ترتیب بر اساس: جدیدترینپربازدیدترین
فیلترهای جستجو: فیلتری انتخاب نشده است.
نمایش ۱۶۱ تا ۱۸۰ مورد از کل ۲٬۹۱۷ مورد.
۱۶۱.

Automatic Prediction and Identification of Smart Women Safety Wearable Device Using Dc-RFO-IoT(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Smart Phone IoT GPS Sensors

حوزه‌های تخصصی:
تعداد بازدید : ۵۲۲ تعداد دانلود : ۲۶۹
Women’s safety is very important for around the world and many anti-women safety incidents are happened in current decades. Women's criminality is on the rise in India, particularly on an hourly basis 1000 criminal cases are filed according to Indraprastha and Kannon organizations. The Internet of Things (IoT) application will assist women in difficult situations. This design with Dc-RFO-IoT has an emergency application that can be useful to provide critical thinking and suggestions to women in rescue time. When the emergency soft button is pushed, notifications are sent to registered contacts as well as to women's hotline lines with GPS and GSM. A GPS sensor is also used to transmit the position with longitude and latitude. Every one minute, the receiver sends a link to your location, updating them on your current position. The attacker may shut the victim's mouth and prevent her from requesting assistance. The speaker on this gadget generates high-frequency sound. It will raise the alarm in the surrounding area and make the attacker fearful. This IoT with deep learning application is giving accurate outcomes and measures are improved. The performance measures like accuracy 93.43%, sensitivity 92.87%, Recall 98.34%, safety ratio 97.34%, and F measure 97,89% had been improved these are outperformance the methodology and compete with present models.
۱۶۲.

Unpacking the Dynamics of Digital Entrepreneurship: Managing Work-Family Boundaries among Women Entrepreneurs(مقاله علمی وزارت علوم)

نویسنده:

کلیدواژه‌ها: Digital entrepreneurship Women Entrepreneurs Degrees of digitalization Work-Family Boundary management

حوزه‌های تخصصی:
تعداد بازدید : ۳۹۷ تعداد دانلود : ۲۴۹
The global spread of internet technology and the associated advancements are making it easier for women entrepreneurs to manage the work-family boundary. However, there is a need for more research on digital entrepreneurship (DE), especially on how different degrees of DE influence the success of work-family boundary management (WFBM). This study explores the effect of extreme, moderate, and mild pursuit of DE on women’s abilities to manage the boundary between work and family. This study uses a quantitative research method and collected data from 312 women entrepreneurs. The results show that DE enables women entrepreneurs to manage the work-family boundary. We found that with extreme DE, women are more likely to experience high levels of cross-role interruption behaviours and perceived boundary control, while with moderate DE, women experience high levels of identity centrality of work and family roles. Therefore, this study contributes to the literature on women’s DE by investigating different degrees of DE and its effects on work-family boundary management. The study also contributes to the literature on WFBM through examining the dynamics of DE in enabling women entrepreneurs to manage work-family boundaries to different extents. Therefore, this study captures the interplay between DE and managing work-family boundaries, which facilitates our understanding of women entrepreneurship and the role DE has in enabling the agentic potential of entrepreneurial actors.
۱۶۳.

Exploring the Perceived online Review Credibility and Management Response Influence on Purchase Intention(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Online Review Perceived Credibility Management Response purchase intention

حوزه‌های تخصصی:
تعداد بازدید : ۲۸۹ تعداد دانلود : ۱۹۲
Online reviews play a crucial role in the consumer decision-making process in the glamping industry. Some reviews are misleading; therefore, users need to identify credible reviews to form objective opinions. This study examined dimensions of perceived review credibility and its influence on purchase intention within the glamping business. Online surveys were conducted with respondents with relevant travel experiences to examine the key credibility factors. Findings identified that review length, amount of detail, writing style, and travelers’ images; as well as mixed, moderate, and two-sided reviews influence perceived review credibility. It was also found that perceived review credibility influences purchase intention; that management response impacts perceived company credibility and purchase intention; and that personalized management response is valuable for the perceived credibility and purchase intention. A revised conceptual framework was developed to demonstrate the sources of perceived credible online reviews and the role of management responses in the reviews. In addition to the theoretical contribution, this study can have practical marketing implications for businesses when creating online promotional material for their products and engaging with customers
۱۶۴.

