studies were neglected.
Blockchain-Based ERP System: Architecture and Opportunities for Future(مقاله علمی وزارت علوم)
منبع:
Journal of Information Technology Management , Volume ۱۴, Special Issue: The business value of Blockchain, challenges, and perspectives, ۲۰۲۲
211 - 243
حوزه های تخصصی:
Although Blockchain can significantly change the future of ERP systems as an innovative tech-nology, few researchers have gone into the details of this development. Most have given an overview of the changes ahead. Therefore, in this research, we have tried to use the method of Exploratory Content Analysis (ECA) by reviewing more than three hundred scientific articles in the field of Blockchain to analyze the effects of this technology on ERP system modules such as supply chain management, maintenance, finance, project management, manufacturing, and hu-man capital management. The result of this exploratory research is an architectural model for a blockchain-based ERP system. The researchers describe the functions of this system carefully, and the role of supporting technologies such as Smart Contract, IoT, Digital Wallet, Cloud Com-puting, and Building Information Model is clarified. We genuinely believe that this research could use as a reference model for ERP vendors and researchers in information systems and business process management
Information and Communication Technologies in the Product Quality Management System of Industrial Enterprise(مقاله علمی وزارت علوم)
منبع:
Journal of Information Technology Management , Volume ۱۴, Special Issue: Digitalization of Socio-Economic Processes, September ۲۰۲۲
104 - 120
حوزه های تخصصی:
The article investigates in-depth the theoretical provisions for the construction of modern product quality management systems, providing for the optimization and transformation of individual production and economic processes to a higher quality level, as well as the functions integration of enterprise management system and product quality management system; such integration is carried out on the basis of knowledge, information and communications, which are the basis of external integration processes of the enterprise. This provided an opportunity to develop a scientific and methodological approach to the formation of an adaptive quality system capable of producing high quality products over a long period of time. The generalization of practical aspects of the research provided an opportunity to build an algorithm and determine the tools for the formation of an adaptive product quality management system using modern computer technology for effective information support.
Cryptocurrency: Value Formation Factors and Investment Risks(مقاله علمی وزارت علوم)
منبع:
Journal of Information Technology Management , Volume ۱۴, Special Issue: Digitalization of Socio-Economic Processes, September ۲۰۲۲
179 - 200
حوزه های تخصصی:
Scientific sources demonstrate different attitudes of researchers to cryptocurrencies because they treat them as a category of currency, virtual money, commodity, etc. Accordingly, the relation to the valuation and risk of cryptocurrency as an investment object is different. The purpose of the article is to identify cryptocurrency value formation factors and determine the risks of investing in cryptocurrency. Cryptocurrency is simultaneously considered a currency, an asset with uncertain income, and a specific product, the price of which is determined by the energy costs for mining new cryptocurrency blocks. Thus, the paper examines the risks of investing in cryptocurrency from several positions. First, the study identifies the factors of formation of the value and risk of cryptocurrency as ordinary money based on comparing cryptocurrency with traditional money. Unlike traditional money, cryptocurrency is not tied to the economic performance of a particular country; also, central banks do not control or regulate their mining. Instead, the cryptocurrency emissions depend on the computational capacity of the equipment used for their mining. As a financial asset, cryptocurrency can be a “financial bubble” because their value increasing often exceeds the cost of mining. On the other hand, given the emergence of cryptocurrency as a phenomenon of the information economy, the paper analyses the impact of specific technical features (cryptographic hashing algorithm, the complexity of creating new blocks, the technology of verification of mining operations, etc.) on the risk of investing in cryptocurrency assets.