Assessment of E-Learning Readiness in the Primary Education Sector in Libya: A Case of Yefren(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Assessment E-Learning Readiness Primary Education

حوزه‌های تخصصی:
تعداد بازدید : ۳۹۳ تعداد دانلود : ۳۲۳
Over the last few decades, both developed and developing countries have an increasing trend in technology but with an enormous gap, particularly in the education sector. The e-learning following institutions can achieve benefits by evaluating their e-learning readiness through up-front analysis. Moreover, several models have been introduced to measure e-learning readiness for developed countries but these are not adequate for developing countries.  This paper introduced the e-learning readiness evaluation model for the developing country, Libya, by considering the primary education sector. Furthermore, this study examines the e-learning level of readiness in the staff of the primary school. The purpose of this study is to evaluate the e-learning readiness of staff by directing factors of e-learning readiness i.e. cultural readiness, content readiness, and technology readiness. To achieve this objective, this paper collects data through questionnaires, and respondents are 110 staff member of primary schools in Yefren, Libya. Therefore, the multivariate analysis shows that the e-learning readiness factors have e significant relationship with the adoption of e-learning because most teachers are well prepared and ready. Likewise, results indicate that technology is the most significant factor instead of other e-learning readiness factors. According to the views of staff, there should be more content development training required for primary school staff. Thus, the demographic structure is inadequate to enhance the e-learning but the staff is ready for e-learning. Consequently, this study emphasizes the significance of cultural readiness and its relationship with the adoption of e-learning in primary education sectors’ development in Yefren, Libya.
۱۶۵.

Multi- Objective Fuzzy Software Release Problem with learning capacities for fault detection and correction processes(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Software Reliability Software Reliability Growth Models Fuzzy Release Time Problem Software Development Life Cycle

حوزه‌های تخصصی:
تعداد بازدید : ۳۴۳ تعداد دانلود : ۱۸۳
Without utilization of computer and its related technology, modern day’s life cannot be headway. It has also transformed into an incredibly troublesome task. The genuine challenges included are shorter life cycles, cost effective and higher software quality goals. Despite these challenges the software developers have started to give cautious thought on to the procedure to develop software, testing and reliability investigation of software and to reinforce the method. Developer most fundamental decisions related to the perfect release time of Software. Software development method incorporates a piece of vulnerabilities and ambiguities. We have proposed a multi objective software release time issue under fuzzy environment using a software reliability growth model to overcome such vulnerabilities and ambiguities. Further we have discussed the fuzzy environment framework to deal with the issue. Considering model and issue, we can especially address the issue of when to release software under these conditions. Results are illustrated numerically.
۱۶۶.

Metaheuristic Algorithms for Optimization and Feature Selection in Cloud Data Classification Using Convolutional Neural Network(مقاله علمی وزارت علوم)

کلیدواژه‌ها: feature selection Classification Cloud Computing Metaheuristic algorithm Convolution neural network

حوزه‌های تخصصی:
تعداد بازدید : ۳۸۶ تعداد دانلود : ۲۳۷
Cloud Computing has drastically simplified the management of IT resources by introducing the concept of resource pooling. It has led to a tremendous improvement in infrastructure planning. The major goals of cloud computing include maximization of computing resources with minimization of cost. But the truth is that everything has a price and cloud computing is no different. With Cloud computing there comes a number of security concerns which need to be addressed. Cloud forensics plays a vital role to address the security issues related to cloud computing by identifying, collecting and studying digital evidence in cloud environment. The aim of the research paper is to explore the concept of cloud forensic by applying optimization for feature selection before classification of data on cloud side. The data is classified as malicious and non-malicious using convolutional neural network. The proposed system makes a comparison of models with and without feature selection algorithms before applying the data to CNN. A comparison of different metaheuristics algorithms- Particle Swarm Optimization, Shuffled Frog Leap Optimization and Fire fly algorithm for feature optimization is done based on convergence rate and efficiency.
۱۶۷.