Determinants of Building Information Modeling Adoption: The case of the Malaysian Construction Industry(مقاله علمی وزارت علوم)
حوزه های تخصصی:
The Architecture, Engineering, and Construction (AEC) industry rely heavily on Building Information Modeling (BIM). BIM is the collection of Information and Communication Technologies (ICT), interacting policies, and procedures. BIM is a tool for managing digital project data during the life cycle of a building. Despite the many benefits and features of BIM, the Malaysian construction industry's proliferation is confronted with adoption issues. Therefore, this research study intends to find the effect of BIM adoption factors in Malaysian AEC. Quantitative data collection from construction firms is gathered. The proposed model's theoretical foundations are based on Technology, Organization Environment framework. The model is tested and validated with the Smart PLS tool. The study's findings indicate that Perceived benefits, Organizational Capabilities, and Trialability are drivers of BIM adoption. Perceived cost and Insecurity are the barriers to BIM adoption. Perceived ease of use and compatibility does not affect BIM adoption. Finally, this study performs Importance Performance Map Analysis to provide recommendations to AEC stakeholders to address the BIM adoption issues for enhancing its diffusion in Malaysia.
A Literature Review of Technology Adoption theories and Acceptance models for novelty in Building Information Modeling(مقاله علمی وزارت علوم)
حوزه های تخصصی:
Building Information Modeling (BIM) is the backbone of the Architecture, Engineering, and Construction (AEC) industry. BIM is the collection of Information and Communication Technologies (ICT), interacting policies, and procedures. BIM generates a methodology to manage the project data in digital format throughout the building's life-cycle. Despite the numerous benefits and features of BIM, its proliferation remains limited and facing adoption issues. Although many existing studies discussed BIM adoption from contextual lenses, discipline-focused, there is still a scarcity of a comprehensive overview of technology adoption models and frameworks in BIM research. The purpose of this Systemic Literature Review (SLR) is to evaluate the current status of BIM adoption, technology acceptance theories, models used and find the research challenges. Furthermore, to identify the roles of independent constructs, dependent construct, moderators, and mediators in BIM adoption research. Also, the findings provide an in-depth description of the different stages of BIM adoption. Finally, this SLR will help the researchers for further research in the field of BIM adoption.
A Glance to Develop an Emotional-Persuasive Habit-Change Support Mobile Application for Heart Disease Patients (BeHabit)(مقاله علمی وزارت علوم)
حوزه های تخصصی:
Heart disease is stated as the world's biggest killer. The risk factors of this deadly disease are due to some bad habits such as being overweight, bad eating diet, smoking, assumption of alcohol, etc. Nevertheless, patients can live a healthy lifestyle if they have the proper guidance of persuasive-emotional featured technologies. In line with this, this study focuses on developing an emotional-persuasive habit-change support mobile application called BeHabit to improve heart disease patients’ lifestyles. Persuasive-emotional features are two different features that are integrated with BeHabit to distinguish this application from the existing ones. The proposed system is designed, implemented, tested, and evaluated by 10 users. In conclusion, the users are satisfied to used BeHabit to change their bad habits. Emotional and persuasive features that are integrated into BeHabit are the key to help patients to change their bad habits. BeHabit and the integrated feature can be used as a guideline for healthcare developers and providers for the improvement of mHealth services.
Filter-Based Feature Selection Using Information Theory and Binary Cuckoo Optimisation Algorithm(مقاله علمی وزارت علوم)
حوزه های تخصصی:
Dimensionality reduction is among the data mining process that is used to reduce the noise and complexity of features in various datasets. Feature selection (FS) is one of the most commonly used dimensionalities that reduces the unwanted features from the datasets. FS can be either wrapper or filter. Wrappers select subsets of the feature with better classification performance but are computationally expensive. On the other hand, filters are computationally fast but lack feature interaction among selected subsets of features which in turn affect the classification performance of the chosen subsets of features. This study proposes two concepts of information theory mutual information (MI). As well as entropy (E). Both were used together with binary cuckoo optimization algorithm BCOA (BCOA-MI and BCOA-EI). The target is to improve classification performance (reduce the error rate and computational complexity) on eight datasets with varying degrees of complexity. A support vector machine classifier was used to measure and computes the error rates of each of the datasets for both BCOA-MI and BCOA-E. The analysis of the results showed that BCOA-E selects a fewer number of features and performed better in terms of error rate. In contrast, BCOA-MI is computationally faster but chooses a larger number of features. Comparison with other methods found in the literature shows that the proposed BCOA-MI and BCOA-E performed better in terms of accuracy, the number of selected features, and execution time in most of the datasets.
The Evaluation of an Improved Model of the Agile Kanban Using Focus Group(مقاله علمی وزارت علوم)
حوزه های تخصصی:
The improved model of the Agile Kanban (i-KAM) is developed to enhance the software project monitoring task when employing Agile project management (APM) approach. The i-KAM have been initially verified by 11 knowledge and domain experts. In consequence, it has been reconstructed and enhanced based on the remarks and recommendations provided by the experts. This paper aims to present the final evaluation results of i-KAM achieved from seven software practitioners participated in a focus group. The focus group method was selected because it is an empirical approach used in the evaluation studies conducted in the software engineering (SE) domain. Therefore, this method was employed to obtain the practitioners’ feedback on the proposed model. Results confirm the effectiveness of i-KAM, in which it can assist the project managers and team members in monitoring their projects’ progress effectively. In addition, it is indicated that i-KAM is an applicable model with easy and practical implementation. This study contributes to improve the task of monitoring software development projects within the APM environment. Accordingly, this would systematically facilitate the top managements’ work, and assist in making meaningful decisions regarding to the management of projects’ workflow. Practically, case studies will be carried out in different software development organizations (SDOs) to implement i-KAM in actual projects within real environments
Internet of Things Care Device for Visually Impaired and Old People(مقاله علمی وزارت علوم)
منبع:
Journal of Information Technology Management , Volume ۱۴, Security and Resource Management challenges for Internet of Things, ۲۰۲۲
132 - 146
حوزه های تخصصی:
Focusing on the problems faced by blind people, this paper has come up with the technology solution for the assistance of blind people. The solution is based on the intelligent data transmission to the earphone of a person based on task associated. The solution consists of a jacket to detect the obstacles along with a wearable box with task priority switchs. The system helps in detection of the obstacle and its height, one-touch cab booking and support of relatives, Ambulance services, Police services, etc. in the case of emergency. Either wired and wireless headphones or speakers can be interfaced with the device (box) to get audio notifications. The various tasks are triggered using multiple switches. The system will use a definitive SOC (System on Chip) platform recognized as Rasp-Pi-Pi along with ultrasonic sensor HC-SR04, Neo-6M GPS (Global Positioning System) module, and different switches. The system uses a 20,000 mAh lion battery for the power supply. The voice signals can be provided in more than fifty languages. A fall detection system is also discussed in this paper. This system will be beneficial not only for blind but also for care of old aged people
Multi Trust-based Secure Trust Model for WSNs(مقاله علمی وزارت علوم)
منبع:
Journal of Information Technology Management , Volume ۱۴, Security and Resource Management challenges for Internet of Things, ۲۰۲۲
147 - 158
حوزه های تخصصی:
Trust establishment (TE) among sensor nodes has become a vital requirement to improve security, reliability, and successful cooperation. Existing trust management approaches for large scale WSN are failed due to their low cooperation (i.e., dependability), higher communication and memory overheads (i.e., resource inefficient). This paper provides a new and comprehensive hybrid trust estimation approach for large scale WSN employing clustering to improve cooperation, trustworthiness, and security by detecting selfish sensor nodes with reduced resource (memory, power) consumption. The proposed scheme consists of unique features like authentication based data trust, scheduler based node trust, and attack resistant by giving the high penalty and minimum reward during node misbehavior. A task scheduling mechanism is employed for scheduling the significant task to reduce computation overhead. The proposed trust model would be capable to provide security against blackhole attack, grey hole attack, and badmouthing attack. Moreover, the proposed trust model feasibility has been tested with MATLAB. Simulation results exhibit the great performance of our proposed approach in terms of trust evaluation cost, prevention, and detection of malicious nodes with the help of analyzing consistency in trust values and communication overhead.