Informational and Analytical Systems for Forecasting the Indicators of Financial Security of the Banking System of Ukraine(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Financial security Information–Analytical System banking system Banking Security Forecast Models Financial Stability State

حوزه‌های تخصصی:
تعداد بازدید : ۲۸۵ تعداد دانلود : ۱۸۵
The article is devoted to the modern development of high technologies and computer technology greatly enhanced the development of automated banking systems of banking sector organizations and allowed the synthesis of information and communication technologies for their formation. The main purpose of the article is to select the main indicators for assessing the level of financial security of the banking system of the state and identify promising areas of its development using forecasting models. In the process of research such analytical functions have been used: polynomial, exponential, power and logarithmic. The authors believe that the information and analytical provision of the financial security of the bank is an information provision that combines, on the one hand, information work, that is, ways, means and methods of collecting the necessary information, and on the other - analytical work, which includes forms and methods of information analysis and processing, which ensures an objective assessment of the situation and the adoption of a balanced management decision. As a result, forecast models were built for each of the indicators and also, it has been found that most indicators of the banking system of Ukraine in 2021-2023 will remain at “unsatisfactory” and “critical” levels. In conclusions it was proposed to introduce measures that would be aimed at improving the reliability and stability of the banking system of Ukraine.
۱۶۸.

Prediction Financial Distress: The Pro-Technology Technique of Altman Z-Score Model(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Investment Pro-Technology Altman Z-Score Model Prediction Tool Sustainability

حوزه‌های تخصصی:
تعداد بازدید : ۳۳۳ تعداد دانلود : ۱۸۰
The Covid-19 outbreak has had a severe effect on the world economy. The company's business operations and profitability are damaged during the covid 19 outbreak. This deterioration is not only threatening the company’s survival position but also destroy the investor’s investment return. Therefore, it is vital to establish an effective early prediction technical method to foresee a corporate distress by a Pro-technical measurement to enhance the corporate sustainability. This study applies Altman Z-Score Model to as a Pro-Technology technique to the financial distress prediction of Malaysia’s Government Linked Plantation Companies (GLC-P) over a period of 10 years starting from 2012 to 2021. The significant contribution of the study is that the Z-Score Model provides an advanced indication tool regarding the financial stability of the respective GLC-P companies. The findings indicate that Financial Distress Prediction was dependent via in-time application of leverage, liquidity, activity, and profitability to the Altman Z-Score Model. Profitability and leverage were found to be superior prediction tool to financial distress.
۱۶۹.

Exemplary Growth Through Online Shopping With Satisfied Consumers In Vellore District(مقاله علمی وزارت علوم)

نویسنده:

کلیدواژه‌ها: Consumer behavior Fondness factors Online shopping Repurchase Satisfaction and Technology development

حوزه‌های تخصصی:
تعداد بازدید : ۳۶۸ تعداد دانلود : ۲۶۴
The rapid emergence and evolution of technology have greatly impacted the way people live their lives. The internet has become a vital part of our daily lives. E-commerce is a type of technology development that enables customers to buy and sell products online. It is a unique form of transaction that connects people from all around the world. Today, many consumers shop for products online and present their products along with their specifications. This is becoming more prevalent. This increases the number of consumers online, which can result in a drop in growth. This is one of the main factors that a company uses to measure its success. Growing business success is revealed with retained customers. Satisfied consumers are the assets for a growing business. The study investigates the factors that influence people's decisions when it comes to buying items online. It shows that the experiences they have while shopping online can affect their decisions. The following statistical tools were applied for this study: percentage analysis, mean score with rank correlation, and t-Test. The results reveal that the factors quality, cost, product variety, uniqueness, and safety payments were highlighted as important indicators of performance and that the companies that do online businesses had to take care of their main goal as per the proposal.
۱۷۰.

Forensic Research of the Computer Tools and Systems in the Fight against Cybercrime(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Forensic research Computer tools and systems cybercrime

حوزه‌های تخصصی:
تعداد بازدید : ۳۹۲ تعداد دانلود : ۳۰۶
The cybersecurity in the modern world has become global, and cyber attacks are becoming more complex and large-scale. In the system of civil and criminal justice, computer forensics helps to ensure the integrity of digital evidence presented in court cases. The purpose of this study is to develop scientifically sound proposals and recommendations for the implementation of tools for forensic research of computer tools and systems in the fight against cybercrime. The relevance of this study is due to the need to implement active ways to protect and combat cybercrime. To achieve the goal of the study, methodological principles and approaches of legal science were used. It is proposed to use computer forensic methods more widely research in the fight against cybercrime.This study identifies the types of computer forensics: forensics database; electronic forensics; malware forensics; criminology of memory; mobile forensics; network forensics. The authors foundlack of a regulatory mechanism to regulate cybersecurity, capture and use of digital evidence and the regulatory framework for international cooperation. To brought need in strengthening international cooperation and in developing appropriate policies and legislative initiatives of security and network and information systems, improvement legislation in the field countering cybercrime.
۱۷۱.

Real-Time Deep Intelligence Analysis and Visualization of COVID-19 Using FCNN Mechanism(مقاله علمی وزارت علوم)

کلیدواژه‌ها: DNA RNA sequence COVID-19 SARS-CoV-2 Coronavirus pandemic

حوزه‌های تخصصی:
تعداد بازدید : ۴۴۶ تعداد دانلود : ۳۰۰
The Analytic visualization suggests representing knowledge during a visual type that may be charts, graphs, lists, or maps. The COVID 19 detection and analysis of spreading is very important for countries. Database management with respect to virus deep analysis is a critical task to the researcher through conventional algorithms. The RNA, DNA, and biological data are helping to the bio-inspired algorithm but its implementation can be complex by software tools. Therefore, an effective technique is required to cross over the above limitations. So that covid 19 pandemic data analysis is performed through FCNN (Fully conventional Neural Network) pre-training network. The dataset is collected from social media, Kaggle, and GitHub databases. At 1st stage, the auto stack encoding process is applied later same data is processed with FCNN deep learning classifier. In this research work, covid-pandemic affects parameters like infected persons, deaths, active cases, and recovering cases. The FCNN is take care of feature extraction, training, testing, and classification. Finally using a confusion matrix accuracy of 98.34%, sensitivity 97.63%, Recall 98.26%, and F measure 98.83% had been estimated.
۱۷۲.

Generation of Syntax Parser on South Indian Language using Bottom-Up Parsing Technique and PCFG(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Natural Language Processing Artificial Intelligence Syntax Parser CYK Parsing Algorithm Probabilistic Context Free Grammar

حوزه‌های تخصصی:
تعداد بازدید : ۵۸۲ تعداد دانلود : ۲۹۵
In our research, we provide a statistical syntax parsing method experimented on Kannada texts, which is an official language of Karnataka, India. The dataset is downloaded from TDIL website. Using the Cocke-Younger-Kasami (CYK) parsing technique, we generated Kannada Treebank dataset from 1000 annotated sentences in the first stage. The Treebank generated in this stage contains 1000 syntactically structured sentences and it is used as input to train the syntax parser model in the second stage. We have adopted Probabilistic Context Free Grammar (PCFG) while training the parser model and extracting the Chmosky Normal Form (CNF) grammar from a Treebank dataset. The developed syntax parser model is tested on 150 raw Kannada sentences. It outputs with the most likely parse tree for each sentence and this is verified with golden Treebank. The syntax parser model generated 74.2% precision, 79.4% recall, and 75.3% F1-score respectively. The similar technique may be adopted for other low resource languages.
۱۷۳.

State Regulation Improvement of the Military-Industrial Complex Development in Ukraine in Terms of Transition to Modern Information Technologies(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Defense and Security of the State State Regulation military-industrial complex information technologies Scientific and Technical Potential Innovative development

حوزه‌های تخصصی:
تعداد بازدید : ۲۴۵ تعداد دانلود : ۱۷۳
The military and political leadership of Ukraine considers the domestic military-industrial complex as an important component of the country's national security and defense strategy and pays special attention to increasing the efficiency of production and scientific and technical activities of defense industry enterprises and organizations. The study represents directions for improving the state regulation for the further development of the military-industrial complex in Ukraine under the conditions of the transition to modern information technologies. Proposals have been made for the formation of the organizational and economic mechanism for state regulation development of the military-industrial complex, aimed at ensuring its innovativeness, stimulating scientific and technical activity, and implementing modern information technologies systematically during the production of weapons, ammunition and military goods.
۱۷۴.

Cucumber Leaf Disease Detection and Classification Using a Deep Convolutional Neural Network(مقاله علمی وزارت علوم)

کلیدواژه‌ها: DCNNs (Deep Convolution Neural Network) CNNs (Convolution Neural Network) Classification