Enhanced Lightweight and Secure Session Key Establishment Protocol for Smart Hospital Inhabitants(مقاله علمی وزارت علوم)
منبع:
Journal of Information Technology Management , Volume ۱۴, Security and Resource Management challenges for Internet of Things, ۲۰۲۲
225 - 234
حوزه های تخصصی:
In the era of internet technologies, to provide wireless communication and transfer the information in seconds from one place to another has arrived because of the need to consume information technologies. All users desire to quickly access the smart world’s life and interact with the entire world socially. This paper proposed an environment for the safe and secure smart patient’s room connected to the WSN, BAN, and RFID. All the data will be transferred to the session key, secure and contains the patient’s information. The network connected through WSN and data will be sent through the session key to make an smart hospital’s patient cabin. The small token is there that will be transferred throughout the network to get authenticated by each network. This proposed scheme is secure enough to overcome the drawbacks of the other protocol in such a way as to make the protocol more secure from the entire adversary’s attack may occur.
Reconstruction of Simple and Complex Three Dimensional Images Using Pattern Recognition Algorithm(مقاله علمی وزارت علوم)
منبع:
Journal of Information Technology Management , Volume ۱۴, Security and Resource Management challenges for Internet of Things, ۲۰۲۲
235 - 247
حوزه های تخصصی:
The reconstruction of 3D images is always a difficult task for the researchers. The 3D reconstruction of the image is a core technique of various fields such as Computer graphics, computer vision, CAD systems, medical science, computer application, etc. Reconstruction of the 3D image allows us to gather the quantitative features of the objects such as the shape, size, and volume of the objects. The existing computer algorithms need spatial dimension information to make the distinguished inference from the given 3D image which is not always possible. This paper simplifies the 3D reconstruction of the image. This research paper introduced a novel algorithm for the representation of the Three Dimensional images into a textual form. The syntactic approach is used for the extraction of the features of the image and these are called knowledge vectors. The knowledge vector consists of the direction information and length information. This a new approach in the field of image processing where images can be represented as a knowledge vector and it could be a great contribution in the field where security is a major concern. Further, the knowledge vector is used for the reconstruction of the 3D image. The performance of the algorithm is evaluated on the PASCAL 3D + and example-based Synthesis of the 3D Object Arrangements dataset. According to the obtained results, the proposed methodology is having better accuracy, and the processing time of reconstruction of the original 3D image is 1.02 Seconds. Single-pass is sufficient for reconstructing the original image
Blockchain and Bigdata to Secure Data Using Hash and Salt Techniques(مقاله علمی وزارت علوم)
حوزه های تخصصی:
In recent times amount of data is increasing rapidly and analysis of data is a must to come up with business decisions, predictions etc. It’s not just text are numbers which has to be stored properly. Data Types these days varies from images, video, social media data, surveys to blogs etc. When this is the case its mandatory to deal with Bigdata and to safeguard those Bigdata. Technologies available in Bigdata and Bitcoin helps us in achieving this. Bigdata technologies helps in storing the unstructured data effectively and processing of such voluminous data is taken care of. Hashing algorithms are used in Blockchain to keep the data safe. Hashing algorithms like SHA 256 are used to make it more secure. Its almost not possible to break the data available in Blockchain. Let’s try to secure the data even more using encryption algorithms to make sure that proper data is used for analysis etc.
Enhanced Method of Object Tracing Using Extended Kalman Filter via Binary Search Algorithm(مقاله علمی وزارت علوم)
منبع:
Journal of Information Technology Management , Volume ۱۴, Security and Resource Management challenges for Internet of Things, ۲۰۲۲
180 - 199
حوزه های تخصصی:
Day by day demand for object tracing is increasing because of the huge scope in real-time applications. Object tracing is one of the difficult issues in the computer vision and video processing field. Nowadays, object tracing is a common problem in many applications specifically video footage, traffic management, video indexing, machine learning, artificial intelligence, and many other related fields. In this paper, the Enhanced Method of Object Tracing Using Extended Kalman Filter via Binary Search Algorithm is proposed. Initially, the background subtraction method was used for merge sort and binary search algorithm to identify moving objects from the video. Merge sort is to divide the regions and conquer the algorithm that arranges the region in ascending order. After sorting, the binary search algorithm detects the position of noise in sorted frames and then the next step extended the Kalman Filter algorithm used to predict the moving object. The proposed methodology is linear about the valuation of mean and covariance parameters. Finally, the proposed work considered less time as compared to the state of art methods while tacking the moving objects. Its shows less absolute error and less object tracing error while evaluating the proposed work.