حوزه‌های تخصصی:
تعداد بازدید : ۳۱۸ تعداد دانلود : ۱۳۶
Due to obstruction in photosynthesis, the leaves of the plants get affected by the disease. Powdery mildew is the main disease in cucumber plants which generally occurs in the middle and late stages. Cucumber plant leaves are affected by various diseases, such as powdery mildew, downy mildew and Alternaria leaf spot, which ultimately affect the photosynthesis process; that’s why it is necessary to detect diseases at the right time to prevent the loss of plants. This paper aims to identify and classify diseases of cucumber leaves at the right time using a deep convolutional neural network (DCNN). In this work, the Deep-CNN model based on disease classification is used to enhance the performance of the ResNet50 model. The proposed model generates the most accurate results for cucumber disease detection using data enhancement based on a different data set. The data augmentation method plays an important role in enhancing the characteristics of cucumber leaves. Due to the requirements of the large number of parameters and the expensive computations required to modify standard CNNs, the pytorch library was used in this work which provides a wide range of deep learning algorithms. To assess the model accuracy large quantity of four types of healthy and diseased leaves and specific parameters such as batch size and epochs were compared with various machine learning algorithms such as support vector machine method, self-organizing map, convolutional neural network and proposed method in which the proposed DCNN model gave better results.
۱۷۵.

Analyzing Hospital Services Quality Using a Hybrid Approach: Evidence from Information Technology(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Health information technology Patient satisfaction Kano Model AHP technique QFD model

حوزه‌های تخصصی:
تعداد بازدید : ۳۴۹ تعداد دانلود : ۲۰۵
Hospitals are the most important part of the healthcare system. Statistics show that a significant portion of health budgets are allocated to hospitals. The continuous impact of information technology on hospitals’ performance has led to perfect competition. Accordingly, this study aimed to evaluate the quality indicators of hospital services considering information technology using a hybrid approach of the Kano model, Analytical Hierarchy Process (AHP), and Quality Function Deployment (QFD). In this regard, based on related studies, a total of 18 needs were recognized to evaluate the service quality of a hospital. The statistical population of the study consisted of patients of the hospital and due to the difficulty of access to the patient, a limited sample of 50 patients was selected. After collecting data, the identified needs were classified into three categories called basic, functional, and motivational using the Kano model, and 7 needs were set as basic needs. Then, using the AHP technique, the importance of the basic needs was calculated and considered as the input of the QFD model in the next phase. After providing some solutions based on the literature to meet these 7 needs, solutions were ranked and prioritized using the QFD model. Since the organization had limited resources, the Pareto technique was used to respond to 20% of these strategies and achieve 80% satisfaction. The results of the study showed that the hospitals can achieve 80% satisfaction by implementing the strategies of “holding ethics training courses online” and “creating team spirit and using health information technology in the hospital”, respectively.
۱۷۶.

Efficient Machine Learning Algorithms in Hybrid Filtering Based Recommendation System(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Recommender System Content-Based Filtering collaborative filtering Movie Recommendation deep learning

حوزه‌های تخصصی:
تعداد بازدید : ۳۰۴ تعداد دانلود : ۱۷۰
The widespread use of E-commerce websites has drastically increased the need for automatic recommendation systems with machine learning. In recent years, many ML-based recommenders and analysers have been built; however, their scope is limited to using a single filtering technique and processing with clustering-based predictions. This paper aims to provide a systematic year-wise survey and evolution of these existing recommenders and analysers in specific deep learning-based hybrid filtering categories using movie datasets. They are compared to others based on their problem analysis, learning factors, data sets, performance, and limitations. Most contributions are found with collaborative filtering using user or item similarity and deep learning for the IMDB datasets. In this direction, this paper introduces a new and efficient Hybrid Filtering based Recommendation System using Deep Learning (HFRS-DL), which includes multiple layers and stages to provide a better solution for generating recommendations.
۱۷۷.

Prediction of Type - I and Type –II Diabetes: A Hybrid Approach using Fuzzy Logic and Machine Learning Algorithms(مقاله علمی وزارت علوم)

کلیدواژه‌ها: diabetes Blood sugar Machine Learning Algorithm Fuzzy Logic Disease Management risk factors insulin resistance polynomial regression Support vector regression

حوزه‌های تخصصی:
تعداد بازدید : ۲۴۴ تعداد دانلود : ۱۶۱
Diseases like diabetes are chronic and require long-term management. Inadequate production of insulin results in high blood sugar levels. Such diseases lead to serious health issues such as heart ailments, blood vessel complaints, eye ailments, kidney function disorders, and nerve ailments. Hence, accurate assessment and management of risk factors are crucial for the onset of diabetes. Our proposed approach combines fuzzy logic & machine learning algorithms for diabetes risk prediction. Three machine learning models were trained to classify patients into two categories of diabetes (Type-I and Type-II) based on their clinical dataset collected from Katihar Medical College & Hospital and Suvadhan Lab. The polynomial regression algorithm achieved a score of 0.947, while the support vector regression algorithm with the rbf kernel achieved a score of 0.954, with a linear kernel achieved a score of 0.73. Our proposed approach performed well with respect to the conventional approaches with improved accuracy by identifying the patients at diabetes risk. In future work, we further analyze the relationship between other ignored factors which contribute to diabetes risk.
۱۷۸.

The Digital Transformation of Creative Industries as a Management Imperative of Information Security of Society on a Parity-Legal Basis(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Digital Transformation Creative Industries Imperatives System-Reflexive Management Information security

حوزه‌های تخصصی:
تعداد بازدید : ۳۴۱ تعداد دانلود : ۱۸۱
The article defines that the composition and structure of creative industries, their branch specialization and cooperation, the scale and directions of development of industrial and other relations are determined by means of solving spatial problems and are conditioned by the level of digital transformation as imperative system-reflex management of information security of society at parity-legal principles. The process of formation of digital transformation of creative industries as an imperative of system-reflexive management of information security of society on a parity-legal basis in modern conditions today must meet globalization challenges that dictate the development of the country's economy as a whole. This should be manifested in the application of modern integration models for the formation and development of creative industries. It is substantiated that the main tasks of the strategy of financial capacity for digital transformation of creative industries as an imperative of system-reflexive management of information security of society on a parity-legal basis are to achieve balance of financial opportunities and needs of industries, efficiency of their financial relations, efficiency of processes of formation, movement, allocation and use of financial resources, rational structure of sources of financial resources, under which is possible stable financial support of digital transformation.
۱۷۹.

F-MIM: Feature-based Masking Iterative Method to Generate the Adversarial Images against the Face Recognition Systems(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Adversarial attack Black-box attack Dodging attack Face Recognition Feature based attack

حوزه‌های تخصصی:
تعداد بازدید : ۳۲۶ تعداد دانلود : ۱۳۳
Numerous face recognition systems employ deep learning techniques to identify individuals in public areas such as shopping malls, airports, and other high-security zones. However, adversarial attacks are susceptible to deep learning-based systems. The adversarial attacks are intentionally generated by the attacker to mislead the systems. These attacks are imperceptible to the human eye. In this paper, we proposed a feature-based masking iterative method (F-MIM) to generate the adversarial images. In this method, we utilize the features of the face to misclassify the models. The proposed approach is based on a black-box attack technique where the attacker does not have the information related to target models. In this black box attack strategy, the face landmark points are modified using the binary masking technique. In the proposed method, we have used the momentum iterative method to increase the transferability of existing attacks. The proposed method is generated using the ArcFace face recognition model that is trained on the Labeled Face in the Wild (LFW) dataset and evaluated the performance of different face recognition models namely ArcFace, MobileFace, MobileNet, CosFace and SphereFace under the dodging and impersonate attack. The F-MIM attack is outperformed in comparison to the existing attacks based on Attack Success Rate evaluation metrics and further improves the transferability.
۱۸۰.

نقش تفکر انتقادی در فرایند مدیریت دانش(مقاله علمی وزارت علوم)

کلیدواژه‌ها: مدیریت دانش تفکر انتقادی مرور انتقادی

حوزه‌های تخصصی:
تعداد بازدید : ۵۵۵ تعداد دانلود : ۳۷۴
مدیریت دانش[1] و تفکر انتقادی[2] دو پدیده گسترده و مهم برای سازمان ها و جامعه معاصر هستند و به خوبی مفاهیم مرتبط با آنها در ادبیات نظری علم مدیریت دانش و تفکر انتقادی بحث شده است. بااین حال، پیوندهای مفهومی موجود بین مدیریت دانش و تفکر انتقادی کمتر مورد تجزیه وتحلیل قرار گرفته و نقش تفکر انتقادی در فرایند مدیریت دانش به خوبی تبیین نشده است. هدف از این نوشتار، پر کردن این شکاف نظری و ارائه ارتباطات مفهومی بین مدیریت دانش و تفکر انتقادی است. تجزیه وتحلیل مفاهیم تفکر انتقادی و مدیریت دانش امکان شناسایی پیوندها را در سه بعد فراهم می کند.

پالایش نتایج جستجو

تعداد نتایج در یک صفحه:

درجه علمی

مجله

سال

زبان